Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:55

General

  • Target

    5fdef2b38d6a927d590cbceb6a8c3f4e278c41ce01d872925603603cd7d0bc0a.exe

  • Size

    547KB

  • MD5

    ff3fc3b57f2e1ef457d7ce7e7c273716

  • SHA1

    54b6241c92f97be696ae599391a2ce0dfe9e7e44

  • SHA256

    5fdef2b38d6a927d590cbceb6a8c3f4e278c41ce01d872925603603cd7d0bc0a

  • SHA512

    e198c3d34f25cc5f2c24286b4e5a5de944322f3fdd4746c364ddcde0835129e7cdbda89d8166f2ce2590744aa35e5deaef0528107031387ba6d2edda2b0a5c63

  • SSDEEP

    12288:JMrgy905aKrXt7d3Hl/HtIlrQItcqbfA:xyNKzddXl/6rVCwA

Malware Config

Extracted

Family

redline

Botnet

luate

C2

77.91.124.55:19071

Attributes
  • auth_value

    e45cd419aba6c9d372088ffe5629308b

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fdef2b38d6a927d590cbceb6a8c3f4e278c41ce01d872925603603cd7d0bc0a.exe
    "C:\Users\Admin\AppData\Local\Temp\5fdef2b38d6a927d590cbceb6a8c3f4e278c41ce01d872925603603cd7d0bc0a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5392284.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5392284.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4953753.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4953753.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4908
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:64
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 540
              5⤵
              • Program crash
              PID:2032
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 140
            4⤵
            • Program crash
            PID:1068
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2394542.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2394542.exe
          3⤵
          • Executes dropped EXE
          PID:1688
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 64 -ip 64
      1⤵
        PID:4684
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4908 -ip 4908
        1⤵
          PID:4168

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5392284.exe

          Filesize

          381KB

          MD5

          d9a69262f6e89052240d96531cce6e40

          SHA1

          676bfa0847f1df213d77730526b0b2da0bfe52c6

          SHA256

          26bd29130b9fe73fae25b9c746fe0e340c54806f98362f004aab36cf2dde5cfb

          SHA512

          ec302a26541857fd32be602be4b461e673fd51ed3e27806c995ad57f9b1266ae11edb40d5f3570803ee2c1bad94364b3a2d4fc4220b480dbc7a199e0672a91d9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4953753.exe

          Filesize

          346KB

          MD5

          bb7e58fc7793b5aaa83dd824e2310bae

          SHA1

          51da0f82095eed6e4a57bb01f410cfaed927ea87

          SHA256

          14046248663fec768b4be6b4cc31e292413c61ce562a15790a9bc07d52572468

          SHA512

          7cfcf8a455a4e5801dae484c73625351c4e6fbf3a9e5ee46bbc8d42548c01305b3977cdd10f1647edc418ceda39a160329edc89e9a8193314b7826f93c7f8c20

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2394542.exe

          Filesize

          174KB

          MD5

          b5651381dd0d132d2d75b4b126622d1c

          SHA1

          b6eac550e778a7a5d325a48278784acbdab6cd0c

          SHA256

          6f59b8113505dd48834c657a57667217e69f89baffca98e92444488bbdfdc822

          SHA512

          0564b525d4b39110f6803a2ecfe22d580205cca067df2fb13bf04cf70666d5d13af9efe660710d1bfd1a7053d34a01c6cc18938b894a8a973f65f33e5fa13dbf

        • memory/64-18-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/64-16-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/64-15-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/64-14-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1688-22-0x0000000000390000-0x00000000003C0000-memory.dmp

          Filesize

          192KB

        • memory/1688-23-0x0000000004C70000-0x0000000004C76000-memory.dmp

          Filesize

          24KB

        • memory/1688-24-0x0000000005310000-0x0000000005928000-memory.dmp

          Filesize

          6.1MB

        • memory/1688-25-0x0000000004E00000-0x0000000004F0A000-memory.dmp

          Filesize

          1.0MB

        • memory/1688-26-0x0000000004D20000-0x0000000004D32000-memory.dmp

          Filesize

          72KB

        • memory/1688-27-0x0000000004D80000-0x0000000004DBC000-memory.dmp

          Filesize

          240KB

        • memory/1688-28-0x0000000004F10000-0x0000000004F5C000-memory.dmp

          Filesize

          304KB