Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 19:03

General

  • Target

    0e4f6fa259d45f6b8b8d2e708ff9cac68a58307c15686d384502402302d450f8.exe

  • Size

    762KB

  • MD5

    7552519f9996f9c76b4162aabc6f39dd

  • SHA1

    74e8494962b80dbe582f10c4ac392e91b67c54f1

  • SHA256

    0e4f6fa259d45f6b8b8d2e708ff9cac68a58307c15686d384502402302d450f8

  • SHA512

    290e4daa6c737ba8eaf8e416257263a346054f48758b9324d2ce302fc1860b1d7545d00e4ac93637b92849a64939455953c2795ffaea559df0a09a878f990e66

  • SSDEEP

    12288:JMrPy90ST157TEsGSsGzE0iIRF/qONhX5jtAh7WpBQnzxsVkXkxcCdnIfY7:myVBqS+NWgONhXXOq/OzxsVykKSIg7

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e4f6fa259d45f6b8b8d2e708ff9cac68a58307c15686d384502402302d450f8.exe
    "C:\Users\Admin\AppData\Local\Temp\0e4f6fa259d45f6b8b8d2e708ff9cac68a58307c15686d384502402302d450f8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZH2QY4Bs.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZH2QY4Bs.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1QI40Dk2.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1QI40Dk2.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4892
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:3012
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:3732
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
                PID:3292
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 196
                  5⤵
                  • Program crash
                  PID:1868
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Qe360zH.exe
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Qe360zH.exe
              3⤵
              • Executes dropped EXE
              PID:2300
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3292 -ip 3292
          1⤵
            PID:2136

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZH2QY4Bs.exe

            Filesize

            565KB

            MD5

            79bf53ff0535bbad9ca539de3f151adc

            SHA1

            d14e7131fc4764e5635936cecf98ef371ad85216

            SHA256

            19d368444bf5c9063d1fe49d4bbd452a541ca99391b9ef9fe1644bc2c87dd557

            SHA512

            7310fe08160a637af9630732a5b930fc0cbffc0542a8352f6f93b1672b3cb8e8c4cce381f8b607cd5667e932ad398d0adabc4e83f562ddec194bb143e3a6e687

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1QI40Dk2.exe

            Filesize

            1.1MB

            MD5

            28f936b324d45522e840ef77b8d08943

            SHA1

            afe1dee65f78d50b65b418b027302ff43af9db04

            SHA256

            c8ae8ce4f6b7d270e92f7ef2be2af84a17785acf408142ebb11ce2474f552bb6

            SHA512

            7ca28d9a32fc6049b4a16efac745ef84a1953978c0dfb3c2f7a07b6ed7e32b63a36427ad01c4507f5ef2457dc24fe25792b5f48e43c1e45dc4479bcc1883f228

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Qe360zH.exe

            Filesize

            221KB

            MD5

            50a908f4f51d2c28893e3b333bfaf97a

            SHA1

            a29d7b48c81024d88d9b68d5b8c3041f90d1815e

            SHA256

            7b2f70f8087e5cca29c19a436a6dda7ed2288e46cca93137b1ec07dad4bd8a9b

            SHA512

            3ab930d5a2ff14a37e3bfd492f9876ae0c5d3aa7be94fb2b73478c3ee915d06db84a42434c83245a02f6f5710bd532c947328462a51cd9dff5b7b4593a29fd90

          • memory/2300-27-0x0000000007AD0000-0x0000000007BDA000-memory.dmp

            Filesize

            1.0MB

          • memory/2300-22-0x00000000009D0000-0x0000000000A0E000-memory.dmp

            Filesize

            248KB

          • memory/2300-23-0x0000000007CD0000-0x0000000008274000-memory.dmp

            Filesize

            5.6MB

          • memory/2300-24-0x00000000077C0000-0x0000000007852000-memory.dmp

            Filesize

            584KB

          • memory/2300-25-0x0000000004DA0000-0x0000000004DAA000-memory.dmp

            Filesize

            40KB

          • memory/2300-26-0x00000000088A0000-0x0000000008EB8000-memory.dmp

            Filesize

            6.1MB

          • memory/2300-28-0x0000000007980000-0x0000000007992000-memory.dmp

            Filesize

            72KB

          • memory/2300-29-0x0000000007A00000-0x0000000007A3C000-memory.dmp

            Filesize

            240KB

          • memory/2300-30-0x0000000007A40000-0x0000000007A8C000-memory.dmp

            Filesize

            304KB

          • memory/3292-20-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3292-17-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3292-18-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/3292-14-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB