Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 19:04

General

  • Target

    e9a8b4bb4dd37e699485236af8b9f652f2d7a93c83e9ce906ac2e6ffe1fb5e42.exe

  • Size

    954KB

  • MD5

    b65641f23eead5be7a64228632048588

  • SHA1

    25ec492c675c5f9178e22fe9987de28188932252

  • SHA256

    e9a8b4bb4dd37e699485236af8b9f652f2d7a93c83e9ce906ac2e6ffe1fb5e42

  • SHA512

    b41516ed28383054bbd9e89868a8294317ca6b6ff4ff4ca5769246a6e9ad3b87e7f9b3f6ef0b03ec650723e5454d1db809357b875243bf273071d97eea71b2bb

  • SSDEEP

    24576:HyHsLsUsIRbO+L/PSIR9CX/1HKxCJKglO:S7UsadLU/1nJ

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9a8b4bb4dd37e699485236af8b9f652f2d7a93c83e9ce906ac2e6ffe1fb5e42.exe
    "C:\Users\Admin\AppData\Local\Temp\e9a8b4bb4dd37e699485236af8b9f652f2d7a93c83e9ce906ac2e6ffe1fb5e42.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5896512.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5896512.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8216649.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8216649.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6159038.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6159038.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4016
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0200309.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0200309.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3496
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5084
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 564
              6⤵
              • Program crash
              PID:2992
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0121758.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0121758.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1704
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4704
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 564
                6⤵
                • Program crash
                PID:4148
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3580159.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3580159.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1916
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:3456
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                  PID:3616
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 580
                  5⤵
                  • Program crash
                  PID:4724
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2488744.exe
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2488744.exe
              3⤵
              • Executes dropped EXE
              PID:4116
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e0642196.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e0642196.exe
            2⤵
            • Executes dropped EXE
            PID:1136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3496 -ip 3496
          1⤵
            PID:4076
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1704 -ip 1704
            1⤵
              PID:2488
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1916 -ip 1916
              1⤵
                PID:3308
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4380,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:8
                1⤵
                  PID:388

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e0642196.exe

                  Filesize

                  174KB

                  MD5

                  8b9bf31d8e207495437076944a8dbb67

                  SHA1

                  a287d6cf36e4f7901cd91242fb25bba5d8a1bcbd

                  SHA256

                  313b23d1bb9b6b95b200e2920f38e76e0ae988d9002ed8230f34e54403a59dc7

                  SHA512

                  799780f3c129c0dc208d0e9efcc7158dba48dee6ac983e21564d2ac31836d043f43d98042a6a173a4c2f5671d037e7a858583062d3ccbef09070f15d71966b25

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5896512.exe

                  Filesize

                  798KB

                  MD5

                  157ab8c360f13fbd7aa37b85a0af7060

                  SHA1

                  4aa259321877a246488466bc5d7d5fecb17942b2

                  SHA256

                  27a7a018dc01d3d0b66183d8c8669275ecf9ce7f44e0b4bdb1c252998fe3e5d6

                  SHA512

                  72d9b19e0b2dffe2bc848cf0a8bd72ca579535dc9b962ed4f86a0cfcc587c7b17092b3b971a2b6e16c33723c72da356c9a07f1f520015a34f2d62cd437010ed5

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2488744.exe

                  Filesize

                  140KB

                  MD5

                  0743d3c069dff8ef1e63c9c1445e43f0

                  SHA1

                  fee96314ba8cc5561416b0cdd9f652bc1b53a142

                  SHA256

                  dea1571eb5140c6c96dbdb0aa1fdd30667a68f29201955fbf3b2aac916a6ac03

                  SHA512

                  bcf8058d5bdcb91221bc226819c08975b0aac18fdd53c0de9a0595988b3b593448f8b026d9c275f7be9e40b77753137a5a0b4aee78df216130eba75e1d3dd9f7

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8216649.exe

                  Filesize

                  632KB

                  MD5

                  c1f230f17299e0549b94ec105eb2dc67

                  SHA1

                  0f169a3b824a614035798defde6955174f6432a0

                  SHA256

                  7e6a9c35e171d255a239a3b2bbf9c45fadf790ba0104a97f10025b3a9ff0326f

                  SHA512

                  62063f8f556299d4a8cd59d66885b55ba47b9b510adb14a579642da8a56f3ed7ec4e383f3a763a4202f531095f472709c4cc78720ca53f31fe52286a3f34c933

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3580159.exe

                  Filesize

                  413KB

                  MD5

                  4194c47b6c9aeed281684b3baca54c00

                  SHA1

                  7b7eaa6280651c59ab1d8564aed99ccff61bb806

                  SHA256

                  c69089d89b558ca26811ccfd634c207beee99bcc632b35e525bab7e7bf7e1a6b

                  SHA512

                  0e9dde3fa4de8ebb1d4a98dce410857d48a78759fbd268729a0a8c83750052c35717c851279426883d715a353d892a8e0239964a29a853a58d3684e11ac7ecbc

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6159038.exe

                  Filesize

                  354KB

                  MD5

                  7a82dd144bd06a57be4a8385190e87f3

                  SHA1

                  74347f053565642637582b580c119559691515d1

                  SHA256

                  4841179e098d20e4801a326d96829782005dc8123c3aac86c32feb5640a21d74

                  SHA512

                  6500bf243a0f5aa71980cddcd2f8d5624acdaee728bf375f663b2d1c43ae7ab1d005076447eeb576a5f6bcb345c0dfb9fd5141ae023f9d96065b9a0b568a643c

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0200309.exe

                  Filesize

                  250KB

                  MD5

                  ba346e32088370ccf2fee5d5a39398d3

                  SHA1

                  db269802cb045e74b1774547cadab962d7c644ba

                  SHA256

                  08bbfcc52e973f31cc32a1f25d267c089ccc592ae1be4cc5292deffe88bf2ab1

                  SHA512

                  b377079ac4cea57c20b7fe44a565904bbac067d5730b1af6283c87c5024742205e1b8fac70c70c6634d4b54f5ea16c4e8c49161b7ab7956edc1afb73e37eb6bc

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0121758.exe

                  Filesize

                  379KB

                  MD5

                  a8264268827085c6753e39f4db34e979

                  SHA1

                  faffdb84ff338bb64c1fffe35579a64b140d4ab2

                  SHA256

                  8dbc880fe0be842c8f8e6ae3137e6f8c81b417d0992bde8720fcffe1b43d124b

                  SHA512

                  46889f4257f04f94b277a5cfaff183fc1a4efad7472648c2f9b5e7fc8f9463549b6dfefb721477a21dac2a39d1753c4302226aad46fb61bed1dc5218f942ec4f

                • memory/1136-51-0x00000000052D0000-0x00000000052D6000-memory.dmp

                  Filesize

                  24KB

                • memory/1136-50-0x00000000009B0000-0x00000000009E0000-memory.dmp

                  Filesize

                  192KB

                • memory/3616-39-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB

                • memory/3616-40-0x0000000002810000-0x0000000002816000-memory.dmp

                  Filesize

                  24KB

                • memory/3616-44-0x000000000AA60000-0x000000000B078000-memory.dmp

                  Filesize

                  6.1MB

                • memory/3616-47-0x000000000A580000-0x000000000A68A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/3616-49-0x000000000A4C0000-0x000000000A4D2000-memory.dmp

                  Filesize

                  72KB

                • memory/3616-52-0x000000000A520000-0x000000000A55C000-memory.dmp

                  Filesize

                  240KB

                • memory/3616-53-0x0000000002770000-0x00000000027BC000-memory.dmp

                  Filesize

                  304KB

                • memory/4704-35-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/4704-33-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/4704-32-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/5084-28-0x0000000000400000-0x000000000040A000-memory.dmp

                  Filesize

                  40KB