Analysis

  • max time kernel
    136s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 19:04

General

  • Target

    32de0993bcf732baddd380146e8009f4e004108cb7883b6e48fcbc5c9e48ca1e.exe

  • Size

    1.2MB

  • MD5

    3cd4c28fa62c0cf93bf3eca5ef90e439

  • SHA1

    c6e956a087f43a24e4d6cf421a78b5671e9213b7

  • SHA256

    32de0993bcf732baddd380146e8009f4e004108cb7883b6e48fcbc5c9e48ca1e

  • SHA512

    46a98da1e17c64052fa36ea544a8e8cfdd9b67735d441fc00c3b4917299393fceee61f61a1e024a0d0d375800d929e837c47099a8425d010b07d1353a4b7fec6

  • SSDEEP

    24576:PyeumwYs4AEjgXoSz+CGOOFmYWmZetNk84ps1Yu812Y:agZJaSCGOO1J3

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 5 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32de0993bcf732baddd380146e8009f4e004108cb7883b6e48fcbc5c9e48ca1e.exe
    "C:\Users\Admin\AppData\Local\Temp\32de0993bcf732baddd380146e8009f4e004108cb7883b6e48fcbc5c9e48ca1e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rl1kg6QI.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rl1kg6QI.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Wm1Vv3hD.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Wm1Vv3hD.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1VP36lc6.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1VP36lc6.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:5060
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:3132
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 584
              5⤵
              • Program crash
              PID:4524
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2fO859kL.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2fO859kL.exe
            4⤵
            • Executes dropped EXE
            PID:2792
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5060 -ip 5060
      1⤵
        PID:1460
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:928

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rl1kg6QI.exe

          Filesize

          763KB

          MD5

          8b1bbc64f50355395bcb1a5db47c745f

          SHA1

          d3d57a9c7287325bf4f93b069db72ada20c5922b

          SHA256

          828e120503deee9d6ef83b6e26c95671e95086f760aab0aa8e6cc1bdb8ed06e7

          SHA512

          a6e1f1ca3da8a5a22e5963d0c52ea6dceaf5227581d2d09267f9ff5f1344cce840265b1ef4d2ef4017a1981f311bc81444549cc42a33df09f96ec9315379c5fe

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Wm1Vv3hD.exe

          Filesize

          567KB

          MD5

          78213866ad15926c9ea68fe266e35680

          SHA1

          7a84af9b69999f36879f8f109f2aceb8cbccd356

          SHA256

          8eceae7113c0962ccadb013a725105ef56a5e1ade3224a8940175ec5b4597ad0

          SHA512

          5eae3aaddaa217f1042c82e77cc61ae439d595d733d6bc89bf11392f9858be7aced1aeeeb1987726fa0ee7fa525e5452fc45995f99243e5f5ab3ba842f751a09

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1VP36lc6.exe

          Filesize

          1.1MB

          MD5

          4ddfa486d37c166d7f8028d716e183a1

          SHA1

          0483954e904196b29207bad18bfcfc600d010131

          SHA256

          f3f79ebd412f4e7e5d854c17f4180c6245ae051bc04501473e631d31fbbbfa2f

          SHA512

          42ede28d0211888ae336ef18f09cb506afd3b7d5f5669f8693100aa0cfbca5a30374ae2a8289ab42b2fadbd5630a9d25117dfaf3e900548b270da634bf7fa31e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2fO859kL.exe

          Filesize

          222KB

          MD5

          a260dc6564e820b08801e5d6cc832025

          SHA1

          d41fba701bac791a17603fae8dff964b97369e67

          SHA256

          9a967fc09ae600774f30dedaaf3378a064082e617132d7414728df288f8dad47

          SHA512

          f650440c7bfdbafbf838ba5d38aee2b1442e116cb53117d5f8019ab6d0549e9077a5bf74364db88657c5b95440a8c1bb920cb17e185fac0e44ee28b2b4de4d97

        • memory/2792-33-0x00000000078F0000-0x00000000078FA000-memory.dmp

          Filesize

          40KB

        • memory/2792-35-0x0000000007A50000-0x0000000007B5A000-memory.dmp

          Filesize

          1.0MB

        • memory/2792-38-0x0000000007980000-0x00000000079CC000-memory.dmp

          Filesize

          304KB

        • memory/2792-37-0x0000000007940000-0x000000000797C000-memory.dmp

          Filesize

          240KB

        • memory/2792-36-0x0000000005240000-0x0000000005252000-memory.dmp

          Filesize

          72KB

        • memory/2792-30-0x0000000000830000-0x000000000086E000-memory.dmp

          Filesize

          248KB

        • memory/2792-31-0x0000000007BE0000-0x0000000008184000-memory.dmp

          Filesize

          5.6MB

        • memory/2792-32-0x00000000076F0000-0x0000000007782000-memory.dmp

          Filesize

          584KB

        • memory/2792-34-0x00000000087B0000-0x0000000008DC8000-memory.dmp

          Filesize

          6.1MB

        • memory/3132-21-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3132-23-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3132-22-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3132-26-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3132-25-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB