Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 10:02

General

  • Target

    192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe

  • Size

    768KB

  • MD5

    0de600ae6ec8490fb19ad446930f8581

  • SHA1

    79c2e47abfcdcb80601a81d332f280d219a94872

  • SHA256

    192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3

  • SHA512

    95f5a3954717d1e180d4ece7078c021ad336310abdcda5375e709454835c0e9313c4d9aa9986a4da08936c0c29bca9c99a30c8d14904083c44ccf2a0ba39807f

  • SSDEEP

    12288:DMrDy90GW5A7L+zRAfUBhN5wCPvRLDXq6LI9Gi23rfOttApNxdNMJPXP:oya5MfU/NvRXq3UikOtWNxdNMJ3

Malware Config

Extracted

Family

redline

Botnet

kedru

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe
    "C:\Users\Admin\AppData\Local\Temp\192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PK1zM1gH.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PK1zM1gH.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1zq39TJ7.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1zq39TJ7.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:2472
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 540
              5⤵
              • Program crash
              PID:1600
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 604
            4⤵
            • Program crash
            PID:1212
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ha571Zb.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ha571Zb.exe
          3⤵
          • Executes dropped EXE
          PID:3328
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2472 -ip 2472
      1⤵
        PID:5004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4520 -ip 4520
        1⤵
          PID:3932

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PK1zM1gH.exe

          Filesize

          573KB

          MD5

          98f47d4e53f37548f802a09bf7b678da

          SHA1

          9f9c592c79e6565c7ea9a203254bc4f98827bc80

          SHA256

          6858b5b638427082a20f672bc807c2302d78ce9654fc7461f1b79cf38966c0a7

          SHA512

          48367eb0c2bc71c23013e882447b4f6eb08df19146623a497d9cd4d19372b72a4563356eac4981fe54a8e3438fbe224901cd400a7a0ec2bafba226b3884f0754

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1zq39TJ7.exe

          Filesize

          1.1MB

          MD5

          8d111bb0aa4569a760f78fbc00ba47cc

          SHA1

          5daa40cc0870624a208af5014111bd7b23b9d93e

          SHA256

          a799207baa85c4f7a91fde2a7a2604607bc5d57cfb47c13d659d7f34796bf6c2

          SHA512

          edc98606ec40dd1219bb1d40eb43f5543a9a8f3077e78b4022a2c229911f53c880c0d8e949d68e0d91665664a1986363832bd10ca549176ef29731277cf93a4e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ha571Zb.exe

          Filesize

          219KB

          MD5

          378fbeb225bef4b5175f19ab33798034

          SHA1

          b0281007adad3c85b489c48d5dc90ad42efc56e3

          SHA256

          25ac4360968a320f7c380db131b677edcbff3452c77589d61cea01b2da308031

          SHA512

          372a41ea3e7761d346b367de20ee916d6870d36b819637a9031efc1763fdcec149d9b3cd40d0ea3c8a177b8e99db37516eba724e871cf5caa17420a064d57ad8

        • memory/2472-14-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2472-16-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2472-18-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2472-15-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3328-23-0x0000000007C40000-0x00000000081E4000-memory.dmp

          Filesize

          5.6MB

        • memory/3328-22-0x00000000009D0000-0x0000000000A0C000-memory.dmp

          Filesize

          240KB

        • memory/3328-24-0x0000000007790000-0x0000000007822000-memory.dmp

          Filesize

          584KB

        • memory/3328-25-0x0000000002D10000-0x0000000002D1A000-memory.dmp

          Filesize

          40KB

        • memory/3328-26-0x0000000008810000-0x0000000008E28000-memory.dmp

          Filesize

          6.1MB

        • memory/3328-27-0x00000000081F0000-0x00000000082FA000-memory.dmp

          Filesize

          1.0MB

        • memory/3328-28-0x0000000007970000-0x0000000007982000-memory.dmp

          Filesize

          72KB

        • memory/3328-29-0x0000000007A00000-0x0000000007A3C000-memory.dmp

          Filesize

          240KB

        • memory/3328-30-0x00000000079A0000-0x00000000079EC000-memory.dmp

          Filesize

          304KB