Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 10:08

General

  • Target

    3f23e445a9c2f529b4cbc3f4ee40ef64fa1fe69a8d4a241b103ec8c749376239.exe

  • Size

    761KB

  • MD5

    3708d6c379f5b50d423b1424543b3d50

  • SHA1

    5e4a40b2f33cb8c0b18c5f4bc579be09e58256d9

  • SHA256

    3f23e445a9c2f529b4cbc3f4ee40ef64fa1fe69a8d4a241b103ec8c749376239

  • SHA512

    f8a615e714e9209abb477e948441857a0675e2a4595044fe476faac009a14d00f391769152108908f3d839dacf1812a754d7ce369a197b9f5edec98e9db5596d

  • SSDEEP

    12288:TMrky90AWjLhr4N8GQ8s2BmKybvodZBG1b8p3uqjd4vI6pejdxl3sqP1cI:nyyr4NMZqIbwde1b8NuKWZcjh8qP1cI

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f23e445a9c2f529b4cbc3f4ee40ef64fa1fe69a8d4a241b103ec8c749376239.exe
    "C:\Users\Admin\AppData\Local\Temp\3f23e445a9c2f529b4cbc3f4ee40ef64fa1fe69a8d4a241b103ec8c749376239.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qu6jr9An.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qu6jr9An.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Ph96Ss9.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Ph96Ss9.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:748
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:2652
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 200
              5⤵
              • Program crash
              PID:2456
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2aN496tj.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2aN496tj.exe
          3⤵
          • Executes dropped EXE
          PID:4032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2652 -ip 2652
      1⤵
        PID:2200

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Qu6jr9An.exe

        Filesize

        564KB

        MD5

        e6d8d88673e8766da679c883176ee106

        SHA1

        19be0f0c431a6626d1f025aab24f54c45bf13c30

        SHA256

        335feab347f4141de3af8f576bf171d70aec21f1d4bdc29beede6561aa48423d

        SHA512

        b44025d580ed16f5d679ca7be5e4e72d3455026f827b8af6ecc95cb72681019b172ae3e1da2d00bca14a74ff94f3b52fe0d7bf4232f681b2f79df38b6ca81b8a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Ph96Ss9.exe

        Filesize

        1.1MB

        MD5

        929b78bd8e87d34c301155e1317115f2

        SHA1

        435760ff4c631a0afb1389888f8c190a1d8d4119

        SHA256

        de1da99fc0aa638e74a81cbbd9c784847ca6457fa7a9f4600f7341cc4dcf643e

        SHA512

        99dc4c71fea137ca51b182b444a80d7dfa31d1d8266b9deb319fca7f7cfaa7429a431a6bf90058ca717ce94e1f917f25d9f2333a04328a827f34ab8b84ddf97b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2aN496tj.exe

        Filesize

        222KB

        MD5

        3862ef0b20d378171280da6b1da7720d

        SHA1

        b61489dca1ee49eb7788b05f5df2f61687d96fe6

        SHA256

        0dfe79341608b61a2c254d202be5b55cdaa04e5919886ce7867b23556b87f427

        SHA512

        10fb5b10cdd08d3752001eaf8cbc512da0cab7b4a57a7945335b1812afc27b9480e9b2aebb2e1e7da119fbaf0c98f6b79dc209604d5ebf4aaa6a63505754b2ca

      • memory/2652-14-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2652-20-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2652-18-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2652-17-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4032-23-0x0000000007F60000-0x0000000008504000-memory.dmp

        Filesize

        5.6MB

      • memory/4032-22-0x0000000000AC0000-0x0000000000AFE000-memory.dmp

        Filesize

        248KB

      • memory/4032-24-0x0000000007A50000-0x0000000007AE2000-memory.dmp

        Filesize

        584KB

      • memory/4032-25-0x0000000005010000-0x000000000501A000-memory.dmp

        Filesize

        40KB

      • memory/4032-26-0x0000000008B30000-0x0000000009148000-memory.dmp

        Filesize

        6.1MB

      • memory/4032-27-0x0000000007DE0000-0x0000000007EEA000-memory.dmp

        Filesize

        1.0MB

      • memory/4032-28-0x0000000007A20000-0x0000000007A32000-memory.dmp

        Filesize

        72KB

      • memory/4032-29-0x0000000007B30000-0x0000000007B6C000-memory.dmp

        Filesize

        240KB

      • memory/4032-30-0x0000000007B70000-0x0000000007BBC000-memory.dmp

        Filesize

        304KB