Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 09:54

General

  • Target

    7f06170b1d7c15c8654c820aed9d163b0f686b8b747df4651e3c2d91e1e1bee6.exe

  • Size

    759KB

  • MD5

    cf283b15a0808e714c3020620715628a

  • SHA1

    69bd17b4907e8b78c53429930364dbd013fe55da

  • SHA256

    7f06170b1d7c15c8654c820aed9d163b0f686b8b747df4651e3c2d91e1e1bee6

  • SHA512

    6279071eca90cc1a6fa7010c081dc24cf3135bf46fc68dbfa83a918afa1b75e87cbdf401fbe07ff38c42ec71bfce69914fa0937bf32cd39dcc899d3caacfebbd

  • SSDEEP

    12288:QMrny90ZKeg3G9Lrl3sBzIhill3+XhfOR0u7l9AJ/62muR4x7p:nyoKeg3G9Lrl8ZneNOP7J2D4

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f06170b1d7c15c8654c820aed9d163b0f686b8b747df4651e3c2d91e1e1bee6.exe
    "C:\Users\Admin\AppData\Local\Temp\7f06170b1d7c15c8654c820aed9d163b0f686b8b747df4651e3c2d91e1e1bee6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sp7bI4GT.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sp7bI4GT.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jx75Tq8.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jx75Tq8.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1392
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4292
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:4396
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 540
                5⤵
                • Program crash
                PID:2980
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2wO689jf.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2wO689jf.exe
            3⤵
            • Executes dropped EXE
            PID:1628
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4396 -ip 4396
        1⤵
          PID:3376

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sp7bI4GT.exe

          Filesize

          562KB

          MD5

          db448d1001560007c1bbe2e649cc7ba8

          SHA1

          ffe41fba5849b77a159fbca64de51c99272590bc

          SHA256

          50df0310edf2b04d5bcdd2bf1dd6dbeb2b2241cbbb3b4e07399a1d04e1e70112

          SHA512

          149ecf75b1efde47c447c153fa29fecb0470704fe67fe4e88c937a0bab875001e46d9789fe8629c804e0c5d595c7feb208edefe6858f46c9e6e67c1389240465

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1jx75Tq8.exe

          Filesize

          1.1MB

          MD5

          e7cb38ca3d91a3e4da85627bad71c6b5

          SHA1

          df31f16ff7f158377c344391e7f383bbf2c23c7d

          SHA256

          e693702abce0099c18a14c78b14424e0575aab8a3f3599642120d8ec507d78f3

          SHA512

          ba32dc1ea0bad9cee161d1ef7aa37d49f24de4736c74e2bbb10dbea1e12857869a6068b52ba9419b1617527c0fda15cdd9649eaa802823c099270c02aec8c2b3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2wO689jf.exe

          Filesize

          222KB

          MD5

          fdde1621ce05f6d8e25a27b36404c594

          SHA1

          75510cba4e080f21e35f6110f9ee2882654a995c

          SHA256

          6680a4819825ceab66547968b272ada8f31930cab6dea355ca3222c34007fc29

          SHA512

          ad9d9207df60bf4e5eaaf99c4bb2f6f59a9beaa768e57b443b7e97398cd82a8d49484e69858bf5bc2c77a79a9d146fcf978e0c309eeadf0067fb67c314d704c5

        • memory/1628-27-0x0000000007750000-0x000000000785A000-memory.dmp

          Filesize

          1.0MB

        • memory/1628-22-0x0000000000570000-0x00000000005AE000-memory.dmp

          Filesize

          248KB

        • memory/1628-23-0x00000000078C0000-0x0000000007E64000-memory.dmp

          Filesize

          5.6MB

        • memory/1628-24-0x00000000073B0000-0x0000000007442000-memory.dmp

          Filesize

          584KB

        • memory/1628-25-0x0000000004910000-0x000000000491A000-memory.dmp

          Filesize

          40KB

        • memory/1628-26-0x0000000008490000-0x0000000008AA8000-memory.dmp

          Filesize

          6.1MB

        • memory/1628-28-0x0000000007380000-0x0000000007392000-memory.dmp

          Filesize

          72KB

        • memory/1628-29-0x0000000007490000-0x00000000074CC000-memory.dmp

          Filesize

          240KB

        • memory/1628-30-0x0000000007640000-0x000000000768C000-memory.dmp

          Filesize

          304KB

        • memory/4396-18-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4396-16-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4396-15-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4396-14-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB