Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 09:54

General

  • Target

    192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe

  • Size

    768KB

  • MD5

    0de600ae6ec8490fb19ad446930f8581

  • SHA1

    79c2e47abfcdcb80601a81d332f280d219a94872

  • SHA256

    192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3

  • SHA512

    95f5a3954717d1e180d4ece7078c021ad336310abdcda5375e709454835c0e9313c4d9aa9986a4da08936c0c29bca9c99a30c8d14904083c44ccf2a0ba39807f

  • SSDEEP

    12288:DMrDy90GW5A7L+zRAfUBhN5wCPvRLDXq6LI9Gi23rfOttApNxdNMJPXP:oya5MfU/NvRXq3UikOtWNxdNMJ3

Malware Config

Extracted

Family

redline

Botnet

kedru

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe
    "C:\Users\Admin\AppData\Local\Temp\192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PK1zM1gH.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PK1zM1gH.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1zq39TJ7.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1zq39TJ7.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4912
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4148
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 540
              5⤵
              • Program crash
              PID:2984
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 560
            4⤵
            • Program crash
            PID:4540
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ha571Zb.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ha571Zb.exe
          3⤵
          • Executes dropped EXE
          PID:1876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4148 -ip 4148
      1⤵
        PID:1072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4912 -ip 4912
        1⤵
          PID:968

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PK1zM1gH.exe
          Filesize

          573KB

          MD5

          98f47d4e53f37548f802a09bf7b678da

          SHA1

          9f9c592c79e6565c7ea9a203254bc4f98827bc80

          SHA256

          6858b5b638427082a20f672bc807c2302d78ce9654fc7461f1b79cf38966c0a7

          SHA512

          48367eb0c2bc71c23013e882447b4f6eb08df19146623a497d9cd4d19372b72a4563356eac4981fe54a8e3438fbe224901cd400a7a0ec2bafba226b3884f0754

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1zq39TJ7.exe
          Filesize

          1.1MB

          MD5

          8d111bb0aa4569a760f78fbc00ba47cc

          SHA1

          5daa40cc0870624a208af5014111bd7b23b9d93e

          SHA256

          a799207baa85c4f7a91fde2a7a2604607bc5d57cfb47c13d659d7f34796bf6c2

          SHA512

          edc98606ec40dd1219bb1d40eb43f5543a9a8f3077e78b4022a2c229911f53c880c0d8e949d68e0d91665664a1986363832bd10ca549176ef29731277cf93a4e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ha571Zb.exe
          Filesize

          219KB

          MD5

          378fbeb225bef4b5175f19ab33798034

          SHA1

          b0281007adad3c85b489c48d5dc90ad42efc56e3

          SHA256

          25ac4360968a320f7c380db131b677edcbff3452c77589d61cea01b2da308031

          SHA512

          372a41ea3e7761d346b367de20ee916d6870d36b819637a9031efc1763fdcec149d9b3cd40d0ea3c8a177b8e99db37516eba724e871cf5caa17420a064d57ad8

        • memory/1876-27-0x0000000008350000-0x000000000845A000-memory.dmp
          Filesize

          1.0MB

        • memory/1876-22-0x0000000000980000-0x00000000009BC000-memory.dmp
          Filesize

          240KB

        • memory/1876-23-0x0000000007DA0000-0x0000000008344000-memory.dmp
          Filesize

          5.6MB

        • memory/1876-24-0x0000000007890000-0x0000000007922000-memory.dmp
          Filesize

          584KB

        • memory/1876-25-0x0000000007A40000-0x0000000007A4A000-memory.dmp
          Filesize

          40KB

        • memory/1876-26-0x0000000008970000-0x0000000008F88000-memory.dmp
          Filesize

          6.1MB

        • memory/1876-28-0x0000000007B10000-0x0000000007B22000-memory.dmp
          Filesize

          72KB

        • memory/1876-29-0x0000000007B70000-0x0000000007BAC000-memory.dmp
          Filesize

          240KB

        • memory/1876-30-0x0000000007BE0000-0x0000000007C2C000-memory.dmp
          Filesize

          304KB

        • memory/4148-15-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/4148-16-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/4148-18-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/4148-14-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB