Analysis

  • max time kernel
    136s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 09:54

General

  • Target

    2ae8e0e7200682b017c2fa4be81c84b2547e0238ade702b5112641b6b336bc19.exe

  • Size

    562KB

  • MD5

    d251764d069bab0638824c87cb165aeb

  • SHA1

    0d494f305b99a1dc6eb0a5975c9a14752a41a166

  • SHA256

    2ae8e0e7200682b017c2fa4be81c84b2547e0238ade702b5112641b6b336bc19

  • SHA512

    6b53824cf7ab1cd26f8052544a446471f1719bc8dd75ee5bdd7bd0db9044c16b756fd975c29549e8f1549027674c0b9073749cd5365dd77570e0d2fcb4f81b8d

  • SSDEEP

    12288:1Mrky903T8TiTWrrVK31Ht/q7CErraIitJ00Q9ZQkoCiznSVk:tyHJCH/ErraIKu0uQkbCSm

Malware Config

Extracted

Family

redline

Botnet

gadki

C2

77.91.124.82:19071

Attributes
  • auth_value

    2efd98e4d8880b45676de60a0faf778f

Signatures

  • Detect Mystic stealer payload 5 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ae8e0e7200682b017c2fa4be81c84b2547e0238ade702b5112641b6b336bc19.exe
    "C:\Users\Admin\AppData\Local\Temp\2ae8e0e7200682b017c2fa4be81c84b2547e0238ade702b5112641b6b336bc19.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9235905.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9235905.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1258529.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1258529.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:2764
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 540
              5⤵
              • Program crash
              PID:4824
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 568
            4⤵
            • Program crash
            PID:3932
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0591710.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0591710.exe
          3⤵
          • Executes dropped EXE
          PID:2824
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 928
            4⤵
            • Program crash
            PID:2932
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8771580.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8771580.exe
        2⤵
        • Executes dropped EXE
        PID:3736
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2764 -ip 2764
      1⤵
        PID:1712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1968 -ip 1968
        1⤵
          PID:1000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2824 -ip 2824
          1⤵
            PID:436

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Modify Registry

          1
          T1112

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8771580.exe
            Filesize

            140KB

            MD5

            03f1f8704f8431e86ad34599160b5f72

            SHA1

            e5794faa16938d4ab3b04a3243c34faf2d5acfa9

            SHA256

            b713fb351f89eb437fbd77566e3241b747405d3d85d98ff03f1317692667eb01

            SHA512

            78e2bc19192b70535b46de672b348faa27e6a7081c53d398ca426f906add08070cb5ed57bb07741f497f9109666dad1029e6f5f5dac9492d56ee1337842e2c75

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9235905.exe
            Filesize

            397KB

            MD5

            7d3d599a978cdb7a9ad1ac3f4e0a4a7c

            SHA1

            2f9383d00016041334b2e951b276505a83e16ef1

            SHA256

            5f582f2e92bbfbb81c7df8218c3bc4b117bf9ec238b6c946e94129b98f780fa2

            SHA512

            2e02683f8016e6b0177bec6436d359c23d28ecb76da40f5fb5249da500fa5469c088c3c9b1e73642f3091e5d14e2537affab4d4fba55d2ebfeffd1e11b9d03eb

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1258529.exe
            Filesize

            379KB

            MD5

            55dfba89fa4ed4918c600a908a53c0d0

            SHA1

            b1cc334314d0b29b7e6a792f5b0e75e536830fc9

            SHA256

            2021f0bd15ad360b7d84ba0b921e540636e8a205225f4e780086e4a9bf6eda14

            SHA512

            ba650a0ed21da04dd8baa6b6747c0cd0ab78e54e8435a93786b286585126cbbcdaea0208e49bc08941c5576f89219363541a6f8aa1def697e8f371b1354b6785

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0591710.exe
            Filesize

            174KB

            MD5

            b7f3ca30d5c6ea94d5a2a1c9d5c41ef0

            SHA1

            4c238a4542a441bd69df4a2cbe582f9fd5f3f38b

            SHA256

            45196ef8cc6f6246c196c09190a57735b05d61f5b1ae39ed0339650e7365b684

            SHA512

            9db4267b64c288688f6762996dc5d52e1945209237e88a297239905358fcdef244e5fbc6346884b5b263a1c414c05851003eb2705fc0adcc7a948d2a25740847

          • memory/2764-14-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2764-16-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2764-18-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2764-15-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2824-22-0x0000000000250000-0x0000000000280000-memory.dmp
            Filesize

            192KB