Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 09:56

General

  • Target

    d89a0550853b7067190a4816c540a6838fc7703bf9df0665fc491c92feb72adf.exe

  • Size

    1.5MB

  • MD5

    e0838331cb44293a79942554f0e84be8

  • SHA1

    3337c90644f3abd2097d4f64605500f902e7c1e5

  • SHA256

    d89a0550853b7067190a4816c540a6838fc7703bf9df0665fc491c92feb72adf

  • SHA512

    d66c8e738b7a8a6115fe2973778380aab22f7f57f5365c2e8a4f3de5205ab09f42ea6a0f33eb91414bed617e568bdbbe4cda1ececf437c1e2f45d03cce64d991

  • SSDEEP

    24576:EyUZ5lFEBJT1rKp9725NozE/LY0is+KPwqih27rCy/ZkEJXqgJiqUTLw4OCTbsDf:TC5PEBJT1rK+5NozEDYvdh23hkeTiJ/D

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d89a0550853b7067190a4816c540a6838fc7703bf9df0665fc491c92feb72adf.exe
    "C:\Users\Admin\AppData\Local\Temp\d89a0550853b7067190a4816c540a6838fc7703bf9df0665fc491c92feb72adf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xv9tr3ze.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xv9tr3ze.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Zy0XO3MO.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Zy0XO3MO.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dw1Gh1Gm.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dw1Gh1Gm.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2116
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\yS3vD3QU.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\yS3vD3QU.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2140
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dV15Qf2.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dV15Qf2.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:732
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:3876
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:3416
                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Bd101eP.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Bd101eP.exe
                  6⤵
                  • Executes dropped EXE
                  PID:1732

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xv9tr3ze.exe

        Filesize

        1.3MB

        MD5

        1a0e6204cc920423ba789c5a048953e4

        SHA1

        d146a963aa879a3eaae75a0ad7247c987d54f53f

        SHA256

        8448f4cf8fed0f239c518b39fe93769012785dfbbeae1f567ceaba5b33965770

        SHA512

        53be74f9382705554e0f9ecaacb54b0569071f5754870fa96c3fffe6fb4318c61bddfde0ba16f9fc9cb1cd42eb101bdd5a8a83b1b5cbbd40f6e13b9ec60ea073

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Zy0XO3MO.exe

        Filesize

        1.1MB

        MD5

        dbc81dd2d177f21c0efa183243eab182

        SHA1

        f8c2d9653ecf675c415f1c110fbbb4264cdd71c2

        SHA256

        b51d66ae508771254a82152385344321aed872e1bc2031794c9c694f67557ab8

        SHA512

        0d701e8eb216f91e7c37469d1ed14ae02a50b1b97b06af6c0bce897d50ff0abbaba4dbe0c16d60a65b96f95800e44122de790b80b8544e9167dfdb6535764ba2

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dw1Gh1Gm.exe

        Filesize

        755KB

        MD5

        b5d9cd6e58bbb7d84f6b83a19465ec44

        SHA1

        575a97f2382d3336903b9fccaf6c4bf28fd11272

        SHA256

        9baf0f8b90390b40b9a9e151ce79718366119edae7aa86f52e481fbcd46c77a4

        SHA512

        760afee60926a5c65672e21b2ec9adc9d7d6d236f452cea3875395e62ff9f3032d47e754eb1cc985d5f969aa27c7772340753d6be96c663035e80c417542e18c

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\yS3vD3QU.exe

        Filesize

        559KB

        MD5

        199a1bd042d4e947a6ebb877d9b34932

        SHA1

        b65d16fcb3ad8de31a2acd28ca4602baeeafc05f

        SHA256

        d460654883d8837075522877e480a1e992db4c7c44bcc4211c26ea98cef22c24

        SHA512

        cdc56b961e154d4314f0ef36aed447c6d983a5a8de9c1f608d4d4a4715db3bd866366adfc9ee24c231ea9b07c0c8c3b3bd67b7a8a6725a0f5390c84f9fcb2d41

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dV15Qf2.exe

        Filesize

        1.0MB

        MD5

        5248ac08e25309f143f7e90d8147e778

        SHA1

        35d1b321c1003a1bda2db4ea6c0ed1abb19549cf

        SHA256

        b66a3ca092b5f46a3862fb073dfea1b55a6f495cecb588e7342b1d6e27eef49b

        SHA512

        12699c32ae6a98c6f231b44c9357ebcc4aaf14cb66121a09a3735a9a7ffaecc5a48c23f2fb723adad8969483ec65c650207e62e27c69a3328b9bf5e4c009a151

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Bd101eP.exe

        Filesize

        222KB

        MD5

        bcdca1cb2121fa1ccbda6ce19e8d9161

        SHA1

        6cc9db289655ccb0a7c56f2db306c6349aace2d7

        SHA256

        7a1aba433bd35a1135932eb603b3dbf095238a4f76acd65f94ee2722402f056f

        SHA512

        5dfd9662303691257ed6d4ef5cceea276665c7579e6e638aa61ca2c2b0b2b286ee926540bde79435802209eec55c54282a955adbc66dff23cac2be8d241f8d37

      • memory/1732-42-0x0000000000EA0000-0x0000000000EDE000-memory.dmp

        Filesize

        248KB

      • memory/1732-43-0x0000000008130000-0x00000000086D4000-memory.dmp

        Filesize

        5.6MB

      • memory/1732-44-0x0000000007C20000-0x0000000007CB2000-memory.dmp

        Filesize

        584KB

      • memory/1732-45-0x0000000005220000-0x000000000522A000-memory.dmp

        Filesize

        40KB

      • memory/1732-46-0x0000000008D00000-0x0000000009318000-memory.dmp

        Filesize

        6.1MB

      • memory/1732-47-0x00000000086E0000-0x00000000087EA000-memory.dmp

        Filesize

        1.0MB

      • memory/1732-48-0x0000000007D50000-0x0000000007D62000-memory.dmp

        Filesize

        72KB

      • memory/1732-49-0x0000000007DE0000-0x0000000007E1C000-memory.dmp

        Filesize

        240KB

      • memory/1732-50-0x0000000007E20000-0x0000000007E6C000-memory.dmp

        Filesize

        304KB

      • memory/3416-38-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3416-36-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3416-35-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB