Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 10:23

General

  • Target

    f5659ff4e2e2c4f553f6a9f59f406907a29545e4ca9d61810be718d9619a8dff.exe

  • Size

    409KB

  • MD5

    528c55db5f8cbf3442a3729e685d9f0d

  • SHA1

    ba7ed8fcf8e39667743f812d9c5fa1d82d025f26

  • SHA256

    f5659ff4e2e2c4f553f6a9f59f406907a29545e4ca9d61810be718d9619a8dff

  • SHA512

    12c8b016e7b6ca2d357d2fc770ea72fdb195dce19357ec9acdc44fcfd5cd808474a88eef2c7ef39c93a468ddbddf371993d02c43175ea4546086ca4863751221

  • SSDEEP

    6144:Kry+bnr+Vp0yN90QEXnD5+uPpwDYJAQEf2vFn8wRVVl/DFLblDH/:9Mrhy90j+Mof2J8wP3FVDf

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5659ff4e2e2c4f553f6a9f59f406907a29545e4ca9d61810be718d9619a8dff.exe
    "C:\Users\Admin\AppData\Local\Temp\f5659ff4e2e2c4f553f6a9f59f406907a29545e4ca9d61810be718d9619a8dff.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1lC31zb8.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1lC31zb8.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2772
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 540
            4⤵
            • Program crash
            PID:3732
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2YI909rR.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2YI909rR.exe
        2⤵
        • Executes dropped EXE
        PID:544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2772 -ip 2772
      1⤵
        PID:888
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4116 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:2680

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1lC31zb8.exe
          Filesize

          340KB

          MD5

          ec3819defcb1def0479459a07cf02070

          SHA1

          0d46c5bab631e6a66bf617d8f92cfb4fe36ea2ed

          SHA256

          c91e019691a909fc6499991d551db9fbdbb7880e596a2d078a0b9e1bc6e58092

          SHA512

          60f4cb6ec74df86d3ffde51e09968297d5a9277f58d4829b53e07e4d49b5500a7a08ba2ef35326388daad158b2608bdd3591ad98e793934a3c8be6a8dea839d3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2YI909rR.exe
          Filesize

          222KB

          MD5

          71bbd8e9a4a2bd30862e98336d976a81

          SHA1

          eb3e0c9368f8ac4611e6ea409217a5cdb6363bf1

          SHA256

          1fb936858df4cadd7fba4393ffc5b9e8872eeb8b3dc63139bda3665d0066f040

          SHA512

          c9c901affe493166c1a1a16409a2e8f09d2f9c649722ad6ad115540fade1b4bcff19286c35cc76a2ca62316d940277939a3e4ec45f0ef43faba5e56cf90b4dd3

        • memory/544-21-0x0000000008780000-0x0000000008D98000-memory.dmp
          Filesize

          6.1MB

        • memory/544-20-0x00000000078B0000-0x00000000078BA000-memory.dmp
          Filesize

          40KB

        • memory/544-27-0x0000000074250000-0x0000000074A00000-memory.dmp
          Filesize

          7.7MB

        • memory/544-26-0x000000007425E000-0x000000007425F000-memory.dmp
          Filesize

          4KB

        • memory/544-15-0x000000007425E000-0x000000007425F000-memory.dmp
          Filesize

          4KB

        • memory/544-16-0x0000000000930000-0x000000000096E000-memory.dmp
          Filesize

          248KB

        • memory/544-17-0x0000000007BB0000-0x0000000008154000-memory.dmp
          Filesize

          5.6MB

        • memory/544-18-0x00000000076B0000-0x0000000007742000-memory.dmp
          Filesize

          584KB

        • memory/544-19-0x0000000074250000-0x0000000074A00000-memory.dmp
          Filesize

          7.7MB

        • memory/544-25-0x0000000008270000-0x00000000082BC000-memory.dmp
          Filesize

          304KB

        • memory/544-24-0x0000000007B30000-0x0000000007B6C000-memory.dmp
          Filesize

          240KB

        • memory/544-22-0x0000000008160000-0x000000000826A000-memory.dmp
          Filesize

          1.0MB

        • memory/544-23-0x0000000007AD0000-0x0000000007AE2000-memory.dmp
          Filesize

          72KB

        • memory/2772-7-0x0000000000400000-0x0000000000432000-memory.dmp
          Filesize

          200KB

        • memory/2772-11-0x0000000000400000-0x0000000000432000-memory.dmp
          Filesize

          200KB

        • memory/2772-8-0x0000000000400000-0x0000000000432000-memory.dmp
          Filesize

          200KB

        • memory/2772-9-0x0000000000400000-0x0000000000432000-memory.dmp
          Filesize

          200KB