Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 10:44

General

  • Target

    88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe

  • Size

    1.5MB

  • MD5

    51dc5e34d011caff999a1f9ee1549a4a

  • SHA1

    f8cf9142d4e52a2f35ce87202cc95c71016dcf6f

  • SHA256

    88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab

  • SHA512

    f0986389d9aa09199f4ba6a1088a304df62b2d52c7a1c8e17f927fab92d31fdce3fe2c76d633d82c7a09dbda2653ac5d5e15314a89c8f1835c312127aca22c76

  • SSDEEP

    24576:aywkbZuL+gpeuXhFjOtq6wl5OupT6bwD1pih875p/o6s25fdizMKpfGAyRIC72R1:hwq0TLhZOtfwl5Ehop1Bq0SvlwOf

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe
    "C:\Users\Admin\AppData\Local\Temp\88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hn5vV4JF.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hn5vV4JF.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uy2ZC2Dk.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uy2ZC2Dk.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aJ3Ei1Ez.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aJ3Ei1Ez.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kV4qy8Qb.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kV4qy8Qb.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4968
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Bt35dj2.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Bt35dj2.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1488
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:4696
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2dT447iM.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2dT447iM.exe
                6⤵
                • Executes dropped EXE
                PID:4544

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hn5vV4JF.exe
      Filesize

      1.3MB

      MD5

      a2cc7fa1c178a1457b6d2b8e517a2781

      SHA1

      efab073cf57bb1eddc71554458f068e704e6f386

      SHA256

      bf822462b12c552fed689013622b5845dbf31498ac4a863b9d3d4d476fb9f270

      SHA512

      14bb8f965b8861c0788d14987ad180520d62d76588dcd14398b23963e7d575ac585757c188a6d4b9366ba7b4d31bedfb348eccc60a42e91f8f7a15fd404ce16f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uy2ZC2Dk.exe
      Filesize

      1.2MB

      MD5

      e579c75924c9f5d08fbece532e8d0afa

      SHA1

      36c0c08bd0ecceb038c3369b956f267da2743914

      SHA256

      cc0aa5fa646d545cb05c8f5ca53b119cdf6180f17ba43d794c00286f1bb60360

      SHA512

      dfe2d3b72b3efbdeae2121c0ed4f2f364b51243ec723591261846bf1673a2d4b7858d8427e8506e868d51a99d9bb63d3bb9e53091767acca18d076d9af4a0f82

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\aJ3Ei1Ez.exe
      Filesize

      761KB

      MD5

      3d949b70f76752350a9742cdedbda663

      SHA1

      be6e5914404cc0c0fb6411cadcd3dc203688ede3

      SHA256

      b2a65e0922cfd657a813e853698b272312f58fd06b937189def4c0689143e1da

      SHA512

      e06b6b3a78307a939a33edd7fe68d5a69716d6761cbcdcc7a6903067fa0a233b7748ed7ab39468b59c899d172e81bbbb0ab38e3f74dd2a77affb1bb0015601a7

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kV4qy8Qb.exe
      Filesize

      565KB

      MD5

      fd691783982a2f2a5c31aba5a5901a64

      SHA1

      0219be6588855b2d48aa255cf4be2f72aded1eb6

      SHA256

      6a35128f0d1f3e3a237d5adb39b0df1d473d5a7f44d3cb7697a049d28a4966d0

      SHA512

      70fbee4ef581e9de2aa8065db830c5acd1ae88e9758b554ad79bd6b48584100ff7531e72654066fc46c4cccbf745a22174a506231a2f32ee5d86d7354537882a

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Bt35dj2.exe
      Filesize

      1.1MB

      MD5

      5f6389b3bfedf445bf8c10b650709a6f

      SHA1

      6c8df73cb68c87cf1fd93fcc02a504f2de12ef86

      SHA256

      ff8242ce5ba9502c0028b4a9fb619503b53337901e872f170bbf029ef5cf1227

      SHA512

      1aff1570f4882924cb1eb5b7a02e01f8443cd6889c11e5ec7427268dd9d300a76d32002a4af116028a48530b839ec255a785426616d499ab6efa8997b10b6efa

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2dT447iM.exe
      Filesize

      221KB

      MD5

      95f4d33d29cb808ce4bf3feefb475294

      SHA1

      177b8c747d4b24b3c47c81be2d31061fc730c022

      SHA256

      534de3c596a43eec549487e24a1b5f4e0cb6754430c6d89d8e0c637644e57a8b

      SHA512

      d514fec869470f04a7a066e67e1d48fc98fda7908fdaa69d34525bc7a250cad8a57d93a35e1c6ea09976f1c3b92310db7d1746439a6cfc21348dfdc5ce952bb0

    • memory/4544-42-0x0000000000420000-0x000000000045E000-memory.dmp
      Filesize

      248KB

    • memory/4544-43-0x0000000007760000-0x0000000007D04000-memory.dmp
      Filesize

      5.6MB

    • memory/4544-44-0x0000000007250000-0x00000000072E2000-memory.dmp
      Filesize

      584KB

    • memory/4544-45-0x0000000004750000-0x000000000475A000-memory.dmp
      Filesize

      40KB

    • memory/4544-46-0x0000000008330000-0x0000000008948000-memory.dmp
      Filesize

      6.1MB

    • memory/4544-47-0x0000000007D10000-0x0000000007E1A000-memory.dmp
      Filesize

      1.0MB

    • memory/4544-48-0x0000000007410000-0x0000000007422000-memory.dmp
      Filesize

      72KB

    • memory/4544-49-0x00000000075A0000-0x00000000075DC000-memory.dmp
      Filesize

      240KB

    • memory/4544-50-0x00000000076E0000-0x000000000772C000-memory.dmp
      Filesize

      304KB

    • memory/4696-36-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/4696-38-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB

    • memory/4696-35-0x0000000000400000-0x0000000000434000-memory.dmp
      Filesize

      208KB