Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 10:44

General

  • Target

    c901122f0065d9da89857ec8341cf2ffba9fd5fd9ac4717e138a6b96c776b070.exe

  • Size

    756KB

  • MD5

    4ef3c5ba8894158b3f0101b9512780c7

  • SHA1

    777a91e9ab90e77abc4dfef4a88eb3100ddb8a3e

  • SHA256

    c901122f0065d9da89857ec8341cf2ffba9fd5fd9ac4717e138a6b96c776b070

  • SHA512

    406bed536404945e076c2cf46961ab6a2992f369e2cf6e2d010eb09ae92edcd190db68416dc0c20d3fe5a3482c8133b86b72374d17384f902ee53d87c21ce4f7

  • SSDEEP

    12288:xMrwy90Tj5ffrOfwsAJ+s6DMeL6h0AY0FOCHhhdZweQfq4iee1Tvax:Ryi4Is7sTeL6h/Y23BXZwxfe2x

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c901122f0065d9da89857ec8341cf2ffba9fd5fd9ac4717e138a6b96c776b070.exe
    "C:\Users\Admin\AppData\Local\Temp\c901122f0065d9da89857ec8341cf2ffba9fd5fd9ac4717e138a6b96c776b070.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mq6WM9Wn.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mq6WM9Wn.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1VL84Er7.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1VL84Er7.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3788
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:3136
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:4224
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 184
                5⤵
                • Program crash
                PID:3472
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Ci447Sn.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Ci447Sn.exe
            3⤵
            • Executes dropped EXE
            PID:2952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4224 -ip 4224
        1⤵
          PID:2272

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mq6WM9Wn.exe

          Filesize

          560KB

          MD5

          772fc542ce9e4bfbe2039c823816e3fe

          SHA1

          132cdd72bce7904bd08b5a045b94d1a506e11b2e

          SHA256

          6739c06a028feb657682357ea322c0dee5a1c0b0955dfc1ff63c3a96b21d8718

          SHA512

          e6ac6ae44d3ac10bf6058fc189c923d4036940de64bb89ef2a38f0b1f14f85a953e49e6b1a4285fc5ae7c4658158bca660e9e7fec3b6a3832d0b4452808291bc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1VL84Er7.exe

          Filesize

          1.0MB

          MD5

          7a0135fe2bad0e99d46b47f4af33d76f

          SHA1

          0b62194c52978717d516bf04df877ddf80c600ea

          SHA256

          7322bacd181e869925f6e69e1beb6d93e8506e6e7c849f47f5acca7736ae01d0

          SHA512

          f8dc3479204950065698946bf857068a713ef0d05b66dec3e0c8e6877792824db3656d7cbdcb9dde50a1c5aeb4d1543ec630b2085747f2e59b69bd1b08d93ca4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Ci447Sn.exe

          Filesize

          222KB

          MD5

          e0118708431baaa2812a3d4c651c003d

          SHA1

          56d3aa1cb1e35de549535b392887f4bf5e2705c1

          SHA256

          99dcfc46702f92d9c1f9ca4084c3fd6097df0e241a4fec598a555cae56363ed9

          SHA512

          52f578b88d182fa996aa0ce59c407d72b0f2b54a7bf14253552faeeb874656189b1ded9734bd8be876e690ae374e4e4a11e223e241e33501a394dab256d30be9

        • memory/2952-27-0x0000000007320000-0x000000000742A000-memory.dmp

          Filesize

          1.0MB

        • memory/2952-22-0x0000000000210000-0x000000000024E000-memory.dmp

          Filesize

          248KB

        • memory/2952-23-0x00000000074C0000-0x0000000007A64000-memory.dmp

          Filesize

          5.6MB

        • memory/2952-24-0x0000000006FB0000-0x0000000007042000-memory.dmp

          Filesize

          584KB

        • memory/2952-25-0x0000000002530000-0x000000000253A000-memory.dmp

          Filesize

          40KB

        • memory/2952-26-0x0000000008090000-0x00000000086A8000-memory.dmp

          Filesize

          6.1MB

        • memory/2952-28-0x00000000071C0000-0x00000000071D2000-memory.dmp

          Filesize

          72KB

        • memory/2952-29-0x0000000007220000-0x000000000725C000-memory.dmp

          Filesize

          240KB

        • memory/2952-30-0x0000000007260000-0x00000000072AC000-memory.dmp

          Filesize

          304KB

        • memory/4224-18-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4224-15-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4224-16-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4224-14-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB