Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 16:40

General

  • Target

    a49c96afc3e1c86dfaa9e2002f5ce95dbdee44cf71bf78474eaa2ab199a57f92.exe

  • Size

    879KB

  • MD5

    7a5928cb075392ea164a53fdd5b3afd0

  • SHA1

    2f29f7ea3d22abe93dcbe754afd698abff05bede

  • SHA256

    a49c96afc3e1c86dfaa9e2002f5ce95dbdee44cf71bf78474eaa2ab199a57f92

  • SHA512

    fef6e2d27d5bee66733ca4aad9115e3117f85d6d7e2f9c82cd9b41e1e0a63d8be04155931c06dcb556e6612ab675e135fc580c09d21e0f08820ff0173878dd26

  • SSDEEP

    12288:DMroy90mBIeotMtXS+V3ROZtmWy0jZlcQyuTSWN/4zhr+Dn2h8iDFobRhjin:zylDiI3RLWN/6Jin25DGbRdin

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a49c96afc3e1c86dfaa9e2002f5ce95dbdee44cf71bf78474eaa2ab199a57f92.exe
    "C:\Users\Admin\AppData\Local\Temp\a49c96afc3e1c86dfaa9e2002f5ce95dbdee44cf71bf78474eaa2ab199a57f92.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nM5BX0Vg.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nM5BX0Vg.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xC6GG2NC.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xC6GG2NC.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1pn58wd0.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1pn58wd0.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:1676
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 156
              5⤵
              • Program crash
              PID:772
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2sx258dC.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2sx258dC.exe
            4⤵
            • Executes dropped EXE
            PID:1892
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1628 -ip 1628
      1⤵
        PID:3892

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nM5BX0Vg.exe

        Filesize

        585KB

        MD5

        5d84d9a040ed7079a5f434a6ce732b3a

        SHA1

        cb19095e05db97c07ba869b998619f2aabc2332d

        SHA256

        03b76d8af28aac08a86fdc89e0b8482cab7a4ecd37706b3c56f86000e14edb3d

        SHA512

        05e64a1327d4e269b214aff7f0f1132486ec5a49bbb885d124094fb66b0a9a35d889b22dd3a3e49ee40bc022ea86c39a8e5b57191cb04b0a30439f112d0e2a78

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xC6GG2NC.exe

        Filesize

        412KB

        MD5

        1b00caa89398f68407087c99a0d32d96

        SHA1

        c1dc0ac4a5832700a212d3fd2fb370382e982614

        SHA256

        7767d060b1bb37706be1320ee7f7e2398bfb9193575d4a808c65fed5c91cc24b

        SHA512

        b9688fa1022eb95e3aa3c81b0748d24e890b1ed424474670afb014f89d921102e96941d2b90343c621316abfba395bef5a45651bd924692df833401040c069d8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1pn58wd0.exe

        Filesize

        378KB

        MD5

        bd073e92f856923e750c1d02212f56f3

        SHA1

        744aa3395344c898e9fd30aeec2f2a75a3cb74b6

        SHA256

        687820b69c61268f3a3546bfc37dd897d2ea377f936a939f4c26841d988bbf4a

        SHA512

        01a8ffdcc82fc76ed557beced540990da15671196a67abd49d12ddfed23af9a2227e3f7ae8d606b30a3b97f3d9e3ea46ee703fbaf154f676b428f909a3de9bd3

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2sx258dC.exe

        Filesize

        221KB

        MD5

        2a9b435a6ed3bdcc18c637b434031073

        SHA1

        c07d300a9c4688ea672ace565ac7de4fee9479a7

        SHA256

        592e3fba0f4b0c4ab97e41afd0340187b6ab373b4bdf567cdb4d43da84cd50d2

        SHA512

        f0a3e64d6759a4ae6bd404ccf93d5d41094e1333ffc650b0804e9a98b8e341c238f670569ecd920eea708b23fe830c18f62179c9cc8d4e10ba3a4b953076897b

      • memory/1676-21-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1676-24-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1676-22-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1892-29-0x0000000008230000-0x00000000087D4000-memory.dmp

        Filesize

        5.6MB

      • memory/1892-28-0x0000000000E90000-0x0000000000ECE000-memory.dmp

        Filesize

        248KB

      • memory/1892-30-0x0000000007C80000-0x0000000007D12000-memory.dmp

        Filesize

        584KB

      • memory/1892-31-0x00000000052C0000-0x00000000052CA000-memory.dmp

        Filesize

        40KB

      • memory/1892-32-0x0000000008E00000-0x0000000009418000-memory.dmp

        Filesize

        6.1MB

      • memory/1892-33-0x0000000008090000-0x000000000819A000-memory.dmp

        Filesize

        1.0MB

      • memory/1892-34-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

        Filesize

        72KB

      • memory/1892-35-0x0000000008000000-0x000000000803C000-memory.dmp

        Filesize

        240KB

      • memory/1892-36-0x0000000008040000-0x000000000808C000-memory.dmp

        Filesize

        304KB