Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 16:40

General

  • Target

    eb8cedd00b7ab240f275eb4069c500fbebe244ecae84cca8f1700815583b7f3b.exe

  • Size

    884KB

  • MD5

    a2acde444a301a3c84598b3fb8c6c4da

  • SHA1

    cadafcf1e96bac636ff9d5da45cc79b62864aa0f

  • SHA256

    eb8cedd00b7ab240f275eb4069c500fbebe244ecae84cca8f1700815583b7f3b

  • SHA512

    9242447c31e6be528f2fa050f18aa607428e49d2b572cd797adbf43f38dced96c5ca16fd6b0581b17fc0a9406199e481faa99150cb9e646578672561bf00285f

  • SSDEEP

    12288:fMr/y90MTkylNO613IvNm1n3Or+tJYiF/ZvpP1A8Q27IOS9HHMAd:gyndU61D1n3Or+XBZJ1A897PS9HsAd

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb8cedd00b7ab240f275eb4069c500fbebe244ecae84cca8f1700815583b7f3b.exe
    "C:\Users\Admin\AppData\Local\Temp\eb8cedd00b7ab240f275eb4069c500fbebe244ecae84cca8f1700815583b7f3b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sk0aN7Be.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sk0aN7Be.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Er3iM5Xh.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Er3iM5Xh.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1DW33ET8.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1DW33ET8.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1064
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:1888
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 156
              5⤵
              • Program crash
              PID:3452
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2NM322Sp.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2NM322Sp.exe
            4⤵
            • Executes dropped EXE
            PID:660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1064 -ip 1064
      1⤵
        PID:5084

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sk0aN7Be.exe

        Filesize

        590KB

        MD5

        96ff283c100efaf89094a618113c3709

        SHA1

        122c103d15556a781d48287472e4d4c3f6b3b598

        SHA256

        43b3cda3f8e1cb5920a61bcaa710e0b426336360d614795ba231cb3c4c424868

        SHA512

        e6179959cae3675f496bd887bc829a662f3834f5004e83f7fb65f768f155c8cb51fa5cea757ec666ed038c94f5fb87d630d43bc084f395c17962da59426712c9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Er3iM5Xh.exe

        Filesize

        417KB

        MD5

        f5fe73580e6061b453e5e52c1b4d1fe2

        SHA1

        e29ff7c20633ba5b052d7bc24e3c056783af2f77

        SHA256

        299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059

        SHA512

        40e96b896ae52e76ce5ed33cb5f68548b2bef2232721eecb2a2becb6f1523dd786778fd5bf454ef51727a755cb5959f69548139232f4cecb84941a3edb319977

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1DW33ET8.exe

        Filesize

        378KB

        MD5

        f0831f173733de08511f3a0739f278a6

        SHA1

        06dc809d653c5d2c97386084ae13b50a73eb5b60

        SHA256

        8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

        SHA512

        19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2NM322Sp.exe

        Filesize

        231KB

        MD5

        9b9cbc983e6c062582f117df47db53c5

        SHA1

        b8ff60c1b709e1f170db8ad7d7197ebadff4dbe6

        SHA256

        6653c670b9c5df02e2ce27619d5881b7ccfa6e4b1927f0b8f062243857204e61

        SHA512

        10532de95cbe17e2c8511f94479b725dab2a4806c380d3d3d856ae5033b109c61b64de7947205859a38dd09fcb47fbd378ff1e29a8237070a471735bf47a27d9

      • memory/660-33-0x0000000007840000-0x000000000794A000-memory.dmp

        Filesize

        1.0MB

      • memory/660-28-0x00000000005F0000-0x000000000062E000-memory.dmp

        Filesize

        248KB

      • memory/660-29-0x0000000007A00000-0x0000000007FA4000-memory.dmp

        Filesize

        5.6MB

      • memory/660-30-0x00000000074F0000-0x0000000007582000-memory.dmp

        Filesize

        584KB

      • memory/660-31-0x0000000002A40000-0x0000000002A4A000-memory.dmp

        Filesize

        40KB

      • memory/660-32-0x00000000085D0000-0x0000000008BE8000-memory.dmp

        Filesize

        6.1MB

      • memory/660-34-0x00000000076E0000-0x00000000076F2000-memory.dmp

        Filesize

        72KB

      • memory/660-35-0x0000000007770000-0x00000000077AC000-memory.dmp

        Filesize

        240KB

      • memory/660-36-0x00000000077B0000-0x00000000077FC000-memory.dmp

        Filesize

        304KB

      • memory/1888-23-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1888-24-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1888-21-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB