Analysis

  • max time kernel
    141s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 16:40

General

  • Target

    3513e5a1bef31ae0f1858b98a4a405bb6b73e0c22654ea595cfe351e68560d0b.exe

  • Size

    632KB

  • MD5

    8ea60cfcbddf1b7448d201f4556c7a20

  • SHA1

    d1ecb779d9b7a916c627c143646b17f8332ae03b

  • SHA256

    3513e5a1bef31ae0f1858b98a4a405bb6b73e0c22654ea595cfe351e68560d0b

  • SHA512

    589bbb1c61d27b82897d7b20246b7dc436b349e849157cd49b4dfc3aecf4917c04ae2a5bb5346c03532585b02e332a840f42f675002ee2fbf27df50dcbfe8cbc

  • SSDEEP

    12288:NMr0y90D2sd8jFNudzpwt4gelVvENE1CL3hErv1AP9:ZyycqZimXKE1CNEL1AP9

Malware Config

Extracted

Family

redline

Botnet

jokes

C2

77.91.124.82:19071

Attributes
  • auth_value

    fb7b36b70ae30fb2b72f789037350cdb

Signatures

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3513e5a1bef31ae0f1858b98a4a405bb6b73e0c22654ea595cfe351e68560d0b.exe
    "C:\Users\Admin\AppData\Local\Temp\3513e5a1bef31ae0f1858b98a4a405bb6b73e0c22654ea595cfe351e68560d0b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3648686.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3648686.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5762863.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5762863.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:408
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4701334.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4701334.exe
          4⤵
          • Executes dropped EXE
          PID:2028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4349609.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4349609.exe
          4⤵
          • Executes dropped EXE
          PID:3464
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3712 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2372

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3648686.exe
      Filesize

      530KB

      MD5

      ec64dae8c6ab85285cba66c2bd4f7678

      SHA1

      879deab6ab8a625588826befc5d2d24af7900a79

      SHA256

      b8646e9fed15d5e156655e490d81d2c43cea2d3222278cd00cfe244f606daa8d

      SHA512

      0bcf38962fbd7d0bed6b7281ec5b18bd671b71df7b975e248762f550ede6d02dfd116af9ca1eada4c5345469c5d991ff9c990321b118a9cd2dfc9b6a97ee4af6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5762863.exe
      Filesize

      272KB

      MD5

      6999331ecf0313d532d0a1ef67b5f909

      SHA1

      5d1127ce376182a7e061ad6e7874c40f0721fbde

      SHA256

      aca16bd1637b2077311aa031d85f29c8061c70d0b20407af58a0c9ba62d11439

      SHA512

      b58cd50abb54fff6ae8ca249f11cbcbb909ed1b791ee771800aa00ff6d6851b9a92aa8703f493916b470a71f1c43e6febbda5e56ce33c47fafc1e88b4cd605e2

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4701334.exe
      Filesize

      140KB

      MD5

      e9b49847444f0aad6df34e532a1184bb

      SHA1

      f4a5b8d8f97f1afee0f1d3e8b3a1b283a0cb0fab

      SHA256

      8a8f7acfb1a98c296a4cbbc00ff7ff5f88664c69a8b7231975f37deb63bfbe10

      SHA512

      93bc35576b7965b5a9e60fd263246493c218e85155ff7ef227947eb204aa58938153e5cc224642d08176a1de1b73155a9d2e95607a8c1e6225a3b9079b6257c0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4349609.exe
      Filesize

      174KB

      MD5

      d1272d9e16b2f4ffee6a2778db1fb5d4

      SHA1

      e261c467fba1c3191d49736e19047a793ca35c83

      SHA256

      489e55f13774c3192cc2ccc4069c8518af806647749b8306e16cbad8f4ca04bd

      SHA512

      75a61ce843f70dd6d1b5e211f4ea4ae5fceaeba6ee74d658a2c0f8cde8ecc1c2b600462611ed0bd8589436673148f1f6d9d48939c17a7fc726e7f6c4c2306126

    • memory/3464-24-0x0000000000FA0000-0x0000000000FD0000-memory.dmp
      Filesize

      192KB

    • memory/3464-25-0x0000000005780000-0x0000000005786000-memory.dmp
      Filesize

      24KB

    • memory/3464-26-0x000000000B410000-0x000000000BA28000-memory.dmp
      Filesize

      6.1MB

    • memory/3464-27-0x000000000AF50000-0x000000000B05A000-memory.dmp
      Filesize

      1.0MB

    • memory/3464-28-0x000000000AE90000-0x000000000AEA2000-memory.dmp
      Filesize

      72KB

    • memory/3464-29-0x000000000AEF0000-0x000000000AF2C000-memory.dmp
      Filesize

      240KB

    • memory/3464-30-0x000000000B060000-0x000000000B0AC000-memory.dmp
      Filesize

      304KB