Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 17:09

General

  • Target

    33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe

  • Size

    676KB

  • MD5

    6ea43c8e5b1d3b17b6d2d71d0bd0cdec

  • SHA1

    5a6f7a99bc6a9840aa31451dafcd144ec3cc489d

  • SHA256

    33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112

  • SHA512

    db8a7808792a78cb89a0b6242716716c41b2308689044217a61566d60c3dd46321084fd6bb0de4e6b18b407dfefb4fa9f4bf0579b8b8ce7447998a43b851c21e

  • SSDEEP

    12288:aMrry90cgmNkHi8m+nZ/82eM3keLcDriiD6b9RXLKZ6MpXg:lybgmNkHi8mMZ02eM3sD6HXm9Vg

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe
    "C:\Users\Admin\AppData\Local\Temp\33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1hz03Sj5.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1hz03Sj5.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:5060
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 540
            4⤵
            • Program crash
            PID:2676
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 596
          3⤵
          • Program crash
          PID:2408
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2mc488HD.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2mc488HD.exe
        2⤵
        • Executes dropped EXE
        PID:1412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5060 -ip 5060
      1⤵
        PID:4580
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2416 -ip 2416
        1⤵
          PID:936
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4204,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:8
          1⤵
            PID:804

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1hz03Sj5.exe

            Filesize

            1.8MB

            MD5

            dc1c6fa652a52fb006b7a929d2249b93

            SHA1

            455db2bc6d939bc5eb5879eab0730f442c870fc6

            SHA256

            78a1d500a9fd4aac344c93564216a43d1c98220c5762792c0d82600c55ef9759

            SHA512

            27cd8db2ecd6262b0d850cef2ea37c9feb283db13390f6b6ff1dd2de113110acfa0896b088989d38839e0bc399cf44bd349aa6cd8905c74c91c5e27e8d4813b3

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2mc488HD.exe

            Filesize

            221KB

            MD5

            db7203a9375c2b8b5cab4c6c4d6fefda

            SHA1

            7871e092ca9cbea13519947eaee8a09b79be158b

            SHA256

            a425c03504e12badf047ca49990bb8f1b025ee56a2ebdd4a2fbdbe93c979f5b2

            SHA512

            06c448b381360e5809d9f42c615d98880f77b0457d08f038a3b12ad84a335133826c3a4bc2993fcc4088a224fed9c3a0f1482790e814611d0277259eb8d9fb50

          • memory/1412-21-0x0000000008610000-0x0000000008C28000-memory.dmp

            Filesize

            6.1MB

          • memory/1412-20-0x0000000073BE0000-0x0000000074390000-memory.dmp

            Filesize

            7.7MB

          • memory/1412-27-0x0000000073BE0000-0x0000000074390000-memory.dmp

            Filesize

            7.7MB

          • memory/1412-26-0x0000000073BEE000-0x0000000073BEF000-memory.dmp

            Filesize

            4KB

          • memory/1412-15-0x0000000073BEE000-0x0000000073BEF000-memory.dmp

            Filesize

            4KB

          • memory/1412-16-0x0000000000730000-0x000000000076E000-memory.dmp

            Filesize

            248KB

          • memory/1412-17-0x0000000007A40000-0x0000000007FE4000-memory.dmp

            Filesize

            5.6MB

          • memory/1412-18-0x0000000007530000-0x00000000075C2000-memory.dmp

            Filesize

            584KB

          • memory/1412-19-0x0000000002A10000-0x0000000002A1A000-memory.dmp

            Filesize

            40KB

          • memory/1412-25-0x00000000076C0000-0x000000000770C000-memory.dmp

            Filesize

            304KB

          • memory/1412-24-0x0000000007650000-0x000000000768C000-memory.dmp

            Filesize

            240KB

          • memory/1412-22-0x0000000007920000-0x0000000007A2A000-memory.dmp

            Filesize

            1.0MB

          • memory/1412-23-0x00000000075F0000-0x0000000007602000-memory.dmp

            Filesize

            72KB

          • memory/5060-11-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/5060-8-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/5060-9-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/5060-7-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB