Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 17:24

General

  • Target

    7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe

  • Size

    417KB

  • MD5

    b3e27bc42c0d400f58083d243e52976b

  • SHA1

    dfb89f92eaf181b6e424c0752c4a50edb99eb6bf

  • SHA256

    7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461

  • SHA512

    43cdcf38bc097faf2979f7d080aa701b332ada3db6b24720b60c357cf1dc5125517ddd22a55774cada98be57b309a32d6e77fa3b35e536444585943cae5a66f1

  • SSDEEP

    6144:K0y+bnr+Gp0yN90QEx6uFCuzf8i/mEPtm+aiGEaC9c2fWNU1:wMrGy90bjCuLl/mEVm1iVrTQK

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe
    "C:\Users\Admin\AppData\Local\Temp\7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1nD90NV6.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1nD90NV6.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3516
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:1972
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 540
            4⤵
            • Program crash
            PID:4996
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 152
          3⤵
          • Program crash
          PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2DE995oj.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2DE995oj.exe
        2⤵
        • Executes dropped EXE
        PID:540
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3516 -ip 3516
      1⤵
        PID:2720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1972 -ip 1972
        1⤵
          PID:3404

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1nD90NV6.exe
          Filesize

          378KB

          MD5

          f0831f173733de08511f3a0739f278a6

          SHA1

          06dc809d653c5d2c97386084ae13b50a73eb5b60

          SHA256

          8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

          SHA512

          19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2DE995oj.exe
          Filesize

          231KB

          MD5

          7286367aae7c7200b7d3449ce31b2470

          SHA1

          a495381377b250c8fcf005c03e7caaeaed97bf72

          SHA256

          1586e3f814e6bde402145046600ca3ce31517ad77a4627b685b1b372604798b8

          SHA512

          e584a51dad1ca213ef3307eb4c349f210829f6e53b2f2ecb4fdc8f9001e1363e74af316dadb208efe6ad457088e3bbcd0dfeeeaafce19284bd669b9928d21335

        • memory/540-21-0x0000000008020000-0x0000000008638000-memory.dmp
          Filesize

          6.1MB

        • memory/540-19-0x0000000004470000-0x000000000447A000-memory.dmp
          Filesize

          40KB

        • memory/540-27-0x0000000074940000-0x00000000750F0000-memory.dmp
          Filesize

          7.7MB

        • memory/540-26-0x000000007494E000-0x000000007494F000-memory.dmp
          Filesize

          4KB

        • memory/540-15-0x000000007494E000-0x000000007494F000-memory.dmp
          Filesize

          4KB

        • memory/540-16-0x0000000000150000-0x000000000018E000-memory.dmp
          Filesize

          248KB

        • memory/540-17-0x0000000007450000-0x00000000079F4000-memory.dmp
          Filesize

          5.6MB

        • memory/540-18-0x0000000006F40000-0x0000000006FD2000-memory.dmp
          Filesize

          584KB

        • memory/540-20-0x0000000074940000-0x00000000750F0000-memory.dmp
          Filesize

          7.7MB

        • memory/540-22-0x0000000007200000-0x000000000730A000-memory.dmp
          Filesize

          1.0MB

        • memory/540-25-0x00000000071B0000-0x00000000071FC000-memory.dmp
          Filesize

          304KB

        • memory/540-23-0x0000000007110000-0x0000000007122000-memory.dmp
          Filesize

          72KB

        • memory/540-24-0x0000000007170000-0x00000000071AC000-memory.dmp
          Filesize

          240KB

        • memory/1972-9-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/1972-8-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/1972-11-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/1972-7-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB