Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:29

General

  • Target

    a261c92b0b446427af23fff63de38b1bb4489b888aac5ae088afbe7c6f827c5a.exe

  • Size

    1.2MB

  • MD5

    ea5a087c245b19dca3060424ceeb20cb

  • SHA1

    acd89091e8e6a88a660f8148e18014909e01cbdd

  • SHA256

    a261c92b0b446427af23fff63de38b1bb4489b888aac5ae088afbe7c6f827c5a

  • SHA512

    43684dea22127c5a3954077fb562eb7fc862302b8e23b8d0c4385cdaf4b2870589a62e0d53435a38d0a3e8f95c7540d58e972559581cfd3837e9fc588e3439c6

  • SSDEEP

    24576:4yaKZsgacS0JNKedv2onMdoygB6B0muVQMa4LtlSNiVupM:/hsgacS03KEuoYoHhmu/a4xlS

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a261c92b0b446427af23fff63de38b1bb4489b888aac5ae088afbe7c6f827c5a.exe
    "C:\Users\Admin\AppData\Local\Temp\a261c92b0b446427af23fff63de38b1bb4489b888aac5ae088afbe7c6f827c5a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yB3il5TU.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yB3il5TU.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pi8xO5cg.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pi8xO5cg.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hL5Kw3Ll.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hL5Kw3Ll.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:672
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\WS6lv4zQ.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\WS6lv4zQ.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4972
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dB90go9.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dB90go9.exe
              6⤵
              • Executes dropped EXE
              PID:1892
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lh658YQ.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lh658YQ.exe
              6⤵
              • Executes dropped EXE
              PID:4148
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4048,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:8
    1⤵
      PID:5100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yB3il5TU.exe

      Filesize

      1.1MB

      MD5

      96085fd8bf620f23f0921649701dbfc3

      SHA1

      14108f6ac7b35c4b05d4aa057899de19eaa79e40

      SHA256

      2d326a19cf31d2cd90f6136c5001b6c4ebb04666710ba630e77521fa76930885

      SHA512

      bb8d1d6df99296b2797d7c9c01e2bd6ab15e2c46dd296d3032f28a1f276ab78f8fcd2df78c3d05a7aa29358c31dfa33a7a234150ad66a9077866fdc74a88965a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Pi8xO5cg.exe

      Filesize

      926KB

      MD5

      f0b4d25910eb7f5ffa4677bc4b31801c

      SHA1

      aae7f545ce74669c28c1f88c8469bfa0fa560ebd

      SHA256

      e5af4a340b7d5bdfdc93d5164ea8f6d834472de845ee868a93af8ea06595bee8

      SHA512

      4b977b6a6c86824d6f7d762c54e775447a676d6de08aeb42ddae512ba8104b072383891864b2e3599d4f2658ea5d39178068006a4120e9da96647be63fb0654d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hL5Kw3Ll.exe

      Filesize

      514KB

      MD5

      249ff9155d577cb12fdbb534565ea04c

      SHA1

      b95de00dee3eeb073f9b9202922e78d3d6517142

      SHA256

      71f54c3a517f08e1d847f8906bc6197cc5a92a8b26df50557b3e05f579bca21f

      SHA512

      27b32db4a4185fd9596981ff712092a8a359d88da9247f3cef2ac4c3238d8477a4c2296a30aa479147bd75dfdfe5abae796d4151a9cdaaea7704906d76d24de1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\WS6lv4zQ.exe

      Filesize

      319KB

      MD5

      c2c23f0f3d5763d5a4d208a378dd6957

      SHA1

      255ab1e23775fe39fa06b85a50f66e8853b5749f

      SHA256

      003e9b419d92c68dac183f27514552147e15b2a34181caa412f0aec00f9b7bf7

      SHA512

      8bf525b3bf59637c1bae025d1ba39896d3b01900d8dc6645d633cbf4dc3ea942d0885e5ac421a4e910bee9c77cb1fba80f23892aa2c529ec874045c52ead55ce

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dB90go9.exe

      Filesize

      180KB

      MD5

      3f305144feb3040cf41b216841537ec2

      SHA1

      ae9066cc3b40be6250e7e6a90bcc2de160067b84

      SHA256

      89fec546032f1fc58fb08e79ab626d7e2401a5958b81a928ab5e0c1540e180b1

      SHA512

      ca3993ad5d0a376809e304a49eaf81c8ba3ecbe40e7085573698b1870291034f9bbfdec552b640b32d92b2f0b359f33c40f694f401abaf81d70ab7a6484a798e

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lh658YQ.exe

      Filesize

      221KB

      MD5

      278a8dd873cd7c46439078dca89131ad

      SHA1

      8bf9c0e0ecabb7d4d46d341c429712db31d04f2c

      SHA256

      8fdff28c1c8bfd963d80539f72f979a503fc5fc0764b488ae9425258c04c6676

      SHA512

      8fdd5e67c8dcf495faa02f86903e1654a00967fc1407fac14a877bc0a2182fb6f94e3360707614f8c6ab4425a22d501dd5cdb2028000b3e0c6b2d31ee9f30b92

    • memory/4148-38-0x0000000000C40000-0x0000000000C7E000-memory.dmp

      Filesize

      248KB

    • memory/4148-39-0x0000000007F70000-0x0000000008514000-memory.dmp

      Filesize

      5.6MB

    • memory/4148-40-0x0000000007A60000-0x0000000007AF2000-memory.dmp

      Filesize

      584KB

    • memory/4148-41-0x0000000002F90000-0x0000000002F9A000-memory.dmp

      Filesize

      40KB

    • memory/4148-42-0x0000000008B40000-0x0000000009158000-memory.dmp

      Filesize

      6.1MB

    • memory/4148-43-0x0000000007E20000-0x0000000007F2A000-memory.dmp

      Filesize

      1.0MB

    • memory/4148-44-0x0000000007C00000-0x0000000007C12000-memory.dmp

      Filesize

      72KB

    • memory/4148-45-0x0000000007C60000-0x0000000007C9C000-memory.dmp

      Filesize

      240KB

    • memory/4148-46-0x0000000007CA0000-0x0000000007CEC000-memory.dmp

      Filesize

      304KB