Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:29

General

  • Target

    c15c0b27fca8b17175aa535d5bc1b804707b8bbce008e7a9e1fc93a2011ad5af.exe

  • Size

    1.1MB

  • MD5

    0d1dd7a94e962d7b64553270a85c57a8

  • SHA1

    6b9abace5d34f86ee5d25270de8e5eea80ef7d77

  • SHA256

    c15c0b27fca8b17175aa535d5bc1b804707b8bbce008e7a9e1fc93a2011ad5af

  • SHA512

    54ad8d11b34e5233017546434ffcf5af61a042e487191126ed686693d72b6404e46a975d48e539f89243bca88055f652d2e6a000b5ee2533adbae1e5be30db23

  • SSDEEP

    24576:yyCgoasgooeYfdvkUaLV9YCXMC7RgY51pZZeY/F33VCr2:Zhe0vk3jYC7RV51pTp34r

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c15c0b27fca8b17175aa535d5bc1b804707b8bbce008e7a9e1fc93a2011ad5af.exe
    "C:\Users\Admin\AppData\Local\Temp\c15c0b27fca8b17175aa535d5bc1b804707b8bbce008e7a9e1fc93a2011ad5af.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lr9AL7ND.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lr9AL7ND.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sr3gl1jM.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sr3gl1jM.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kx0Uh6jz.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kx0Uh6jz.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2876
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1mW98DO5.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1mW98DO5.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4580
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:3232
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:4692
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 608
                  6⤵
                  • Program crash
                  PID:2484
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2rS390Gi.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2rS390Gi.exe
                5⤵
                • Executes dropped EXE
                PID:1344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4580 -ip 4580
        1⤵
          PID:1412
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:4992

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Modify Registry

          1
          T1112

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lr9AL7ND.exe
            Filesize

            936KB

            MD5

            ded12efc64f4556da67c3e8eed142734

            SHA1

            4b440de562a13d0f6b7793c7c43b2bc29ce88a38

            SHA256

            e3486ae5cc2aad5fc00b767037ca5548dfa025f153bc18e1f1d1a136b157bf5c

            SHA512

            d745fb30fbb1b63f312eb199dad496c4f6840a569b4967aeeec35f30ff9a13033c87f5c89efe1834b5209d85816c3d2bdfd1ae53aa56e4d0474aeaccc200d050

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sr3gl1jM.exe
            Filesize

            640KB

            MD5

            0da56039b0d3d13d8d711bc15a4d340d

            SHA1

            3a0dcbd196ae32467d9bb7e7a71ed7fe994811fa

            SHA256

            a6406155c8f1d82546030362ab98c9c41996518a474aa26547b398ef88cbe423

            SHA512

            ee47c54f1f66e72cfd6130b4809365fc941d34e9ae0af706c31eacb3da57ed78c117089fbbec7ef82a72ea991b4306cb92a8c76d6ba3b2834ea7949f3bd10b9f

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kx0Uh6jz.exe
            Filesize

            444KB

            MD5

            42b5fac6a52dee3f30ac0cf9688ca0cb

            SHA1

            443e07baa5178f70ef1981f070ca7edbef3f037f

            SHA256

            56c90f296c99f48af75599697e12892896d35500fc2d59896ab7493cfa59b6d5

            SHA512

            51e2617a148bed005e1db09ebc5b24d60b0d3ffd662058d16f830c0fb1e3059e1e5f0bfb02ee1e9c5c310714d5b616162fa48428004cd44fb5c0ebb6d639e683

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1mW98DO5.exe
            Filesize

            423KB

            MD5

            843638948ed77d50f55c97fc25358a1c

            SHA1

            26a6597c806437a116217485f8f4787ffb22b19a

            SHA256

            4150ca48b7a924f8768e7d5864cb05d7ffdc8d22f34057f40f816491214c02d6

            SHA512

            ea32140ad7e902e568415cdebbceabbf56462b13de6c2624f368e5242ad385f207391065b21d58e32d1914d78120707d8a986299d18c2cc8997341d631d259c8

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2rS390Gi.exe
            Filesize

            221KB

            MD5

            4a1c95c5bee45ec414064451736322bb

            SHA1

            2fe500f9b9da8afc1d3357fcaf787e8a7a15fe6f

            SHA256

            3237394289316e4d82f9c24b4df1499aa9a7b4cd4ec36a30379eb5ccfb3cd693

            SHA512

            3ae856c16ddea7b6b72fe04d89b932d96ba3f59985ae0c2271d6bddcbbe5bce1bd5abd5e3a55636180b3d207abf084e60fd2937e918687432e43fbb017ca040b

          • memory/1344-39-0x00000000088B0000-0x0000000008EC8000-memory.dmp
            Filesize

            6.1MB

          • memory/1344-35-0x0000000000860000-0x000000000089E000-memory.dmp
            Filesize

            248KB

          • memory/1344-36-0x0000000007CE0000-0x0000000008284000-memory.dmp
            Filesize

            5.6MB

          • memory/1344-37-0x00000000077D0000-0x0000000007862000-memory.dmp
            Filesize

            584KB

          • memory/1344-38-0x0000000007780000-0x000000000778A000-memory.dmp
            Filesize

            40KB

          • memory/1344-40-0x0000000007B40000-0x0000000007C4A000-memory.dmp
            Filesize

            1.0MB

          • memory/1344-41-0x00000000079F0000-0x0000000007A02000-memory.dmp
            Filesize

            72KB

          • memory/1344-42-0x0000000007A50000-0x0000000007A8C000-memory.dmp
            Filesize

            240KB

          • memory/1344-43-0x0000000007A90000-0x0000000007ADC000-memory.dmp
            Filesize

            304KB

          • memory/4692-29-0x0000000000400000-0x0000000000433000-memory.dmp
            Filesize

            204KB

          • memory/4692-31-0x0000000000400000-0x0000000000433000-memory.dmp
            Filesize

            204KB

          • memory/4692-28-0x0000000000400000-0x0000000000433000-memory.dmp
            Filesize

            204KB