Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:29

General

  • Target

    17bfe16ecf74ce58c323a518937f2920942fbcfac377f13e045e81269c09dba7.exe

  • Size

    858KB

  • MD5

    870ff345d2551de9b31e3fbae0380510

  • SHA1

    34b84a48a097243a24b31dfc0db5f75517f06230

  • SHA256

    17bfe16ecf74ce58c323a518937f2920942fbcfac377f13e045e81269c09dba7

  • SHA512

    ee845c6271464a2728895682d2d30a7d24a20fd47f6f2c7cc55e50cf7438bd860d290f6cbec5f42c56de072feacb7bfb6b61f3a88b447d8fe7d4a4364d44a318

  • SSDEEP

    12288:VMrWy90CmpizQ+cKZdEtVdzVfkUe9QGF13NyzmMoP7ruUli9maGb+irj6:nyyiOKZ2ndzVTYF4c7ruUllaEy

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17bfe16ecf74ce58c323a518937f2920942fbcfac377f13e045e81269c09dba7.exe
    "C:\Users\Admin\AppData\Local\Temp\17bfe16ecf74ce58c323a518937f2920942fbcfac377f13e045e81269c09dba7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Kn4SH4by.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Kn4SH4by.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\DS4ch6Fi.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\DS4ch6Fi.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4220
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Dt64ni8.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Dt64ni8.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3328
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:744
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2mU040Eh.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2mU040Eh.exe
            4⤵
            • Executes dropped EXE
            PID:1468
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3984,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4492 /prefetch:8
      1⤵
        PID:3792

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Kn4SH4by.exe

        Filesize

        605KB

        MD5

        140c7f9c4482878ae86e32581a1bf162

        SHA1

        221a5934b6b841a6c0ffd7af64af47616f65e13f

        SHA256

        c7ce79754b8f43073c8120a05093e2a709d1f2d05955c88b46821ba09a9dce5a

        SHA512

        cd4f0a5f7b2a2eb408e015a862ff9252cd78a7b78a28922f127f602e059fe17643b207bd576756e5392c3a75fcdbea5cb433e95924923f86a0cae1653c9d32fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\DS4ch6Fi.exe

        Filesize

        409KB

        MD5

        52abe736fa506d7bbb46f06ee0dd663d

        SHA1

        a6114aed657c436f81543f5ac428ccf14bbd353d

        SHA256

        e0aa355012750dc8ec89595d6b1770a0f49da1ecb4a3b84048bf3b54f704fbba

        SHA512

        fb73a9361b0917bb0e74de59d6cd8109b96007e651f5f385bc9b48e858d30db09bef063a73483b5e70f003467386872c8c94ffe7ee0171df9e9dc8b6bb7510b0

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Dt64ni8.exe

        Filesize

        340KB

        MD5

        ec3819defcb1def0479459a07cf02070

        SHA1

        0d46c5bab631e6a66bf617d8f92cfb4fe36ea2ed

        SHA256

        c91e019691a909fc6499991d551db9fbdbb7880e596a2d078a0b9e1bc6e58092

        SHA512

        60f4cb6ec74df86d3ffde51e09968297d5a9277f58d4829b53e07e4d49b5500a7a08ba2ef35326388daad158b2608bdd3591ad98e793934a3c8be6a8dea839d3

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2mU040Eh.exe

        Filesize

        222KB

        MD5

        fa31db7a3426c71e20cba7f53c1f820b

        SHA1

        88d18eb491765000c7768b0e062d5824cea4d771

        SHA256

        d5bdf4fc0a91b73643ed7a72280cf9e51c22422d17305fb590c053028c2319f2

        SHA512

        b55b3adc0e39ab66acad28084418913a8d2675933d931cf540573665e5e790e280d2ad87577fe093e8fc646c56a16a629e62135cee6ef330b3749f61ff82ac92

      • memory/744-21-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/744-25-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/744-23-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/744-22-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/1468-29-0x0000000000A40000-0x0000000000A7E000-memory.dmp

        Filesize

        248KB

      • memory/1468-30-0x0000000007D10000-0x00000000082B4000-memory.dmp

        Filesize

        5.6MB

      • memory/1468-31-0x0000000007800000-0x0000000007892000-memory.dmp

        Filesize

        584KB

      • memory/1468-32-0x0000000004DB0000-0x0000000004DBA000-memory.dmp

        Filesize

        40KB

      • memory/1468-33-0x00000000088E0000-0x0000000008EF8000-memory.dmp

        Filesize

        6.1MB

      • memory/1468-34-0x00000000082C0000-0x00000000083CA000-memory.dmp

        Filesize

        1.0MB

      • memory/1468-35-0x00000000078F0000-0x0000000007902000-memory.dmp

        Filesize

        72KB

      • memory/1468-36-0x0000000007A70000-0x0000000007AAC000-memory.dmp

        Filesize

        240KB

      • memory/1468-37-0x0000000007920000-0x000000000796C000-memory.dmp

        Filesize

        304KB