Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:29

General

  • Target

    5645ed9dff35fefe6b0bc81a6383947c80bd191f23dd3516f6483675123a0efa.exe

  • Size

    929KB

  • MD5

    3ccf8d264d5121a41b62ae6db8110bf0

  • SHA1

    a944f8f011db9917c142c44d8621f57737925f38

  • SHA256

    5645ed9dff35fefe6b0bc81a6383947c80bd191f23dd3516f6483675123a0efa

  • SHA512

    275a371f9ca64141e6ffa2b8cb3cebb4a7efad64a33fa92da372e9dc08688ea0209146ad649f15501b026951a3d54d0b343d0f738670d0f75121284bdc1cd5c2

  • SSDEEP

    24576:4ys9bdFlXrQiUpE+kZML+2JSfl4xDE5jzC:/s9pFl7wBkG+9l4xDE

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5645ed9dff35fefe6b0bc81a6383947c80bd191f23dd3516f6483675123a0efa.exe
    "C:\Users\Admin\AppData\Local\Temp\5645ed9dff35fefe6b0bc81a6383947c80bd191f23dd3516f6483675123a0efa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7092873.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7092873.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:6060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8815206.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8815206.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2522696.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2522696.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3232
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1306451.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1306451.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:5384
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 584
                6⤵
                • Program crash
                PID:5268
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5760237.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5760237.exe
              5⤵
              • Executes dropped EXE
              PID:1852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2660 -ip 2660
      1⤵
        PID:4032

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7092873.exe

        Filesize

        827KB

        MD5

        7533ca042131d7281c888bdc19dc1715

        SHA1

        b3fe1987f02b3c43ab35652dd0058803dccc881f

        SHA256

        a84c35dafc4aeb76eeed35e4002629ad4bf7082a10b121096200db9cfe24f9dd

        SHA512

        4519993e1f3a4835efaa5da81985520d9beeb1c670c52be502252e21d19780d27c3819fa68983ab2356a0798233cb00ac30870561945bdf61f9601aa18080d55

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8815206.exe

        Filesize

        555KB

        MD5

        1e00c7389014505215d8cfdfc5a1631d

        SHA1

        e4d592a506e734688375673ada896f8656ff8274

        SHA256

        1da1711dbccbb25ea99317d45968805cc4be4382b0989c7076ec670ee67153a0

        SHA512

        774a3348103656b9fd8c52fbc79c57ddbcc44bb99de532505f92ed3579654702a5b5f90d4f3c3db563e0dd02d9299baa78854f989553cfaeb934e662b441382c

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2522696.exe

        Filesize

        390KB

        MD5

        97da09a7dad10f6c4f30e3f1ebb59497

        SHA1

        2b3ce8e7cf78b8020246f74a80175afc67d2849b

        SHA256

        6eb424c60f51acd78a7214359f34801a69b41057d355231c7c3cc5dd0b52c45c

        SHA512

        ba931baaa84bea00a20f23f86bf981643a6b4a7bbc7c9137e1b4d2a9db117cd360cd200cbd7671ea5d494dcb77b882ef816ddf575c099a9fbeb600cf88b74102

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1306451.exe

        Filesize

        356KB

        MD5

        9339634c259ed435a79a484833c8ba39

        SHA1

        bb56d856a9e70aad449c14f8fb11a646cceacf75

        SHA256

        b3b9401a134f63aba6688fc8a6ddf21d9be552fabaf88ee721a7618bd3af89f9

        SHA512

        e0701e4418d4b1ed5b3c29c654e3b24a050401fb7cb473fdc2c56a956db2e7c42d929d0bc199507000d7c5766c57367d389cbf6cd20bb5833b923db1027ee042

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5760237.exe

        Filesize

        174KB

        MD5

        f8aba8d6cd44a9b5ab2c36f68568520b

        SHA1

        b6910319273e7875040d88a8fcbb3165638932fe

        SHA256

        543eccb5cf6e1310fc31ea234989b9d7b1af6dca8415a12da23efec0340ef55c

        SHA512

        0c3ea3ec2f96e91d8adee61683b1f440551c6f383f4b1ca33f845ee2a323907b9ca4348c3267918c2cdb7ac05613efd0aced68e1a44180ab3e904d1f43981c8d

      • memory/1852-36-0x0000000002650000-0x0000000002656000-memory.dmp

        Filesize

        24KB

      • memory/1852-35-0x0000000000260000-0x0000000000290000-memory.dmp

        Filesize

        192KB

      • memory/1852-37-0x000000000A6F0000-0x000000000AD08000-memory.dmp

        Filesize

        6.1MB

      • memory/1852-39-0x000000000A150000-0x000000000A162000-memory.dmp

        Filesize

        72KB

      • memory/1852-38-0x000000000A210000-0x000000000A31A000-memory.dmp

        Filesize

        1.0MB

      • memory/1852-40-0x000000000A1B0000-0x000000000A1EC000-memory.dmp

        Filesize

        240KB

      • memory/1852-41-0x00000000046A0000-0x00000000046EC000-memory.dmp

        Filesize

        304KB

      • memory/5384-30-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/5384-31-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/5384-28-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB