Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:30

General

  • Target

    c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe

  • Size

    1.1MB

  • MD5

    18446e1501e63e0019b372fc4029f123

  • SHA1

    c9d615ecc9559924632f68869510166c921dc59f

  • SHA256

    c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d

  • SHA512

    05d3f76c722a465e23ecf0961021767a41e7abc2f1b1f13be75300b095521e2eb58e2159311403753429349176d6821e67dc5c8fa46486db71252dc9d30d81e9

  • SSDEEP

    24576:pyMC4dJevkZml2/xU1WPWz6MuFZeVYOQrekxPuLuQGZyA3aM:cMCiJeMR/xU1WPe52sfkxPuLu/ZyAq

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe
    "C:\Users\Admin\AppData\Local\Temp\c423201e3826daee29004ed5dcf47d914f79b9e35aabb7cda630e407b4d2888d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ms3Fv9aC.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ms3Fv9aC.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ei0lj2rP.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ei0lj2rP.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hf7zo1TL.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hf7zo1TL.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1220
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1eY25uB2.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1eY25uB2.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3244
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:3584
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 576
                6⤵
                • Program crash
                PID:3888
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uz875GZ.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uz875GZ.exe
              5⤵
              • Executes dropped EXE
              PID:808
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3244 -ip 3244
      1⤵
        PID:456

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ms3Fv9aC.exe

        Filesize

        935KB

        MD5

        bbd85908ca92aa6aa27a6899fa22d74b

        SHA1

        34bdbb799fc7ac47d11722c067f123feb93c3650

        SHA256

        77ca1d8953d3307ab484abae3520c9e7e9dc8cd77581092f8f4b40bbf8f5d2dc

        SHA512

        90f8f0a86235b85a8207010d6806c2e78634056d9cd08ea1b189aa4b4297191b53ea4a76fa3f396187fcd537dcea7b6b1396d0c119e6efd2cf8be07d01a52f8d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ei0lj2rP.exe

        Filesize

        640KB

        MD5

        2bc0319ca1665fa752d4513a58e50fcb

        SHA1

        837e7aa4150ddc0615151d573304b3c159bc1199

        SHA256

        b3b5c8d36897b3ca83fb1c0b823fa70062c301932237490854402682dd2471d5

        SHA512

        69442c31324aade62fe195d7ffb97c7579b5a39277ccb23b400e0cf076db73c7dbf42cac54dc8687fcea22138c22ecc7ccc7a4e8a062eada106de929626572af

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\hf7zo1TL.exe

        Filesize

        444KB

        MD5

        551d774eb6c3b06dbbbe44abda890ac2

        SHA1

        3ccd898442a6e3373733d390e20249fe3c1b1cda

        SHA256

        a29a3b17cca56eddbc758d8871638246f507f2270e2cf8afc9f28288fac28208

        SHA512

        7a41240a5922f6eada5e784bfd12483f75b0306d6a71d10dc9f7f9dfa1bb930e0565da0fed356d44396dbf6af63bb51ee746d6e4484dcde518e426d8fab5349a

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1eY25uB2.exe

        Filesize

        423KB

        MD5

        cd820868bf246502a0bb868c3a4ab2e3

        SHA1

        09d4677dea172d69e2053022cbdfc34d136762bc

        SHA256

        27c40868c0ed0f61e92e70e04f035b09266fc57c8959888c04273e93e903cd5b

        SHA512

        7853829fddea79e8b07cc4e7b7f242f25c03da90b7d59f74bc2a29840e0bc7ace937fe9a93b34a6cb9426dba8e1e12bab3caa155a8f86e2972ecf1149dad6b77

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Uz875GZ.exe

        Filesize

        221KB

        MD5

        afbf0c047e06b6e558d65b89bd0053ec

        SHA1

        7f0db386359d1b2501b0b5cdd2c111a4a1cc8c4d

        SHA256

        ad88d1556dc955751493cc6869f4a76c1c5256ac0dd2358768262f2dca1fca43

        SHA512

        e564fe61dbb9bea5c17544ae89ca358f5f5ea8811d9b97785fde05d797a3b08b2a285eb948fa920a8ca587f786ea60210be760cc6cebe46a4de61080a67ec6f9

      • memory/808-39-0x00000000085C0000-0x0000000008BD8000-memory.dmp

        Filesize

        6.1MB

      • memory/808-35-0x0000000000570000-0x00000000005AE000-memory.dmp

        Filesize

        248KB

      • memory/808-36-0x00000000079F0000-0x0000000007F94000-memory.dmp

        Filesize

        5.6MB

      • memory/808-37-0x0000000007440000-0x00000000074D2000-memory.dmp

        Filesize

        584KB

      • memory/808-38-0x0000000004A20000-0x0000000004A2A000-memory.dmp

        Filesize

        40KB

      • memory/808-40-0x00000000077F0000-0x00000000078FA000-memory.dmp

        Filesize

        1.0MB

      • memory/808-41-0x0000000007660000-0x0000000007672000-memory.dmp

        Filesize

        72KB

      • memory/808-42-0x00000000076E0000-0x000000000771C000-memory.dmp

        Filesize

        240KB

      • memory/808-43-0x0000000007720000-0x000000000776C000-memory.dmp

        Filesize

        304KB

      • memory/3584-29-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3584-31-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3584-28-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB