Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:30

General

  • Target

    cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe

  • Size

    1.2MB

  • MD5

    1052f8a9850ff2cdb3305c4693fb3bc2

  • SHA1

    32363959f3f2db69aa1311d268affce5f7e5a130

  • SHA256

    cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2

  • SHA512

    1f65110317fc5bea56d95df856de912aae3cbeea853d62fcbf0487d47de212fb95740d6400088177bd1a313932df06460547a68910b2d62d4362cb6d895908b7

  • SSDEEP

    24576:Py8i+Ca4HSc3QJthXZ+8LKwtWPoq+aNQO418UgpMc/eSpQ:a8i+CmuqhJswvq7OO4WUa/eSp

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe
    "C:\Users\Admin\AppData\Local\Temp\cfb43a8521b91093cc4c585e28556ea093351fade2937e840921fbc278f763b2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DR4Js2RZ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DR4Js2RZ.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vu5oz0II.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vu5oz0II.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gq2QF8qe.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gq2QF8qe.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tu4Rx4jE.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tu4Rx4jE.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1472
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bc01Bf3.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bc01Bf3.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2492
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2168
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 596
                  7⤵
                  • Program crash
                  PID:1072
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2QV881ok.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2QV881ok.exe
                6⤵
                • Executes dropped EXE
                PID:516
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2492 -ip 2492
      1⤵
        PID:2260
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3756,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4332 /prefetch:8
        1⤵
          PID:1468

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DR4Js2RZ.exe

          Filesize

          1.0MB

          MD5

          0a41ad264f28d5bac008878258724c36

          SHA1

          95fc25fc8cd6aaa0ffc6e444dbe0587fbe7ab901

          SHA256

          78c15c22931d8f8495bb47a9caa3d79ed1c3622beb62b47ccfea0a098aa85def

          SHA512

          242ce7f52cacb37e773305cd6e65c2cb65ce713696afe6b13a9371fa44b3cef4b93505bdce3181ef9c286750d5d9d1808253fa0de990e06780073af411eacb36

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vu5oz0II.exe

          Filesize

          884KB

          MD5

          96db83d327c93a4fb7212f0f553e7de2

          SHA1

          8e8a2d9f2a9546d8003cc5f9f08a41acc64abd6c

          SHA256

          d513154dad1489fdc8453b344ff96c6fb2c597ce590ad7c8e17e598ac0915ea6

          SHA512

          b56aa38bcf058910713f65313abc83c3cae4191371c0d8cf90f61e8c1d2aba36054d7f37771607f1eea2934b31a06682a69333185281e27f17810ac2d2dfbebb

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gq2QF8qe.exe

          Filesize

          590KB

          MD5

          91541a356aa833e317372955fc608c91

          SHA1

          3aa2b1ec921141f7a98784aafcb91398d767b0f3

          SHA256

          3a2b688ff4f95b0362fc13e6e9daef69a48adfc1ac966408d916881296c1287f

          SHA512

          0163e3f14babfaa7c4d58a4e5bc618fde5764ee2b228222971b668690275868d0a0d6b81c919c151b54591d8b130e5c38551f380dbc69bd27efa3e84497fc054

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tu4Rx4jE.exe

          Filesize

          417KB

          MD5

          c15a13585420061933c2b1e3e61c3b37

          SHA1

          07f4537bd6f372694765d7ac425d2424a9293147

          SHA256

          07e5e9eeb408cecb9698d888c7f7b109fea64003495532c8fc1784118bca02b7

          SHA512

          ce8c4331217b10ad2752369485cb36811a31402c188cff20bb8068f72067d455d9af2c2ef7b38b19398eb4da983e16383b772274b97cbca5225b5080b30fafeb

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bc01Bf3.exe

          Filesize

          378KB

          MD5

          f0831f173733de08511f3a0739f278a6

          SHA1

          06dc809d653c5d2c97386084ae13b50a73eb5b60

          SHA256

          8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

          SHA512

          19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2QV881ok.exe

          Filesize

          231KB

          MD5

          80f0a7d60ab9bdeb6af6b3565e6a32b4

          SHA1

          e965b40b6929e60f3ccd39c5d3e97165e960ff80

          SHA256

          f59d1f9b8fc4bbaf6edb887224abe2ced9ab9d00147ad4b62c1ace301dbd05be

          SHA512

          55d4f1dd597356d3b2666ea3a1aff52276cee7489e0e168c7718c37900b30df1c0a2dd806e39bfc6b6c55fbab79eb6ce5d916f3252701834e365c2266abee490

        • memory/516-42-0x0000000000C80000-0x0000000000CBE000-memory.dmp

          Filesize

          248KB

        • memory/516-43-0x0000000008050000-0x00000000085F4000-memory.dmp

          Filesize

          5.6MB

        • memory/516-44-0x0000000007AA0000-0x0000000007B32000-memory.dmp

          Filesize

          584KB

        • memory/516-45-0x0000000005100000-0x000000000510A000-memory.dmp

          Filesize

          40KB

        • memory/516-46-0x0000000008C20000-0x0000000009238000-memory.dmp

          Filesize

          6.1MB

        • memory/516-47-0x0000000007E20000-0x0000000007F2A000-memory.dmp

          Filesize

          1.0MB

        • memory/516-48-0x0000000007B40000-0x0000000007B52000-memory.dmp

          Filesize

          72KB

        • memory/516-49-0x0000000007BA0000-0x0000000007BDC000-memory.dmp

          Filesize

          240KB

        • memory/516-50-0x0000000007D10000-0x0000000007D5C000-memory.dmp

          Filesize

          304KB

        • memory/2168-36-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2168-38-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2168-35-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB