Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:30

General

  • Target

    f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53.exe

  • Size

    605KB

  • MD5

    9a6e6c325ec6dd023c76243100c08bde

  • SHA1

    ad3a4a56867514408546b8f0322b96dbc7288d8d

  • SHA256

    f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53

  • SHA512

    9a9711f2d290ea6b1ff8e7f3cc5c11a0be87c6a09ff1b608a9093febc35da58ae5fb6cb3a8e59fefbdd151305504af17d362cda27c517db2d1115c755ba8a179

  • SSDEEP

    12288:RMrUy90aIl2VtsnMvNDP2LftanwopFV8OL53AHHBh/bCf:ByvVdvxP2LY/r9iBs

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53.exe
    "C:\Users\Admin\AppData\Local\Temp\f674a21edded6b58ee18fe72f4241798a2dc4a04eebb177a73f1ddde8cde4f53.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pg8wm3HN.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pg8wm3HN.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1lC31zb8.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1lC31zb8.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:700
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:216
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:3720
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 544
                5⤵
                • Program crash
                PID:4908
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2YI909rR.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2YI909rR.exe
            3⤵
            • Executes dropped EXE
            PID:4388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3720 -ip 3720
        1⤵
          PID:2304

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pg8wm3HN.exe

          Filesize

          409KB

          MD5

          528c55db5f8cbf3442a3729e685d9f0d

          SHA1

          ba7ed8fcf8e39667743f812d9c5fa1d82d025f26

          SHA256

          f5659ff4e2e2c4f553f6a9f59f406907a29545e4ca9d61810be718d9619a8dff

          SHA512

          12c8b016e7b6ca2d357d2fc770ea72fdb195dce19357ec9acdc44fcfd5cd808474a88eef2c7ef39c93a468ddbddf371993d02c43175ea4546086ca4863751221

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1lC31zb8.exe

          Filesize

          340KB

          MD5

          ec3819defcb1def0479459a07cf02070

          SHA1

          0d46c5bab631e6a66bf617d8f92cfb4fe36ea2ed

          SHA256

          c91e019691a909fc6499991d551db9fbdbb7880e596a2d078a0b9e1bc6e58092

          SHA512

          60f4cb6ec74df86d3ffde51e09968297d5a9277f58d4829b53e07e4d49b5500a7a08ba2ef35326388daad158b2608bdd3591ad98e793934a3c8be6a8dea839d3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2YI909rR.exe

          Filesize

          222KB

          MD5

          71bbd8e9a4a2bd30862e98336d976a81

          SHA1

          eb3e0c9368f8ac4611e6ea409217a5cdb6363bf1

          SHA256

          1fb936858df4cadd7fba4393ffc5b9e8872eeb8b3dc63139bda3665d0066f040

          SHA512

          c9c901affe493166c1a1a16409a2e8f09d2f9c649722ad6ad115540fade1b4bcff19286c35cc76a2ca62316d940277939a3e4ec45f0ef43faba5e56cf90b4dd3

        • memory/3720-14-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/3720-15-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/3720-18-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/3720-16-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/4388-23-0x00000000072D0000-0x0000000007874000-memory.dmp

          Filesize

          5.6MB

        • memory/4388-22-0x0000000000010000-0x000000000004E000-memory.dmp

          Filesize

          248KB

        • memory/4388-24-0x0000000006E00000-0x0000000006E92000-memory.dmp

          Filesize

          584KB

        • memory/4388-25-0x00000000043E0000-0x00000000043EA000-memory.dmp

          Filesize

          40KB

        • memory/4388-26-0x0000000007EA0000-0x00000000084B8000-memory.dmp

          Filesize

          6.1MB

        • memory/4388-28-0x0000000006FB0000-0x0000000006FC2000-memory.dmp

          Filesize

          72KB

        • memory/4388-27-0x0000000007180000-0x000000000728A000-memory.dmp

          Filesize

          1.0MB

        • memory/4388-29-0x0000000007070000-0x00000000070AC000-memory.dmp

          Filesize

          240KB

        • memory/4388-30-0x00000000070B0000-0x00000000070FC000-memory.dmp

          Filesize

          304KB