Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:30

General

  • Target

    299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059.exe

  • Size

    417KB

  • MD5

    f5fe73580e6061b453e5e52c1b4d1fe2

  • SHA1

    e29ff7c20633ba5b052d7bc24e3c056783af2f77

  • SHA256

    299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059

  • SHA512

    40e96b896ae52e76ce5ed33cb5f68548b2bef2232721eecb2a2becb6f1523dd786778fd5bf454ef51727a755cb5959f69548139232f4cecb84941a3edb319977

  • SSDEEP

    6144:Kry+bnr+8p0yN90QEM6uFCuzf8i/mEPtm+aiGEaC9c2fww:ZMroy90ejCuLl/mEVm1iVrTx

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059.exe
    "C:\Users\Admin\AppData\Local\Temp\299663995567ce7e8d92c1a76f6910056efcce778fe83d664f85a3ca9b2e2059.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1DW33ET8.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1DW33ET8.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:4092
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 196
            4⤵
            • Program crash
            PID:2692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 152
          3⤵
          • Program crash
          PID:4992
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2NM322Sp.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2NM322Sp.exe
        2⤵
        • Executes dropped EXE
        PID:2408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4092 -ip 4092
      1⤵
        PID:4984
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4800 -ip 4800
        1⤵
          PID:3832

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1DW33ET8.exe

          Filesize

          378KB

          MD5

          f0831f173733de08511f3a0739f278a6

          SHA1

          06dc809d653c5d2c97386084ae13b50a73eb5b60

          SHA256

          8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

          SHA512

          19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2NM322Sp.exe

          Filesize

          231KB

          MD5

          9b9cbc983e6c062582f117df47db53c5

          SHA1

          b8ff60c1b709e1f170db8ad7d7197ebadff4dbe6

          SHA256

          6653c670b9c5df02e2ce27619d5881b7ccfa6e4b1927f0b8f062243857204e61

          SHA512

          10532de95cbe17e2c8511f94479b725dab2a4806c380d3d3d856ae5033b109c61b64de7947205859a38dd09fcb47fbd378ff1e29a8237070a471735bf47a27d9

        • memory/2408-21-0x0000000008FD0000-0x00000000095E8000-memory.dmp

          Filesize

          6.1MB

        • memory/2408-20-0x00000000742E0000-0x0000000074A90000-memory.dmp

          Filesize

          7.7MB

        • memory/2408-27-0x00000000742E0000-0x0000000074A90000-memory.dmp

          Filesize

          7.7MB

        • memory/2408-26-0x00000000742EE000-0x00000000742EF000-memory.dmp

          Filesize

          4KB

        • memory/2408-15-0x00000000742EE000-0x00000000742EF000-memory.dmp

          Filesize

          4KB

        • memory/2408-16-0x0000000000FA0000-0x0000000000FDE000-memory.dmp

          Filesize

          248KB

        • memory/2408-17-0x0000000008400000-0x00000000089A4000-memory.dmp

          Filesize

          5.6MB

        • memory/2408-18-0x0000000007EF0000-0x0000000007F82000-memory.dmp

          Filesize

          584KB

        • memory/2408-19-0x0000000003290000-0x000000000329A000-memory.dmp

          Filesize

          40KB

        • memory/2408-25-0x0000000008150000-0x000000000819C000-memory.dmp

          Filesize

          304KB

        • memory/2408-24-0x0000000007FF0000-0x000000000802C000-memory.dmp

          Filesize

          240KB

        • memory/2408-22-0x00000000089B0000-0x0000000008ABA000-memory.dmp

          Filesize

          1.0MB

        • memory/2408-23-0x0000000007F90000-0x0000000007FA2000-memory.dmp

          Filesize

          72KB

        • memory/4092-7-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/4092-9-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/4092-11-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/4092-8-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB