Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 19:19

General

  • Target

    16b785fdba23a1e8ce123eff83acdb78721163b0ff8cab22979a4b4fb39ec108.exe

  • Size

    640KB

  • MD5

    7cfa0d411448e107aeba15ed220bde20

  • SHA1

    a9486fc6de8b4ab9135eeb034f261b4f426f34ee

  • SHA256

    16b785fdba23a1e8ce123eff83acdb78721163b0ff8cab22979a4b4fb39ec108

  • SHA512

    368c2bf8f37608c6f6a8a5e45626f39ba2cf2e44fd0bdd5f8d5f60eafbf3e62aa6500fb8505f7f262c5a1fa0581956f637bd73f3611cc78fe3719aa9e753ee01

  • SSDEEP

    12288:MMr5y90o4ugxm9XP9mg39ZnzdjOgXBYHJ2CKJQGEfUbIjBsLpQvb:Nykm3t1zFreJ2nJQGYPKLS

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16b785fdba23a1e8ce123eff83acdb78721163b0ff8cab22979a4b4fb39ec108.exe
    "C:\Users\Admin\AppData\Local\Temp\16b785fdba23a1e8ce123eff83acdb78721163b0ff8cab22979a4b4fb39ec108.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WH1ax0Oa.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WH1ax0Oa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1TW62ly2.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1TW62ly2.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:116
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:804
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 540
              5⤵
              • Program crash
              PID:1008
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 572
            4⤵
            • Program crash
            PID:5044
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2zt221Ll.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2zt221Ll.exe
          3⤵
          • Executes dropped EXE
          PID:2844
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 804 -ip 804
      1⤵
        PID:1296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 116 -ip 116
        1⤵
          PID:2068

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WH1ax0Oa.exe

          Filesize

          444KB

          MD5

          4d2c882e3b67664159b8c6be1d8a11dc

          SHA1

          7d6206c93b04c1bdffd50f7c4380c49527347152

          SHA256

          105659ebad08f28be1c1bcfdf196e9b7fb09656640825bf91dd6413ab52141e0

          SHA512

          7b99950216f3412c53dd5aa9160debc2ee3d3ec985f8ece567a12f5343e4bef0196d8924d06c53630235d5c8548ea4deb6eb3dc0ded563cd4b88250a92292f6c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1TW62ly2.exe

          Filesize

          423KB

          MD5

          5cfb58a43ab0dcd3f7bd1dcd8ca61d71

          SHA1

          cb92ea73034c35ba4c9b008fd1a0569fcc227ec8

          SHA256

          a550efc679ce70a7625f7ae8f44a3e0a53b32346e7da0c4ed850a57a0f562ff8

          SHA512

          fba245a3b8199f9d0dd2bd1d3fe1ad90a0cf24504257eff16434a4149f669df71ffe4c7278fa1b162d7b1c15d22ff6c1aadad039e618e1415308986e6667470e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2zt221Ll.exe

          Filesize

          221KB

          MD5

          e0c1f5aae17ca8525c8b2097f83e7259

          SHA1

          a1e66657dea0f35c40506de00f7ef4da59b9be3f

          SHA256

          34e6e0394c43fce3a4f65920bdacdd11aea0907e1e539d5bf25f534ca7bf388d

          SHA512

          8a570e97928e0c1c4426dad80e76194e369f93502d30d62cd59c576cfab0c7ba37194d34d8b37bdbe88cbe85ac6b50ead92d8b73b25229b46307017faccf5eea

        • memory/804-14-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/804-18-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/804-15-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/804-16-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2844-23-0x0000000007B70000-0x0000000008114000-memory.dmp

          Filesize

          5.6MB

        • memory/2844-22-0x00000000007D0000-0x000000000080E000-memory.dmp

          Filesize

          248KB

        • memory/2844-24-0x00000000076A0000-0x0000000007732000-memory.dmp

          Filesize

          584KB

        • memory/2844-25-0x0000000004C30000-0x0000000004C3A000-memory.dmp

          Filesize

          40KB

        • memory/2844-26-0x0000000008740000-0x0000000008D58000-memory.dmp

          Filesize

          6.1MB

        • memory/2844-27-0x00000000079F0000-0x0000000007AFA000-memory.dmp

          Filesize

          1.0MB

        • memory/2844-28-0x00000000078D0000-0x00000000078E2000-memory.dmp

          Filesize

          72KB

        • memory/2844-29-0x0000000007930000-0x000000000796C000-memory.dmp

          Filesize

          240KB

        • memory/2844-30-0x0000000007970000-0x00000000079BC000-memory.dmp

          Filesize

          304KB