Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 19:19

General

  • Target

    e45cad29f3234c6392c5f6e84eb764dce17d47da6e46a61cd2f50f56ea080fcf.exe

  • Size

    1.2MB

  • MD5

    8a5131fa4cb385e65b818b6189fb1662

  • SHA1

    eebf2ac535f51d7d16219ad1bc4fdf92f2552271

  • SHA256

    e45cad29f3234c6392c5f6e84eb764dce17d47da6e46a61cd2f50f56ea080fcf

  • SHA512

    884f4100578b35e61f5fdab2b90e374a00859764fb707778f124c7fd170d15081a33249dd5863a54b8740feaea817bdae31f0c9103e48425c79b791e7fb100e7

  • SSDEEP

    24576:ayjC2EmuBGN1X+5Xr2CwfnI36qA3CzkQERXVC/M:h7sGNlWKqAtQiV

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e45cad29f3234c6392c5f6e84eb764dce17d47da6e46a61cd2f50f56ea080fcf.exe
    "C:\Users\Admin\AppData\Local\Temp\e45cad29f3234c6392c5f6e84eb764dce17d47da6e46a61cd2f50f56ea080fcf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ct6Va7EI.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ct6Va7EI.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vS3rk8As.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vS3rk8As.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rU8qo4rk.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rU8qo4rk.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BR9UU5Ht.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BR9UU5Ht.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:588
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3756
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:448
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:4948
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 596
                    7⤵
                    • Program crash
                    PID:2964
                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2DE995oj.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2DE995oj.exe
                  6⤵
                  • Executes dropped EXE
                  PID:5096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3756 -ip 3756
        1⤵
          PID:1740

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ct6Va7EI.exe
          Filesize

          1.0MB

          MD5

          a9dca1732d355fea88ec0c023cc39992

          SHA1

          a5103cf24246bfb67fbd294023996e6d88274891

          SHA256

          f0e1f4d8aa8e6938b2aa04788b5b04ad40117febc2e576f6f8799617772e4522

          SHA512

          a1101d759c6c97b29243913b4576b09be5f80e5b7eb46fcea119b4941f53cf872cbfcbb8e351a3d51ddb02e2ad0096393b5bc6e40c951c2f099b315ea4995975

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vS3rk8As.exe
          Filesize

          884KB

          MD5

          98877685f7e2ba9d0d7bc106b1547a0f

          SHA1

          018ab45b956bf5a918f1eb1dc9b3d59da91c8894

          SHA256

          7f1e19096ffc6d2be4657c7dfdace607141f47b2ce80a607affbcc570fb003e2

          SHA512

          2bdfe05205cb81913d4112c9fc2796ef63555c97434001510baa47d1c5e237f8657a99be48cf3743c23aefd4acd2bb7d5336ff32bd300ea89c89ab5457bab6cc

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rU8qo4rk.exe
          Filesize

          590KB

          MD5

          784e998183e929ce76fc8a9caf39426a

          SHA1

          44defd2b3d9eb2a085dddc0f9efa7f9743fd60dd

          SHA256

          65f9f3263888b314eb7a6db9c7d634eb12da8dd4c949ba2327ce05e0698dafb9

          SHA512

          7187fc0cd4e36f312ba85053a65b9151f169f1ccb3430bacc6e48f1ab920fdfbe4bbade65124742fe82cdea29cc8eebb6bfa048793c3c4e3f041c761416eae46

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BR9UU5Ht.exe
          Filesize

          417KB

          MD5

          b3e27bc42c0d400f58083d243e52976b

          SHA1

          dfb89f92eaf181b6e424c0752c4a50edb99eb6bf

          SHA256

          7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461

          SHA512

          43cdcf38bc097faf2979f7d080aa701b332ada3db6b24720b60c357cf1dc5125517ddd22a55774cada98be57b309a32d6e77fa3b35e536444585943cae5a66f1

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
          Filesize

          378KB

          MD5

          f0831f173733de08511f3a0739f278a6

          SHA1

          06dc809d653c5d2c97386084ae13b50a73eb5b60

          SHA256

          8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

          SHA512

          19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2DE995oj.exe
          Filesize

          231KB

          MD5

          7286367aae7c7200b7d3449ce31b2470

          SHA1

          a495381377b250c8fcf005c03e7caaeaed97bf72

          SHA256

          1586e3f814e6bde402145046600ca3ce31517ad77a4627b685b1b372604798b8

          SHA512

          e584a51dad1ca213ef3307eb4c349f210829f6e53b2f2ecb4fdc8f9001e1363e74af316dadb208efe6ad457088e3bbcd0dfeeeaafce19284bd669b9928d21335

        • memory/4948-36-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/4948-38-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/4948-35-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/5096-42-0x0000000000C60000-0x0000000000C9E000-memory.dmp
          Filesize

          248KB

        • memory/5096-43-0x0000000007ED0000-0x0000000008474000-memory.dmp
          Filesize

          5.6MB

        • memory/5096-44-0x0000000007A20000-0x0000000007AB2000-memory.dmp
          Filesize

          584KB

        • memory/5096-45-0x0000000004FE0000-0x0000000004FEA000-memory.dmp
          Filesize

          40KB

        • memory/5096-46-0x0000000008AA0000-0x00000000090B8000-memory.dmp
          Filesize

          6.1MB

        • memory/5096-47-0x0000000007D70000-0x0000000007E7A000-memory.dmp
          Filesize

          1.0MB

        • memory/5096-48-0x0000000007B20000-0x0000000007B32000-memory.dmp
          Filesize

          72KB

        • memory/5096-49-0x0000000007CA0000-0x0000000007CDC000-memory.dmp
          Filesize

          240KB

        • memory/5096-50-0x0000000007CE0000-0x0000000007D2C000-memory.dmp
          Filesize

          304KB