Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 05:30

General

  • Target

    f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe

  • Size

    436KB

  • MD5

    d213e2080232807a50a68cf06de48dd0

  • SHA1

    a09601da7b45676d1a3cb07d767e093399d14b60

  • SHA256

    f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b

  • SHA512

    03867c11eed2d693fc1cd81da1c8c29b74bb6c45ff4f608ceb5c411ef8d9ba6e8fbad68a17bd4558c2055aa8258e1b39e24daca8d18558912ae0d6e7f16673d2

  • SSDEEP

    12288:DMrUy90Y4kZKi2MwPlfAbMdllZ+jYIvK4+IA:3yNnKi2NPZPcsIy4rA

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe
    "C:\Users\Admin\AppData\Local\Temp\f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Gt13zT6.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Gt13zT6.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:1596
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:2008
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:3060
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              3⤵
                PID:2068
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 548
                  4⤵
                  • Program crash
                  PID:4356
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 604
                3⤵
                • Program crash
                PID:4872
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2KF781qu.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2KF781qu.exe
              2⤵
              • Executes dropped EXE
              PID:4664
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3660 -ip 3660
            1⤵
              PID:3712
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2068 -ip 2068
              1⤵
                PID:4136

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Gt13zT6.exe

                Filesize

                407KB

                MD5

                c4f75f4b0ff938695609a2ea3e7537e8

                SHA1

                0a86bcdf06134008d592a425ce9f34f66120eb18

                SHA256

                0968244472af3762bb29e125b6b66d6ffca7f0a039834f1436dd69c2c2e468ff

                SHA512

                a3e8e23e12434cab015fe95ed5dbb0b420dd0c4a36a61e314d90382084d77231b67c16aaef6e4b630ffb901380d263402807ea74455352067a86e4eedbfe7f3f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2KF781qu.exe

                Filesize

                221KB

                MD5

                2518b6c23b3dbfab5ef7e0a9f51a8bc3

                SHA1

                2289c03e2654136a64aa1b8495c10137a37ffd39

                SHA256

                cb6a55e7d2acfa3bab6c6f901e19a7be1a791765683755c2d0775c76104e6ecc

                SHA512

                d31db3ede2e792f5c9732ccaa2b2345e87fec68ad859c1035ffae255d0abd4fa5559bb7494982b5c191e7dbc6f6478c2a054b323d9e63cb922a1ac1977592813

              • memory/2068-7-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2068-11-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2068-9-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2068-8-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4664-17-0x0000000007B90000-0x0000000008134000-memory.dmp

                Filesize

                5.6MB

              • memory/4664-16-0x0000000000900000-0x000000000093E000-memory.dmp

                Filesize

                248KB

              • memory/4664-15-0x0000000073D9E000-0x0000000073D9F000-memory.dmp

                Filesize

                4KB

              • memory/4664-18-0x00000000076C0000-0x0000000007752000-memory.dmp

                Filesize

                584KB

              • memory/4664-19-0x0000000002C00000-0x0000000002C0A000-memory.dmp

                Filesize

                40KB

              • memory/4664-20-0x0000000073D90000-0x0000000074540000-memory.dmp

                Filesize

                7.7MB

              • memory/4664-21-0x0000000008760000-0x0000000008D78000-memory.dmp

                Filesize

                6.1MB

              • memory/4664-22-0x0000000008140000-0x000000000824A000-memory.dmp

                Filesize

                1.0MB

              • memory/4664-23-0x0000000007900000-0x0000000007912000-memory.dmp

                Filesize

                72KB

              • memory/4664-24-0x0000000007A80000-0x0000000007ABC000-memory.dmp

                Filesize

                240KB

              • memory/4664-25-0x0000000007AC0000-0x0000000007B0C000-memory.dmp

                Filesize

                304KB

              • memory/4664-26-0x0000000073D9E000-0x0000000073D9F000-memory.dmp

                Filesize

                4KB

              • memory/4664-27-0x0000000073D90000-0x0000000074540000-memory.dmp

                Filesize

                7.7MB