Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 05:33

General

  • Target

    aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049.exe

  • Size

    401KB

  • MD5

    c70da63f44a116fe349e06b38cafb3fa

  • SHA1

    cb0d169c46a5e96d933da8ff43d1e057ea2d5ced

  • SHA256

    aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049

  • SHA512

    d558fa35f52738065c6d4602f968f22dae8dc33f900d71afb69fb52705e105befee8e786926c174cca498af2e55a109fae972acb3ab5ccc4dd26ff41e5066993

  • SSDEEP

    6144:KUy+bnr+sp0yN90QEHbTG8sXOfBZjC+qn5gwV4y5P08f7DjWLMRPPq2knPEVowLc:kMrAy90tbXsOjFKFrOMti21awLc

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049.exe
    "C:\Users\Admin\AppData\Local\Temp\aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1GG94Iy1.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1GG94Iy1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:1240
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 540
            4⤵
            • Program crash
            PID:2748
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2XV410DF.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2XV410DF.exe
        2⤵
        • Executes dropped EXE
        PID:1424
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1240 -ip 1240
      1⤵
        PID:4696

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1GG94Iy1.exe

        Filesize

        328KB

        MD5

        01b6c7325417fc02ba2a94a9a63d19d3

        SHA1

        40289b7eddb508217e9e4e6e1217fab3d440fbc0

        SHA256

        84e51fa3d61208ef78ebfcf98278a447806df307fd4331c6b4e79768ccf64dd0

        SHA512

        f73d1846da99136461245e6f02566fc5fcdff318d3333ddb13d4e3c590697b1a30ca95e60047d54a25c2e4a5d1dec7bd379115ca16cdd88c3497855374866bfa

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2XV410DF.exe

        Filesize

        222KB

        MD5

        6d80262e654cda95522cecd7a9e18bd6

        SHA1

        15a8b69a3ff3c28edc83e2bff7c1a3ecc6982014

        SHA256

        67e3d9d3299079a929edd1554ce3fd11558b816fcf63e1436a8b2b0123f80d08

        SHA512

        91f3558c779e26659ba977decf7b23e3ae698a2a96b543646dab12d24795745e82a38b005edb9fe839361f7d8ac527c125481a448eb0d2e824f785bfa6db6e04

      • memory/1240-7-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/1240-11-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/1240-10-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/1240-8-0x0000000000400000-0x0000000000432000-memory.dmp

        Filesize

        200KB

      • memory/1424-17-0x00000000072B0000-0x0000000007854000-memory.dmp

        Filesize

        5.6MB

      • memory/1424-16-0x0000000000040000-0x000000000007E000-memory.dmp

        Filesize

        248KB

      • memory/1424-15-0x00000000741FE000-0x00000000741FF000-memory.dmp

        Filesize

        4KB

      • memory/1424-18-0x0000000006DE0000-0x0000000006E72000-memory.dmp

        Filesize

        584KB

      • memory/1424-19-0x0000000006FC0000-0x0000000006FCA000-memory.dmp

        Filesize

        40KB

      • memory/1424-20-0x00000000741F0000-0x00000000749A0000-memory.dmp

        Filesize

        7.7MB

      • memory/1424-21-0x0000000007E80000-0x0000000008498000-memory.dmp

        Filesize

        6.1MB

      • memory/1424-22-0x0000000007860000-0x000000000796A000-memory.dmp

        Filesize

        1.0MB

      • memory/1424-23-0x00000000070A0000-0x00000000070B2000-memory.dmp

        Filesize

        72KB

      • memory/1424-24-0x0000000007100000-0x000000000713C000-memory.dmp

        Filesize

        240KB

      • memory/1424-25-0x0000000007140000-0x000000000718C000-memory.dmp

        Filesize

        304KB

      • memory/1424-26-0x00000000741FE000-0x00000000741FF000-memory.dmp

        Filesize

        4KB

      • memory/1424-27-0x00000000741F0000-0x00000000749A0000-memory.dmp

        Filesize

        7.7MB