Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 08:22

General

  • Target

    4b34c552dbab5efc9560efa54f934de7c83ac3d7a313df811145ebfadf64c2dd.exe

  • Size

    1.1MB

  • MD5

    046b3bcfc5dd07fa793b5b9fc44534c6

  • SHA1

    98550b4ed41e9bf23ab492a09ac21ef451f130ed

  • SHA256

    4b34c552dbab5efc9560efa54f934de7c83ac3d7a313df811145ebfadf64c2dd

  • SHA512

    5050898ba55a16ca78bd5274f784079aafa782c4d6d75d29024b69d3cb38c47713818caa7341a1aae7e99f0f81592d42d35f412599b904ba895f37e2abb530c7

  • SSDEEP

    24576:HyHqpwwEbEGPY3bIAvlVLpaAy5SZ3+lyszXxadKi4zRJ:SKpZEYGP0JlMAykZ3+nAAR

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b34c552dbab5efc9560efa54f934de7c83ac3d7a313df811145ebfadf64c2dd.exe
    "C:\Users\Admin\AppData\Local\Temp\4b34c552dbab5efc9560efa54f934de7c83ac3d7a313df811145ebfadf64c2dd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xT5OY8fb.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xT5OY8fb.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\os5Lw1os.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\os5Lw1os.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3280
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GG0El9gL.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GG0El9gL.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4348
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JP1Ni5EG.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JP1Ni5EG.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1984
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cd50VP4.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cd50VP4.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2000
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:4304
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mJ854pa.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mJ854pa.exe
                6⤵
                • Executes dropped EXE
                PID:4588
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4040,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:8
      1⤵
        PID:1704

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xT5OY8fb.exe
        Filesize

        1.0MB

        MD5

        6002eba57abf2e056522f4c1e93dd8cc

        SHA1

        75c696468ec7eef56a4e8cd7a8f76b73d6b2fb51

        SHA256

        8bed36a110b4206ad978ad8db69009763225ad9e44429415c338812c408bed99

        SHA512

        84bfe1331c9e1f06885ba5f1f43c00753605e079198afa724968abe4245e181d2c958bf469305565288b0ed21efce95c998aaf606850c242099f1a77cdf47b22

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\os5Lw1os.exe
        Filesize

        843KB

        MD5

        0918b2ea21b44eb9c939ddbb0768281c

        SHA1

        19c97cfa711c707aa8669fd0a2aaeeda8c51e063

        SHA256

        b49cd40a724681dc01836bae9133e43d51bae306e7e51faf79c0d96531c5c721

        SHA512

        5cf25f86af06415682f217f613f7f155f3db40ab274bb7f6494a7bffba676cac2dcdb9b0a67f66486ad945102d7c272767bbeeabe5c5c4b4ccf7f2c6b16c6dd6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\GG0El9gL.exe
        Filesize

        593KB

        MD5

        8007650883fac2235543c77a78654ef6

        SHA1

        6187db863ffba169130d137aeb010d1a495bdda0

        SHA256

        823a939d2de147ba11a2d5a851b558adf361e1b60c552ec55d64824fefb903e0

        SHA512

        da35b9a228dd129a132d4b1ff9b8b587044e8cf5c93fe3ffce1ceeda941484e3f058b94141c6d84717af65d7e04c0c6c99af25f8bdaba6bd68fc0619d1583cbb

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\JP1Ni5EG.exe
        Filesize

        398KB

        MD5

        43ec0e9124078ac2c90c9a06bec3d100

        SHA1

        a1fbeafc9e5eeff6d250630aa8b23b71b1c172b7

        SHA256

        a2071445d989bd631e0e63d76c27c192ff2fd0d943cd5d25dc36b954b9e81503

        SHA512

        20e521d0ff1d097f48fc5f2a6c08209a05653eacc1f137319e36df2d3a91de1023d825b27de2d491100cb8cf53dd9eea09cdc85a1cd6e08b8c9a9cc106b17ac6

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cd50VP4.exe
        Filesize

        320KB

        MD5

        8f43c049b9ebd1cf8d75ec6012660b58

        SHA1

        d97e6abc19730fb1e67a38df769732707e0d4897

        SHA256

        169986bab792920d82249d76f03227ef511bc36b51d03b2267d2ba32e24976b5

        SHA512

        1f8c76bf15a59bcb334c665c63678e6ea817c3d1918e17f7ebd18c55029a75bc6a7a5654ce4e8a9412f5ffa5fbef9b11beacdd9e6b4938eee370ef1ef3877ced

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mJ854pa.exe
        Filesize

        222KB

        MD5

        9032bf95a18062608a40313c6e5335a2

        SHA1

        fac2f669af5a011564fea450138da695fcfadb67

        SHA256

        20245ac0716983eaaf2bc09451a1aa56d00b5745c15c5a4af3951894f625826b

        SHA512

        ac4be72adc87ed22aee2ce9b70c7aa4d7bce10b01c8c8ab18aaa2ac9b0d8c363594471f172bf1184434aabef46028c71cb3598c8ae99df930587420bb6bf55d6

      • memory/4304-38-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/4304-36-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/4304-35-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/4588-42-0x0000000000940000-0x000000000097E000-memory.dmp
        Filesize

        248KB

      • memory/4588-43-0x0000000007BE0000-0x0000000008184000-memory.dmp
        Filesize

        5.6MB

      • memory/4588-44-0x0000000007710000-0x00000000077A2000-memory.dmp
        Filesize

        584KB

      • memory/4588-45-0x0000000004D00000-0x0000000004D0A000-memory.dmp
        Filesize

        40KB

      • memory/4588-46-0x00000000087B0000-0x0000000008DC8000-memory.dmp
        Filesize

        6.1MB

      • memory/4588-47-0x0000000007A90000-0x0000000007B9A000-memory.dmp
        Filesize

        1.0MB

      • memory/4588-48-0x00000000078F0000-0x0000000007902000-memory.dmp
        Filesize

        72KB

      • memory/4588-49-0x0000000007980000-0x00000000079BC000-memory.dmp
        Filesize

        240KB

      • memory/4588-50-0x0000000007920000-0x000000000796C000-memory.dmp
        Filesize

        304KB