Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 09:04

General

  • Target

    e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe

  • Size

    1.3MB

  • MD5

    ba596649dd39015b9ebb20e53e576673

  • SHA1

    1f6bb78f5decfae319019346d7a2c5c2d5be2cd4

  • SHA256

    e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0

  • SHA512

    4544fd2669ff8d9632241040946868026712ddc7faf1a0db708ccf8f0c7edcb92a6c6ec9167b59421014158b0f27353b6afc4026d3a2748bb7fa3252e2747f57

  • SSDEEP

    24576:gyfJAGy3eES79rsujbjYlvUJG76Sh44Q+x6/7XOHG+nnsQPGKkUw:nfJBbES79rjYbth44xsKxJPGKk

Malware Config

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe
    "C:\Users\Admin\AppData\Local\Temp\e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EE2Ip30.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EE2Ip30.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uu9aR70.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uu9aR70.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5028
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\at1Tc45.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\at1Tc45.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:208
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tr42EG0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tr42EG0.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4516
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Je6892.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Je6892.exe
            5⤵
            • Executes dropped EXE
            PID:2536
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3gW94Vu.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3gW94Vu.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:2844
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:4396
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                  PID:4044
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  5⤵
                  • Checks SCSI registry key(s)
                  PID:1508
            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4aZ207Wr.exe
              C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4aZ207Wr.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:864
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                4⤵
                  PID:2560
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4688
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2EAC.tmp\2EAD.tmp\2EAE.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:3480
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                  4⤵
                    PID:4556
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                    4⤵
                      PID:4488
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3976,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4052 /prefetch:8
                1⤵
                  PID:1640
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4652,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4976 /prefetch:1
                  1⤵
                    PID:3584
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4904,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5216 /prefetch:1
                    1⤵
                      PID:3536
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5324,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5468 /prefetch:8
                      1⤵
                        PID:3152
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=5332,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5548 /prefetch:1
                        1⤵
                          PID:3192
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5860,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6088 /prefetch:8
                          1⤵
                            PID:932
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=6012,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6164 /prefetch:1
                            1⤵
                              PID:2520
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6128,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6220 /prefetch:8
                              1⤵
                                PID:3740
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6272,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6416 /prefetch:8
                                1⤵
                                • Modifies registry class
                                PID:4400
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=5524,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5512 /prefetch:8
                                1⤵
                                  PID:1552
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5828,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:8
                                  1⤵
                                    PID:4332

                                  Network

                                  MITRE ATT&CK Matrix ATT&CK v13

                                  Persistence

                                  Boot or Logon Autostart Execution

                                  1
                                  T1547

                                  Registry Run Keys / Startup Folder

                                  1
                                  T1547.001

                                  Privilege Escalation

                                  Boot or Logon Autostart Execution

                                  1
                                  T1547

                                  Registry Run Keys / Startup Folder

                                  1
                                  T1547.001

                                  Defense Evasion

                                  Modify Registry

                                  1
                                  T1112

                                  Discovery

                                  Query Registry

                                  2
                                  T1012

                                  System Information Discovery

                                  3
                                  T1082

                                  Peripheral Device Discovery

                                  1
                                  T1120

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\2EAC.tmp\2EAD.tmp\2EAE.bat
                                    Filesize

                                    88B

                                    MD5

                                    0ec04fde104330459c151848382806e8

                                    SHA1

                                    3b0b78d467f2db035a03e378f7b3a3823fa3d156

                                    SHA256

                                    1ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f

                                    SHA512

                                    8b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe
                                    Filesize

                                    99KB

                                    MD5

                                    6bd6fb9952fa18f6e52f1e9ef0cfb385

                                    SHA1

                                    e1060312496d9e0bedf94df585b7863ec67ef42b

                                    SHA256

                                    89ca04731834695e5a1e35404e6c408b3cf420fcd34c9e053f9a3075b4e2e6fa

                                    SHA512

                                    04e89b9002406375764e6e8a369de9dde35c3836e6516393a84df50b1bf44b0bc0d920c30dcb781dd4679bc4b512f9d47997f193f16ad8779a0e9be06fda1483

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EE2Ip30.exe
                                    Filesize

                                    1.2MB

                                    MD5

                                    2d06bb1883376c02addfdae30c4674c6

                                    SHA1

                                    39256ee881bab5b8a39ed57ed4c486fe9a8dd70d

                                    SHA256

                                    1d350c9449236440b90b533da9a3681d802230b17fc646e4f39fac8b06d28564

                                    SHA512

                                    90545e90df858c97326e20de98bb86ad0ed25f50bbbe4c1563c71f9606bb697be5e63cb81e722bfaf594a3b355fb18d16d38f1a26e2ad3d12f837e60f1021926

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4aZ207Wr.exe
                                    Filesize

                                    1.2MB

                                    MD5

                                    267ef1a960bfb0bb33928ec219dc1cea

                                    SHA1

                                    fc28acaa6e4e4af3ad7fc8c2a851e84419a2eebf

                                    SHA256

                                    b462fedfb5904509e82387e2591bdb1ddfe6d12b6a28a189c6403a860050965e

                                    SHA512

                                    ba09e6c6b71426e09214c1c6773114d0a46edd133d711f81960390f940a81a695550971b30c1d292109873b524db94b596ecaebfaf379e6c6bcfd4089379e38f

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uu9aR70.exe
                                    Filesize

                                    749KB

                                    MD5

                                    a4a164fa5c5e796e10b4d328ec8d73a5

                                    SHA1

                                    a102c3367d3161a4bfe6c0988bcd891f744c9036

                                    SHA256

                                    ea7601c6ee113edfc553fd5ff05c1f8ae21bd30d793c426a7b3a9dc5cce47dba

                                    SHA512

                                    ca7b82ebb4b57aac7404d6553cc05871b618175d04022819958e479c31bb8361da588224223ffac1b3e448f51d24043c4e972f01d0da622d9545652fe6038f0e

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3gW94Vu.exe
                                    Filesize

                                    973KB

                                    MD5

                                    5dc4be46727c1853e63ebdd240ec9bd9

                                    SHA1

                                    6265b41bbecbb96cf666d2b4cbd6f209f44d7a2d

                                    SHA256

                                    1df63e2de3adac7ff425c75b3f649078fd7a8e0008e5063bd290adb1cdba2446

                                    SHA512

                                    59828cba7af9fb26c6717eb3e655eec07f732ec92d3ec0cce7ed2df1acf6095dec2d97cdbbd3591ed96c08cb2adcff12c31534a93b48757ff8976c0a4233062b

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\at1Tc45.exe
                                    Filesize

                                    364KB

                                    MD5

                                    455347ba3d7b41331dfee6bf9eee794b

                                    SHA1

                                    6b4e14e85ec934c26fda86b0071cc25a1fbb1627

                                    SHA256

                                    028b2964534ec73672e940b1d39800c01228ab40cfa923a7921d7726c68878a5

                                    SHA512

                                    7126814a86b53bca08d83cd552d5dd5c7a2700d76855afb37cb0192ea1e2d2cacd4970df01c4cc53afb53169206a9b0a502e120f227d08d7580e45c555eda933

                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tr42EG0.exe
                                    Filesize

                                    188KB

                                    MD5

                                    425e2a994509280a8c1e2812dfaad929

                                    SHA1

                                    4d5eff2fb3835b761e2516a873b537cbaacea1fe

                                    SHA256

                                    6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a

                                    SHA512

                                    080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Je6892.exe
                                    Filesize

                                    186KB

                                    MD5

                                    3a24a41f3044d90555f6cdea0f2533f8

                                    SHA1

                                    25a1913e9e41dd13039d023a5f63a050256c72ca

                                    SHA256

                                    5e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253

                                    SHA512

                                    8d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837

                                  • memory/1508-39-0x0000000000400000-0x0000000000409000-memory.dmp
                                    Filesize

                                    36KB

                                  • memory/2560-43-0x0000000000400000-0x000000000043E000-memory.dmp
                                    Filesize

                                    248KB

                                  • memory/2560-48-0x0000000007B50000-0x0000000007B5A000-memory.dmp
                                    Filesize

                                    40KB

                                  • memory/2560-50-0x0000000008A70000-0x0000000009088000-memory.dmp
                                    Filesize

                                    6.1MB

                                  • memory/2560-51-0x0000000007CF0000-0x0000000007DFA000-memory.dmp
                                    Filesize

                                    1.0MB

                                  • memory/2560-52-0x0000000007C20000-0x0000000007C32000-memory.dmp
                                    Filesize

                                    72KB

                                  • memory/2560-53-0x0000000007C80000-0x0000000007CBC000-memory.dmp
                                    Filesize

                                    240KB

                                  • memory/2560-54-0x0000000007E00000-0x0000000007E4C000-memory.dmp
                                    Filesize

                                    304KB

                                  • memory/4516-31-0x00000000049F0000-0x0000000004A82000-memory.dmp
                                    Filesize

                                    584KB

                                  • memory/4516-30-0x0000000002490000-0x00000000024AE000-memory.dmp
                                    Filesize

                                    120KB

                                  • memory/4516-29-0x0000000004AE0000-0x0000000005084000-memory.dmp
                                    Filesize

                                    5.6MB

                                  • memory/4516-28-0x00000000020A0000-0x00000000020C0000-memory.dmp
                                    Filesize

                                    128KB