Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 09:04

General

  • Target

    f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe

  • Size

    436KB

  • MD5

    d213e2080232807a50a68cf06de48dd0

  • SHA1

    a09601da7b45676d1a3cb07d767e093399d14b60

  • SHA256

    f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b

  • SHA512

    03867c11eed2d693fc1cd81da1c8c29b74bb6c45ff4f608ceb5c411ef8d9ba6e8fbad68a17bd4558c2055aa8258e1b39e24daca8d18558912ae0d6e7f16673d2

  • SSDEEP

    12288:DMrUy90Y4kZKi2MwPlfAbMdllZ+jYIvK4+IA:3yNnKi2NPZPcsIy4rA

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe
    "C:\Users\Admin\AppData\Local\Temp\f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Gt13zT6.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Gt13zT6.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:4540
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 540
            4⤵
            • Program crash
            PID:1152
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 152
          3⤵
          • Program crash
          PID:5004
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2KF781qu.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2KF781qu.exe
        2⤵
        • Executes dropped EXE
        PID:4624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4540 -ip 4540
      1⤵
        PID:4344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 880 -ip 880
        1⤵
          PID:3568

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1Gt13zT6.exe
          Filesize

          407KB

          MD5

          c4f75f4b0ff938695609a2ea3e7537e8

          SHA1

          0a86bcdf06134008d592a425ce9f34f66120eb18

          SHA256

          0968244472af3762bb29e125b6b66d6ffca7f0a039834f1436dd69c2c2e468ff

          SHA512

          a3e8e23e12434cab015fe95ed5dbb0b420dd0c4a36a61e314d90382084d77231b67c16aaef6e4b630ffb901380d263402807ea74455352067a86e4eedbfe7f3f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2KF781qu.exe
          Filesize

          221KB

          MD5

          2518b6c23b3dbfab5ef7e0a9f51a8bc3

          SHA1

          2289c03e2654136a64aa1b8495c10137a37ffd39

          SHA256

          cb6a55e7d2acfa3bab6c6f901e19a7be1a791765683755c2d0775c76104e6ecc

          SHA512

          d31db3ede2e792f5c9732ccaa2b2345e87fec68ad859c1035ffae255d0abd4fa5559bb7494982b5c191e7dbc6f6478c2a054b323d9e63cb922a1ac1977592813

        • memory/4540-7-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/4540-11-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/4540-10-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/4540-8-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/4624-17-0x00000000080C0000-0x0000000008664000-memory.dmp
          Filesize

          5.6MB

        • memory/4624-16-0x0000000000CE0000-0x0000000000D1E000-memory.dmp
          Filesize

          248KB

        • memory/4624-15-0x0000000074BBE000-0x0000000074BBF000-memory.dmp
          Filesize

          4KB

        • memory/4624-18-0x0000000007BF0000-0x0000000007C82000-memory.dmp
          Filesize

          584KB

        • memory/4624-19-0x0000000003030000-0x000000000303A000-memory.dmp
          Filesize

          40KB

        • memory/4624-20-0x0000000074BB0000-0x0000000075360000-memory.dmp
          Filesize

          7.7MB

        • memory/4624-21-0x0000000008C90000-0x00000000092A8000-memory.dmp
          Filesize

          6.1MB

        • memory/4624-22-0x0000000008670000-0x000000000877A000-memory.dmp
          Filesize

          1.0MB

        • memory/4624-23-0x0000000007CD0000-0x0000000007CE2000-memory.dmp
          Filesize

          72KB

        • memory/4624-24-0x0000000007E40000-0x0000000007E7C000-memory.dmp
          Filesize

          240KB

        • memory/4624-25-0x0000000007ED0000-0x0000000007F1C000-memory.dmp
          Filesize

          304KB

        • memory/4624-26-0x0000000074BBE000-0x0000000074BBF000-memory.dmp
          Filesize

          4KB

        • memory/4624-27-0x0000000074BB0000-0x0000000075360000-memory.dmp
          Filesize

          7.7MB