Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:02

General

  • Target

    cb020fc0d9bc2f1a1038f879535d484db85fe92edd2562e714b41c91bcabf01b.exe

  • Size

    1.3MB

  • MD5

    5c66f7308c599fa90fa4b91c937fe140

  • SHA1

    6305658ffed1ef86dcafbb70f142bd71469aa703

  • SHA256

    cb020fc0d9bc2f1a1038f879535d484db85fe92edd2562e714b41c91bcabf01b

  • SHA512

    3bcde0bd89baceb953a86c0cf09cde33d541bcc77041f558188dff2956eb0374db90eae5064d171e40469dd3c029f6f632ff2cf99b67394a77e353e80d6abee6

  • SSDEEP

    24576:dyZySQLGn6yF7jc7iDI50GGCyADX6MOlNgpUJpIP9dD1S1CQ8+g8li1YQ9:4ZcHyNjguEgCyCqpJ21DZAi

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb020fc0d9bc2f1a1038f879535d484db85fe92edd2562e714b41c91bcabf01b.exe
    "C:\Users\Admin\AppData\Local\Temp\cb020fc0d9bc2f1a1038f879535d484db85fe92edd2562e714b41c91bcabf01b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NX4Zu56.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NX4Zu56.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pK3zd98.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pK3zd98.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1so25Po0.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1so25Po0.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:1080
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
              • Modifies Windows Defender Real-time Protection settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1496
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 600
              5⤵
              • Program crash
              PID:2024
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2AY6521.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2AY6521.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4768
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:1240
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 136
                5⤵
                • Program crash
                PID:1328
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3it79lf.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3it79lf.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2836
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
              • Checks SCSI registry key(s)
              PID:2976
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 148
              4⤵
              • Program crash
              PID:4880
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4BO407VY.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4BO407VY.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:4108
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 148
              3⤵
              • Program crash
              PID:400
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2740 -ip 2740
          1⤵
            PID:1636
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4768 -ip 4768
            1⤵
              PID:528
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2836 -ip 2836
              1⤵
                PID:3520
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1988 -ip 1988
                1⤵
                  PID:1444

                Network

                MITRE ATT&CK Matrix ATT&CK v13

                Persistence

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Privilege Escalation

                Create or Modify System Process

                1
                T1543

                Windows Service

                1
                T1543.003

                Boot or Logon Autostart Execution

                1
                T1547

                Registry Run Keys / Startup Folder

                1
                T1547.001

                Defense Evasion

                Modify Registry

                2
                T1112

                Impair Defenses

                1
                T1562

                Disable or Modify Tools

                1
                T1562.001

                Discovery

                Query Registry

                1
                T1012

                Peripheral Device Discovery

                1
                T1120

                System Information Discovery

                1
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4BO407VY.exe
                  Filesize

                  1.2MB

                  MD5

                  0235c707f333e8b0c693e1915ebb3fc3

                  SHA1

                  47e304cbe75b8f64d1d3fb0c3f72e49847b27fc4

                  SHA256

                  977e0625408ec0bd175e25c8b012fe071fbafbd83fd8cb34e0c163bd636d16d5

                  SHA512

                  e25fea0463f4eee13d899b120cadb2a323ac2ca6250e37fd78f8b1220de4d63077f75aa3ae35f29125f61cf6c5c35be4bef2bf866c2b6267a29935c650e86ef3

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NX4Zu56.exe
                  Filesize

                  930KB

                  MD5

                  b0772ff115da589e95d1f6e644194361

                  SHA1

                  055891e76820a4fc260f073d181677cec70dd74a

                  SHA256

                  2a6ee4db132a17f81b9b0e596f81391a45483d938c8a8eb954c287f749d1ea1a

                  SHA512

                  39a8a7cf0dffccaadb52b6b70e4d9ad64508c57ddf58ca067d52a0dfb8b7441f15e9bf29e83abb0fff95611ea8dda264b0f24af8e989ddd669235d235b4d44d0

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3it79lf.exe
                  Filesize

                  965KB

                  MD5

                  54154f8baa668a459aad087aaf9fcd61

                  SHA1

                  90a624d443c5a020b6442bd8fccfcf72fe30fe60

                  SHA256

                  f937010ec9d3b75f50bd9d80cb2603695a6bf437c9d2b53e6e2e0242810777ed

                  SHA512

                  c0871c6dc2cd8bbe2b843dd1055e7370e362430425756a7abd3242f5afeaaad0bb24ebab836929af38c733149c83b9790967c5d99fb265e38efec68b754dbbdb

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pK3zd98.exe
                  Filesize

                  547KB

                  MD5

                  5f8cc50a51e4a93fd503afeb66887eb5

                  SHA1

                  60ba3afdba07942a7a45f7ec55d4725b363accbb

                  SHA256

                  d82828cfd4f430533fd8d6ff0e6d493f4556abc560b8b63a230a2b14cd897e00

                  SHA512

                  f5e334a30127f5c95e78cbe8af1b0ed51fabb3d1a0a140bd7266baff5827972a94bb5a3c0418a01a526a3bf148c44353fcb963b9449741db0d4a1af78038ee0d

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1so25Po0.exe
                  Filesize

                  232KB

                  MD5

                  3ff825411b1fe07e712a5dcae34f80eb

                  SHA1

                  e3e4358cabfa74d6e36e26754b01ed78434a6877

                  SHA256

                  69bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739

                  SHA512

                  325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2AY6521.exe
                  Filesize

                  1.1MB

                  MD5

                  75dcafe21382b6abec2fdd51d3893d78

                  SHA1

                  41c9b42f664c248243b7f20bc2b86a93c23bebeb

                  SHA256

                  49e0d6647b9fbf2e9c6926734504e3e2a5f8c0cd5ddda1470aa63c0496d26b90

                  SHA512

                  34c5c792229d51c75928197f346b1192dd3c8a81580acbd457dceb4f34b70ed2c2f4501682ab94bd5b1c10270e08b47698bdf6f9d52972daa11641d167adf4fd

                • memory/1240-25-0x0000000000400000-0x0000000000433000-memory.dmp
                  Filesize

                  204KB

                • memory/1240-26-0x0000000000400000-0x0000000000433000-memory.dmp
                  Filesize

                  204KB

                • memory/1240-28-0x0000000000400000-0x0000000000433000-memory.dmp
                  Filesize

                  204KB

                • memory/1496-21-0x0000000000400000-0x000000000040A000-memory.dmp
                  Filesize

                  40KB

                • memory/2976-32-0x0000000000400000-0x0000000000409000-memory.dmp
                  Filesize

                  36KB

                • memory/4108-38-0x0000000007AD0000-0x0000000007B62000-memory.dmp
                  Filesize

                  584KB

                • memory/4108-37-0x0000000007FA0000-0x0000000008544000-memory.dmp
                  Filesize

                  5.6MB

                • memory/4108-36-0x0000000000400000-0x000000000043E000-memory.dmp
                  Filesize

                  248KB

                • memory/4108-39-0x0000000002E70000-0x0000000002E7A000-memory.dmp
                  Filesize

                  40KB

                • memory/4108-40-0x0000000008B70000-0x0000000009188000-memory.dmp
                  Filesize

                  6.1MB

                • memory/4108-41-0x0000000007E80000-0x0000000007F8A000-memory.dmp
                  Filesize

                  1.0MB

                • memory/4108-42-0x0000000007CF0000-0x0000000007D02000-memory.dmp
                  Filesize

                  72KB

                • memory/4108-43-0x0000000007D70000-0x0000000007DAC000-memory.dmp
                  Filesize

                  240KB

                • memory/4108-44-0x0000000007DB0000-0x0000000007DFC000-memory.dmp
                  Filesize

                  304KB