Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:02

General

  • Target

    4bd974094233a10e7da32c9aadcee1df6ea2adcf713f0732f2dd1d84d4252fae.exe

  • Size

    383KB

  • MD5

    a4bd7b390a1aea0ac6b619a180b54da8

  • SHA1

    786b0029683758fb7e1636aa8cbf4e7ec450743e

  • SHA256

    4bd974094233a10e7da32c9aadcee1df6ea2adcf713f0732f2dd1d84d4252fae

  • SHA512

    e4b7500520e95111526b6065e075909e3035b6aeb8eab38d7cabdbfc367e909e8d7c37f58c279d8851e350fb54c4e4a735580fc28eade915cf767a35db09c8fa

  • SSDEEP

    6144:Kdy+bnr+Np0yN90QE6s8RLa+Uu+jhvDNmW+G1YqK9Fe9VJRspU58kMTi1tKCCBJ:jMrVy90os8RlUu+jhvZmpGaqIQC655P+

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bd974094233a10e7da32c9aadcee1df6ea2adcf713f0732f2dd1d84d4252fae.exe
    "C:\Users\Admin\AppData\Local\Temp\4bd974094233a10e7da32c9aadcee1df6ea2adcf713f0732f2dd1d84d4252fae.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1uV01Oc1.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1uV01Oc1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:1936
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:1192
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 552
              4⤵
              • Program crash
              PID:4488
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 604
            3⤵
            • Program crash
            PID:2044
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2UV178uW.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2UV178uW.exe
          2⤵
          • Executes dropped EXE
          PID:4120
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1192 -ip 1192
        1⤵
          PID:3632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1444 -ip 1444
          1⤵
            PID:2428

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Modify Registry

          1
          T1112

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1uV01Oc1.exe
            Filesize

            295KB

            MD5

            6b4c00bae3d4eaeb64f31cb61fab1318

            SHA1

            59ae12cf1138091156014fca5c09db5ce098f2e7

            SHA256

            f4aece32ea5ddf8c8e0387e67d53abf0342ddf4df0ad0cc18778b786a4179222

            SHA512

            17f3d79b509d02f9ae113d4e143741598ab174967b5e777a702226924bb22026422222c196e9befe88414101cae6c90fec4a021f9ffcdc866507cdaea642027c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2UV178uW.exe
            Filesize

            222KB

            MD5

            00c88dafb810e890a0b0007c7e9301ad

            SHA1

            a8efaa16da1bc74cbb1a80bc1c4712c260e3452b

            SHA256

            4be22d6b7385b77f07d742c9a10e5885df84d9cad370b5b5e99b9cb7781ea48e

            SHA512

            54d8bfd5c8613aac6c26e81f758975068832de88368a787259184ff91f906483d32c7d32081650db6293ace0c66b920a3c57cd37f6e2f29ce779e719663d46cf

          • memory/1192-7-0x0000000000400000-0x0000000000432000-memory.dmp
            Filesize

            200KB

          • memory/1192-9-0x0000000000400000-0x0000000000432000-memory.dmp
            Filesize

            200KB

          • memory/1192-11-0x0000000000400000-0x0000000000432000-memory.dmp
            Filesize

            200KB

          • memory/1192-8-0x0000000000400000-0x0000000000432000-memory.dmp
            Filesize

            200KB

          • memory/4120-17-0x0000000007950000-0x0000000007EF4000-memory.dmp
            Filesize

            5.6MB

          • memory/4120-16-0x00000000006B0000-0x00000000006EE000-memory.dmp
            Filesize

            248KB

          • memory/4120-15-0x0000000074B6E000-0x0000000074B6F000-memory.dmp
            Filesize

            4KB

          • memory/4120-18-0x0000000007480000-0x0000000007512000-memory.dmp
            Filesize

            584KB

          • memory/4120-19-0x0000000002910000-0x000000000291A000-memory.dmp
            Filesize

            40KB

          • memory/4120-20-0x0000000074B60000-0x0000000075310000-memory.dmp
            Filesize

            7.7MB

          • memory/4120-21-0x0000000008520000-0x0000000008B38000-memory.dmp
            Filesize

            6.1MB

          • memory/4120-23-0x0000000007560000-0x0000000007572000-memory.dmp
            Filesize

            72KB

          • memory/4120-22-0x0000000007F00000-0x000000000800A000-memory.dmp
            Filesize

            1.0MB

          • memory/4120-24-0x00000000075E0000-0x000000000761C000-memory.dmp
            Filesize

            240KB

          • memory/4120-25-0x0000000007750000-0x000000000779C000-memory.dmp
            Filesize

            304KB

          • memory/4120-26-0x0000000074B6E000-0x0000000074B6F000-memory.dmp
            Filesize

            4KB

          • memory/4120-27-0x0000000074B60000-0x0000000075310000-memory.dmp
            Filesize

            7.7MB