Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:02

General

  • Target

    8682bf8baac5da4e90ff3187b5fc619cdce2926723cce0ce1ee89e8e97a5b391.exe

  • Size

    633KB

  • MD5

    de169c9c1956a49bf744a98a67d51767

  • SHA1

    72eb52d5fc25712eff8b9a04f440dbc53c9621ce

  • SHA256

    8682bf8baac5da4e90ff3187b5fc619cdce2926723cce0ce1ee89e8e97a5b391

  • SHA512

    8c9854bee92963dbe890b5c765cadadfbe74e2c25668332c4e4bbe160f16e69b31174e205fe59d3e4713a91cb3f4c05b5414c11f00df0762842e16d33b0388e7

  • SSDEEP

    12288:UMrOy90pkla9O0oWr9zBoFwta0Rm0c4tZhoNSK/kLn8D/ThIxVrim65Bk3Q8Y:CyXlLu5taKjcyohzAokg3

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8682bf8baac5da4e90ff3187b5fc619cdce2926723cce0ce1ee89e8e97a5b391.exe
    "C:\Users\Admin\AppData\Local\Temp\8682bf8baac5da4e90ff3187b5fc619cdce2926723cce0ce1ee89e8e97a5b391.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2Zk9TP.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2Zk9TP.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Hg45ca8.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Hg45ca8.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3684
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:1392
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 540
              5⤵
              • Program crash
              PID:4996
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 564
            4⤵
            • Program crash
            PID:4476
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Kj576CR.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Kj576CR.exe
          3⤵
          • Executes dropped EXE
          PID:4484
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3684 -ip 3684
      1⤵
        PID:5256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1392 -ip 1392
        1⤵
          PID:3792

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2Zk9TP.exe
          Filesize

          437KB

          MD5

          705cb5b831d7a7454db04aa472898f25

          SHA1

          aa4bb3a6cdd8acc129601faec2f2cbfa4d7a1f50

          SHA256

          b4e915d7e210cb0d88417c62d27ce79da3e1777b1ee83d80431272a70df3660e

          SHA512

          1b7b45e3663cc7ea741ccd19a1752f690f60123018d2a3bfa5e71e1bd6bc0a968ddfd5ddeb4fed65843168c24fded8be724a59d29f7b00a8beb32ec95c52b9c7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Hg45ca8.exe
          Filesize

          410KB

          MD5

          dd39d6766988df9572a05bfafa4dbd2d

          SHA1

          01209e325068c539aae50e4351e94b04fb74fe05

          SHA256

          466c3fa9e210a3440ad94394ca86963d205c88078356a2e2db76d2cb4c664530

          SHA512

          193504b2bbc46c95aef5b38009722445210b7d60264b31bbc6dad2a5cd60b4d93cf9290399e21532dc42a5fd2ecb0aa2e2cec8ebd878ac0a3c358601d3510c56

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Kj576CR.exe
          Filesize

          221KB

          MD5

          54d3afa0e01b3169885a55b4418fb403

          SHA1

          aeb5c38fd1160fbbf6c182cd7e04b6b5ee482af0

          SHA256

          abec754e378e00e900b42593c1c5345749d0ba29f6b5975ca371a2af64aea0a5

          SHA512

          d906386504cbabf2dede52a12831bc393a077b8b1f2b741537a1f0216859ca43000e14301641fde8b348422b4cc2539b6513466ef0cab1f55e4b0d937c3a620f

        • memory/1392-14-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/1392-15-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/1392-18-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/1392-16-0x0000000000400000-0x0000000000433000-memory.dmp
          Filesize

          204KB

        • memory/4484-23-0x00000000075A0000-0x0000000007B44000-memory.dmp
          Filesize

          5.6MB

        • memory/4484-22-0x00000000002F0000-0x000000000032E000-memory.dmp
          Filesize

          248KB

        • memory/4484-24-0x0000000007090000-0x0000000007122000-memory.dmp
          Filesize

          584KB

        • memory/4484-25-0x0000000004660000-0x000000000466A000-memory.dmp
          Filesize

          40KB

        • memory/4484-26-0x0000000008170000-0x0000000008788000-memory.dmp
          Filesize

          6.1MB

        • memory/4484-27-0x00000000073E0000-0x00000000074EA000-memory.dmp
          Filesize

          1.0MB

        • memory/4484-28-0x00000000072A0000-0x00000000072B2000-memory.dmp
          Filesize

          72KB

        • memory/4484-29-0x0000000007310000-0x000000000734C000-memory.dmp
          Filesize

          240KB

        • memory/4484-30-0x0000000007350000-0x000000000739C000-memory.dmp
          Filesize

          304KB