Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:50

General

  • Target

    18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749.exe

  • Size

    1.5MB

  • MD5

    b23eabcdc1fee8a2709e000cf0b7ddad

  • SHA1

    31970d062ede14d475d8eb2bc32700bed180b876

  • SHA256

    18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749

  • SHA512

    e9876a547eb5a78221e37b311af3f5aadbd28bb172dcd7aa53a80dade36c468922b3e4ca194c0e6e56122cac2e238053b9c8fd4c4af6f88e1f4adfafce719381

  • SSDEEP

    24576:HyhP8luo3ui/TREl1jNbyKsbpougGpk2ei0dnIwwROSclqIUMo/wxC:Scuo35TMNSFoFGpk3HdIvUlqI8/w

Malware Config

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749.exe
    "C:\Users\Admin\AppData\Local\Temp\18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pv9Cc40.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pv9Cc40.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nr8tJ69.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nr8tJ69.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:388
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Px1Ni90.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Px1Ni90.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4536
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Zf10vc7.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Zf10vc7.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3260
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2KT9589.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2KT9589.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:3516
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3cH80Vy.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3cH80Vy.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4624
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
              • Checks SCSI registry key(s)
              PID:1468
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4CE863Hg.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4CE863Hg.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4068
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:4416
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt1vO2.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt1vO2.exe
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4660
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1BEF.tmp\1BF0.tmp\1BF1.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt1vO2.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4100
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
              4⤵
                PID:4440
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                4⤵
                  PID:5064
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3980,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:8
            1⤵
              PID:4772
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4880,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4628 /prefetch:1
              1⤵
                PID:4792
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=5028,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4668 /prefetch:1
                1⤵
                  PID:4024
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=5468,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5476 /prefetch:1
                  1⤵
                    PID:3940
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5616,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5648 /prefetch:8
                    1⤵
                      PID:4348
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5668,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5812 /prefetch:1
                      1⤵
                        PID:936
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=6092,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=6164 /prefetch:1
                        1⤵
                          PID:2280
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6452,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=6484 /prefetch:8
                          1⤵
                            PID:4932
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6588,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=6460 /prefetch:1
                            1⤵
                              PID:3556
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5084,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5076 /prefetch:8
                              1⤵
                                PID:3080
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6748,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5308 /prefetch:8
                                1⤵
                                • Modifies registry class
                                PID:4392
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=5872,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=6856 /prefetch:8
                                1⤵
                                  PID:5620
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=6052,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=6848 /prefetch:8
                                  1⤵
                                    PID:5908

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\1BEF.tmp\1BF0.tmp\1BF1.bat

                                    Filesize

                                    88B

                                    MD5

                                    0ec04fde104330459c151848382806e8

                                    SHA1

                                    3b0b78d467f2db035a03e378f7b3a3823fa3d156

                                    SHA256

                                    1ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f

                                    SHA512

                                    8b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt1vO2.exe

                                    Filesize

                                    99KB

                                    MD5

                                    5606a568de57904f8229dbaf19f4a258

                                    SHA1

                                    dfe3655946a6d0842b72d8ea9038c60105adc4c0

                                    SHA256

                                    98fb1bbb63b3e968f1381514b907dd679a24052c0283769116f2831afa30b2ee

                                    SHA512

                                    ca3cf2d3bd997b96acaafddd2de088225fe7e8cfd2fc763f8f7b0a03360de42a9191550de52ea6a751817c859673978eea0a73af9d1f30541a5fd80811b50dfc

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pv9Cc40.exe

                                    Filesize

                                    1.4MB

                                    MD5

                                    eda9a7d785fecd9b436fc088d4db0ded

                                    SHA1

                                    99e35445a41f202073e9ebdc30c565e5413b503b

                                    SHA256

                                    97262c93471143b3fcfbec075b9666be2a6e0257dc0c905ecfe669fb98a1c924

                                    SHA512

                                    5fd563c99bebe6a2a5aa624b6884f8d3262f509e577f30930ab047afc58ad274c72972cd762e6d273543e3b0e169999584cf6ddaf54c02769585490ed19aa2a8

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4CE863Hg.exe

                                    Filesize

                                    1.2MB

                                    MD5

                                    267ef1a960bfb0bb33928ec219dc1cea

                                    SHA1

                                    fc28acaa6e4e4af3ad7fc8c2a851e84419a2eebf

                                    SHA256

                                    b462fedfb5904509e82387e2591bdb1ddfe6d12b6a28a189c6403a860050965e

                                    SHA512

                                    ba09e6c6b71426e09214c1c6773114d0a46edd133d711f81960390f940a81a695550971b30c1d292109873b524db94b596ecaebfaf379e6c6bcfd4089379e38f

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nr8tJ69.exe

                                    Filesize

                                    1005KB

                                    MD5

                                    7b36dbe49c1864ef33d6e4cdd5d681e7

                                    SHA1

                                    0a30aaca5c22fff0b617b4b940e922271cb06736

                                    SHA256

                                    d1bd8ef8978e3c7dca22d284f572c49f08b1b03437d9880b59f06035f8ed4055

                                    SHA512

                                    238fd3ec9dd63aa01472dcb254f9cf80b2b6500bda7c78574de4e4dcd53437024e43ed0a035521740d50deb2c90b8c3c0310f021297878caa1337470bc45852c

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3cH80Vy.exe

                                    Filesize

                                    973KB

                                    MD5

                                    5dc4be46727c1853e63ebdd240ec9bd9

                                    SHA1

                                    6265b41bbecbb96cf666d2b4cbd6f209f44d7a2d

                                    SHA256

                                    1df63e2de3adac7ff425c75b3f649078fd7a8e0008e5063bd290adb1cdba2446

                                    SHA512

                                    59828cba7af9fb26c6717eb3e655eec07f732ec92d3ec0cce7ed2df1acf6095dec2d97cdbbd3591ed96c08cb2adcff12c31534a93b48757ff8976c0a4233062b

                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Px1Ni90.exe

                                    Filesize

                                    621KB

                                    MD5

                                    52f0234149ed995de0c382f30e0b8b3b

                                    SHA1

                                    3c1760cf76fb3d78a0020eb1ab5af4f871aee242

                                    SHA256

                                    119a13ed0d6a719bd3098e46b92681522a3e057bcce225f9faded358ca092f75

                                    SHA512

                                    0154ea3a0056867386f8f046e2b4b0631cfd527513e02606733666429dd2c39583d65b2e12350fcdca1d02d905cf4200694b9c1b2228dff6f1de3132afe17862

                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Zf10vc7.exe

                                    Filesize

                                    195KB

                                    MD5

                                    7f726f7dac36a27880ea545866534dda

                                    SHA1

                                    a644a86f8ffe8497101eb2c8ef69b859fb51119d

                                    SHA256

                                    7d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a

                                    SHA512

                                    8d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775

                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2KT9589.exe

                                    Filesize

                                    1.1MB

                                    MD5

                                    a1c1c44e837edbc2d55d33ba9620a109

                                    SHA1

                                    0ba4e08d7b6f17f968d1f7cad75d0a3885bae998

                                    SHA256

                                    4160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5

                                    SHA512

                                    75267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc

                                  • memory/1468-43-0x0000000000400000-0x0000000000409000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/3260-28-0x0000000002360000-0x0000000002380000-memory.dmp

                                    Filesize

                                    128KB

                                  • memory/3260-29-0x0000000004B80000-0x0000000005124000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/3260-30-0x0000000002440000-0x000000000245E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/3260-31-0x0000000005130000-0x00000000051C2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/3516-37-0x0000000000400000-0x0000000000432000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/3516-39-0x0000000000400000-0x0000000000432000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/3516-36-0x0000000000400000-0x0000000000432000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/4416-52-0x0000000007A80000-0x0000000007A8A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/4416-47-0x0000000000400000-0x000000000043E000-memory.dmp

                                    Filesize

                                    248KB

                                  • memory/4416-54-0x0000000008A80000-0x0000000009098000-memory.dmp

                                    Filesize

                                    6.1MB

                                  • memory/4416-55-0x0000000007D70000-0x0000000007E7A000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/4416-56-0x0000000007C60000-0x0000000007C72000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/4416-57-0x0000000007CC0000-0x0000000007CFC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/4416-58-0x0000000007D00000-0x0000000007D4C000-memory.dmp

                                    Filesize

                                    304KB