Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 11:20

General

  • Target

    29d3a95944732180e7b649fa96bb2f15636a9658a83828117964eea5a39c72db.exe

  • Size

    1.1MB

  • MD5

    65f3094287ecabb93243414da30c83fb

  • SHA1

    618b22115bae825725f7e9544060ab66ac1a889b

  • SHA256

    29d3a95944732180e7b649fa96bb2f15636a9658a83828117964eea5a39c72db

  • SHA512

    deb98c2947fd3a84cd4461c712394c00ebbaf5317c3969bcc3fcd8ffda4d58dc78b24992dc9f0d933302a57937d1cdc84749fa55f311ed3ca6ed6a29bc7c406f

  • SSDEEP

    24576:JyIlMs03q2/LvDsuZTe+tCbubF+KSSguGnS:8yMarCTgSbZ3x

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29d3a95944732180e7b649fa96bb2f15636a9658a83828117964eea5a39c72db.exe
    "C:\Users\Admin\AppData\Local\Temp\29d3a95944732180e7b649fa96bb2f15636a9658a83828117964eea5a39c72db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IW1vb5MJ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IW1vb5MJ.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jX6Ft7TL.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jX6Ft7TL.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\CM3mW2ny.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\CM3mW2ny.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BT3zU2wC.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BT3zU2wC.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4864
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hT90KL0.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hT90KL0.exe
              6⤵
              • Executes dropped EXE
              PID:980
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mV826XM.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mV826XM.exe
              6⤵
              • Executes dropped EXE
              PID:2328

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\IW1vb5MJ.exe
    Filesize

    1005KB

    MD5

    9f64758f90252197ce742eb280045c44

    SHA1

    e48d61f46caaae0fcf91e2cd26b905f35240a45d

    SHA256

    d8c5945c706946b2628edbf03b67617b88adbcdb648a1a8b72981e9bb3d3726b

    SHA512

    2f038365bbdd16bc12dc0358222db301bed93e19b99338d2a50eb4ba993802657ed3afb14b0dc9460b6b123805186b00139f9000bc2b01c7a9427d97f8fbd16e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jX6Ft7TL.exe
    Filesize

    816KB

    MD5

    205189dc1688265490cf8e8e60bf4886

    SHA1

    4eecbcb3fa3483903643335c89c72b3761858243

    SHA256

    ce7c9b30a39d834a67c904f90b639ae06d72918ac19577d2b904156d8250a878

    SHA512

    7c5a131b42caa9872f42b7687f5954851b708507698ddb843b8e04939354a44c759a182d72e3b711b1894a8b39576d864e8369ada7feb25531b0892a87fd5795

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\CM3mW2ny.exe
    Filesize

    522KB

    MD5

    697b54c43ef3fe4001c7a878995acac2

    SHA1

    300cbd67cf151d04e8872f3eb36e67e72ef9236a

    SHA256

    13a46997fe702d49985abadff522a6df64e62619c0bb4d9c8abbb9c5d48ca432

    SHA512

    238c6003c8a12e617a197bb02e453e24c8d29db754029a02237f911184fb2afcff1c2646f3ac3c0e60966acb5c571933a3f9df00804f40a6088ccd59af29fe90

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BT3zU2wC.exe
    Filesize

    326KB

    MD5

    65b7bc9e767e9689c561002987210bf9

    SHA1

    ae74f3fcefd7297ee2c3748f68d789b77c0385b2

    SHA256

    c71eadf67b03bbe5c4390e3ca1da9108215aba75adf3d3ef5452116d2aea7629

    SHA512

    f30e3abeac29b334ef3372f6da5ef5421f3e8ad492497f3c49de99134a61f81d8e7e5db64858c9a83122355070160172b84a64a356e0a8f1ddc955790ee4b47c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hT90KL0.exe
    Filesize

    190KB

    MD5

    a6656e3d6d06c8ce9cbb4b6952553c20

    SHA1

    af45103616dc896da5ee4268fd5f9483b5b97c1c

    SHA256

    fec303b128c44607654c078736b96d2762722f51b6c473dfe5415158fd83718b

    SHA512

    f53f2214d3f192a352b2a93c66d91988a41a5ab9dbf15edd62ea8ce38da8a732114e3c46526d4dc6f3132330913b1acb90fa11ff454a1520d117149a86678d84

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mV826XM.exe
    Filesize

    221KB

    MD5

    7e9b5ac79ffaaa033b9737c4eb0e5d99

    SHA1

    ea261678122745fdee92a33feccb8853cde72bc3

    SHA256

    c1217312fb8ac91c3f3e9db13f84540c26118670481775c81fd92d7ddf472c87

    SHA512

    7d41ed2ad74a611366c793e6e8f2991de704e4ee657ef3f7c3a8414754489e2b5f13f231782b5342ca266de10aa507c36e5bdf4c300a527c2f1591505774db71

  • memory/2328-38-0x0000000000E50000-0x0000000000E8E000-memory.dmp
    Filesize

    248KB

  • memory/2328-39-0x0000000008150000-0x00000000086F4000-memory.dmp
    Filesize

    5.6MB

  • memory/2328-40-0x0000000007C40000-0x0000000007CD2000-memory.dmp
    Filesize

    584KB

  • memory/2328-41-0x0000000003050000-0x000000000305A000-memory.dmp
    Filesize

    40KB

  • memory/2328-42-0x0000000008D20000-0x0000000009338000-memory.dmp
    Filesize

    6.1MB

  • memory/2328-43-0x0000000008010000-0x000000000811A000-memory.dmp
    Filesize

    1.0MB

  • memory/2328-44-0x0000000007D00000-0x0000000007D12000-memory.dmp
    Filesize

    72KB

  • memory/2328-45-0x0000000007D60000-0x0000000007D9C000-memory.dmp
    Filesize

    240KB

  • memory/2328-46-0x0000000007F00000-0x0000000007F4C000-memory.dmp
    Filesize

    304KB