Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 23:02
Static task
static1
Behavioral task
behavioral1
Sample
d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe
Resource
win10v2004-20231215-en
General
-
Target
d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe
-
Size
639KB
-
MD5
92346d27eabac81e606d7153397e64e2
-
SHA1
fd2b60f3663a6ffe24db4d8bd4d244bfd7e0ecaa
-
SHA256
d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200
-
SHA512
446b3f391e6f55bd1fb69969e74c42ba298bd06ab9509130e639da3e03f2720fa753921a1aec5c8e7732928d125a97a9ae2e0a2dbe7b705c1e183ab8a41c3063
-
SSDEEP
12288:EMrWy90u8xoCoUCnq8yr2b2VmLKGQDzLfTf/1TW:ay9817x2wG+zHBW
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2628-53-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2628-51-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2628-49-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2628-47-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2628-46-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2628-45-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 3008 ao8cz88.exe 2744 1Og26XL6.exe 2816 2cS3266.exe 2712 3dQ39Aq.exe -
Loads dropped DLL 11 IoCs
pid Process 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 3008 ao8cz88.exe 3008 ao8cz88.exe 3008 ao8cz88.exe 2744 1Og26XL6.exe 3008 ao8cz88.exe 3008 ao8cz88.exe 2816 2cS3266.exe 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 2712 3dQ39Aq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ao8cz88.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2744 set thread context of 2852 2744 1Og26XL6.exe 30 PID 2816 set thread context of 2628 2816 2cS3266.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2588 2628 WerFault.exe 32 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3dQ39Aq.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3dQ39Aq.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3dQ39Aq.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 3dQ39Aq.exe 2712 3dQ39Aq.exe 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found 1264 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2712 3dQ39Aq.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2852 AppLaunch.exe Token: SeShutdownPrivilege 1264 Process not Found -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 1104 wrote to memory of 3008 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 28 PID 1104 wrote to memory of 3008 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 28 PID 1104 wrote to memory of 3008 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 28 PID 1104 wrote to memory of 3008 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 28 PID 1104 wrote to memory of 3008 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 28 PID 1104 wrote to memory of 3008 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 28 PID 1104 wrote to memory of 3008 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 28 PID 3008 wrote to memory of 2744 3008 ao8cz88.exe 29 PID 3008 wrote to memory of 2744 3008 ao8cz88.exe 29 PID 3008 wrote to memory of 2744 3008 ao8cz88.exe 29 PID 3008 wrote to memory of 2744 3008 ao8cz88.exe 29 PID 3008 wrote to memory of 2744 3008 ao8cz88.exe 29 PID 3008 wrote to memory of 2744 3008 ao8cz88.exe 29 PID 3008 wrote to memory of 2744 3008 ao8cz88.exe 29 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 2744 wrote to memory of 2852 2744 1Og26XL6.exe 30 PID 3008 wrote to memory of 2816 3008 ao8cz88.exe 31 PID 3008 wrote to memory of 2816 3008 ao8cz88.exe 31 PID 3008 wrote to memory of 2816 3008 ao8cz88.exe 31 PID 3008 wrote to memory of 2816 3008 ao8cz88.exe 31 PID 3008 wrote to memory of 2816 3008 ao8cz88.exe 31 PID 3008 wrote to memory of 2816 3008 ao8cz88.exe 31 PID 3008 wrote to memory of 2816 3008 ao8cz88.exe 31 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 2816 wrote to memory of 2628 2816 2cS3266.exe 32 PID 1104 wrote to memory of 2712 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 34 PID 1104 wrote to memory of 2712 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 34 PID 1104 wrote to memory of 2712 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 34 PID 1104 wrote to memory of 2712 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 34 PID 1104 wrote to memory of 2712 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 34 PID 1104 wrote to memory of 2712 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 34 PID 1104 wrote to memory of 2712 1104 d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe 34 PID 2628 wrote to memory of 2588 2628 AppLaunch.exe 33 PID 2628 wrote to memory of 2588 2628 AppLaunch.exe 33 PID 2628 wrote to memory of 2588 2628 AppLaunch.exe 33 PID 2628 wrote to memory of 2588 2628 AppLaunch.exe 33 PID 2628 wrote to memory of 2588 2628 AppLaunch.exe 33 PID 2628 wrote to memory of 2588 2628 AppLaunch.exe 33 PID 2628 wrote to memory of 2588 2628 AppLaunch.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe"C:\Users\Admin\AppData\Local\Temp\d6069cb7acd4675b324603f2adc3e83fa7fa1829e73052a8d62a10f3d99a8200.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ao8cz88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ao8cz88.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Og26XL6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Og26XL6.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2cS3266.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2cS3266.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 2685⤵
- Program crash
PID:2588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3dQ39Aq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3dQ39Aq.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD5a02e25299ae857551a4525647fc0533d
SHA172b43753b24d89b5383bfe1332dfec7413ddc00c
SHA256fb9efd950ddab810501c8d3c22736d03896ef860696c06631c988c618f5bcf4c
SHA51207877106f8540b38eda894fe7d67b1b99579bceee0d8e17e1fb191eabd95bdb45133509e6441e832dfe788132763aa2add4aef341b8f4f62fec2ddd3f5113dd0
-
Filesize
256KB
MD569a74eecd191ba7d2209d071f05cccfe
SHA145455ebbc2e39024c0d95700677cc168fe5a8e6d
SHA2565d43a32202cb9fd525d48c0343481da7b8cd0fcf583f1de524d79f9192707f02
SHA512a96745f60f9617d3df18f0ccc779a75cf4d12e9f58e935145ba8d3e14093daff96ac2666da52542777c813a7b50ad9614aac81b8631c18e13982b5145d30c293
-
Filesize
173KB
MD5440c22f3e7d0b38255c37236d33d6832
SHA1e1a1647f6ba6d6d27d408a4478748097000673ee
SHA2567e19aa756bd02f64ca5d04025c6a872c07721a549572d74ed35132b7d3455df0
SHA5125162723b38925c4baf30f28ef793d9d70af1d0f8c02c3e795564de38ecf8ba3c73f4262b5d29aa3c977dabcab134cc47ccf5156eba06cdf9bc1325374b3f2432
-
Filesize
996KB
MD56eab46ee6fbac82c86b32e64008c079f
SHA1ef73e35ca28c50c2011ef9d85f4f002168e18948
SHA256cdd10f4073bb1272d30ad3dcd8fc6cb85f34335c321d7ec70d1cda28a9db0344
SHA51290880f77366f836efe638dd4edab2d2bc3e80f1934d51a7dea2735b447fa0dc94861b8a952d731990e435f40668db611e9216de09f037c04da1154b5041da557
-
Filesize
1.0MB
MD5a5a72ed79ae5e9780a11e88e6c6853c2
SHA19c59ba2bdb9066bedc108596ed94633c824edec8
SHA2564d29c049f541cf4cfc30160228c05c981a115b3890004fb839ff261b99b62051
SHA51284b85e7ce7701c18bffba0a76a289ab8f43dffaa77604d2c4e3682feb3dd8e937a70b00aba3213c5303d3ffa7bfc7e97008d39505087ace7c3cce9baac9b9d88
-
Filesize
1.0MB
MD5008e69cb02320bda4f40847c5b33d981
SHA128457b56575ff875e22d07fad9a4983e19358d0e
SHA2565e4905f7a83a64605b0d5bf4932db061a62ab2fb9175467a88cb9a9544e3e99b
SHA512e97db179af714a6c4d111cc5cf988731ae4d9f3cd992ddf2e9a3e3a12c7bf82ab3e16d1a7db449eb6bee98d48f399f25a816f5fa4873e3eaf3efbaf57f19b6fc
-
Filesize
31KB
MD56c37f769c720938dd2223863c71e961e
SHA132f2c9e51dd144da0023f4ef81fdc15e11fc02da
SHA2560d68b15aed1853a449c5baf28d7cb6249a18a47e3559010814b82b5fccc21caa
SHA5120cb767ca9faf107944e0dcd469750910df9b5df7d9ddae0d33dbe28f86bab57f37eadf1f2405296b19e03e884e6316528009bbc29ef2b0b78cbf722afaa286ee
-
Filesize
512KB
MD5a673261447c67cf21f13cce6ba114409
SHA1529ef4295788f243528a72f65dc2caaa7c506f84
SHA256eefc4b39620d55f016fd5e64a7443c6572676711bb11d1c91ca4c27ae5522d7b
SHA5120c68ae576d8665f693d55759c6d44176379e7b0166fa3a5af307a72c42ee3f21930f6a49d799e4f39c691e9ea0b389c8dda3689aa08f1e490f6733cb5a51c477
-
Filesize
320KB
MD5a76564016497fb49d777412fff3e62db
SHA1d45c27dfb3390b3b86594bdab853d5555730b4da
SHA2561ac82071a3a37606d282684e575befd87c1007e05db784e72ac5582711e77798
SHA5121121f7fa501dc7cb68d48b245d2ac96a1fc475c6e11fa532704931c4397994a965664e9b88d97de88aef8fc4bd98096578920ff9eedda9921f9db7855f36ee4a
-
Filesize
869KB
MD55f0632d60d00f8f6ab677ee7f8727416
SHA1ab4db63850568f0d3ea91e0c2665b59317fa22c9
SHA2567247d13084eea57e8d80d6fdb483bb8ec4ad8a96c846e9c1193390829daeb08d
SHA512254af7965a2d6662afa77650a79954bd754bc7727384bf7b4d60cae49c49c3bbc6173f4b461a3f1af5cafb5b83531a6ffe9660cd92ee3824f896f8861c76dbc9
-
Filesize
850KB
MD5d00ca90be1418632316af1aebd257e71
SHA11aff3476f97ac456e4ab507199e5477f6dfab5eb
SHA2561c23d30504df7cc9898df49f457c74a312dfab14ae4554bef1b789c212ec4379
SHA51235762d29c5c08782e36714e697e1564d847f6c04dda15e2acb41110b6e2e74693f0b4fa55fe743c76cfdd3e65231cbe0daa8ab6a200d1afd8bba55b607d2208e
-
Filesize
648KB
MD5b43b79c2c244060f5d833575c9c872ad
SHA1221ee1bb014610fcc837b1292290186cb9b50bbf
SHA25632ad3ade0702c74fc35e966244f7f50d710754ebfecad113e6c058eb0a3829a8
SHA512a0851ce47e8046b07ad57cc96d7607011cb9661d92f59e3389ddab9756bb1dcea2c21e258569b01a2b60e36771b32b6d699759923bf646bc7be3897e4f768009