Analysis
-
max time kernel
92s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe
Resource
win10v2004-20240412-en
General
-
Target
8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe
-
Size
523KB
-
MD5
dcee3487134de31384cc480650d0b872
-
SHA1
728aac232b591c08d2a0a727a5024afdb17f3b56
-
SHA256
8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9
-
SHA512
dd0751578f48b5a2e6931c31865c235f464fb3d6fe4bdbd8389ab9d8429b0ffb69205773b276dc930ab1dc672fe7ed724559bdb4a1896ba26bc9cd3b74570399
-
SSDEEP
12288:4Mr8y900yOk63JeBswLMA9Kyzr7Hx/XupZF7:UyMx0eB0Ryzr7Hx/XupZF7
Malware Config
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/2004-12-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/2004-13-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/2004-14-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral1/memory/2004-16-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
Executes dropped EXE 2 IoCs
pid Process 4784 1xs28ee6.exe 4504 2pm7744.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4784 set thread context of 4152 4784 1xs28ee6.exe 90 PID 4504 set thread context of 2004 4504 2pm7744.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 3568 2004 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4152 AppLaunch.exe 4152 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4152 AppLaunch.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4784 4052 8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe 89 PID 4052 wrote to memory of 4784 4052 8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe 89 PID 4052 wrote to memory of 4784 4052 8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe 89 PID 4784 wrote to memory of 4152 4784 1xs28ee6.exe 90 PID 4784 wrote to memory of 4152 4784 1xs28ee6.exe 90 PID 4784 wrote to memory of 4152 4784 1xs28ee6.exe 90 PID 4784 wrote to memory of 4152 4784 1xs28ee6.exe 90 PID 4784 wrote to memory of 4152 4784 1xs28ee6.exe 90 PID 4784 wrote to memory of 4152 4784 1xs28ee6.exe 90 PID 4784 wrote to memory of 4152 4784 1xs28ee6.exe 90 PID 4784 wrote to memory of 4152 4784 1xs28ee6.exe 90 PID 4052 wrote to memory of 4504 4052 8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe 91 PID 4052 wrote to memory of 4504 4052 8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe 91 PID 4052 wrote to memory of 4504 4052 8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe 91 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93 PID 4504 wrote to memory of 2004 4504 2pm7744.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe"C:\Users\Admin\AppData\Local\Temp\8abe67f3fa19414604fbb2a1510012895dbf0e89c55c9ff8d1a156b868ee9bf9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1xs28ee6.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1xs28ee6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2pm7744.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2pm7744.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 5404⤵
- Program crash
PID:3568
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2004 -ip 20041⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
878KB
MD5339ea0b5985189bed9df55b41d322bfd
SHA11bfaf3fe436a2c778d3274fc2d729f7a706fca47
SHA256c4bd0604ca387c82df1418215f3a408bc3e2877531c2f355f6df8569b7de2b49
SHA5123f1cce7155e0fca30cc9469c0566e40c43f28df6445fc284521283da0aa9f01c67b3fc026a3b9841f1630f677fa8326dba69171d594013d601beb50c68ed3f87
-
Filesize
1.1MB
MD56c0733d56c61c694254f33440224ade4
SHA145c9a26fbe1d7d1221655ee0ea85a2e8a138eab6
SHA2563a8f1997f1e756b408fa3e20bfd1e3fccdcc20e6d223999b253c97457224feea
SHA5122e1436edfb5b74e2a0dfb10e1da9e8c38f435e046aae5a7e418d328d52c01b4000b2e15fcbefbf6969750c638000bc4b63afc49ee15df43db30e093af5ded95d