Analysis

  • max time kernel
    135s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 15:42

General

  • Target

    ebff69daab03914f10326e4e3ec464c00bfa9568723a75f80d74a19f1ac9dc05.exe

  • Size

    1.0MB

  • MD5

    1f3bfca89128252b6de8c902012971bc

  • SHA1

    3a96d92e2d30c786e55434238ef987bedc1381c0

  • SHA256

    ebff69daab03914f10326e4e3ec464c00bfa9568723a75f80d74a19f1ac9dc05

  • SHA512

    b0b72f05bd8532806f39445c403adb3018609d4cc3db870f6a0314452272c0dc23885a708acb5c1cc25fb191451cd14fcd66288c63af78b77f53e2096fc18153

  • SSDEEP

    24576:7yTRVpYQYJaiLEA8vrRIBOsE3BcTpa4q+qlfApDerAV8:uTRVpRieIBOfcTpqhJGGA

Malware Config

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebff69daab03914f10326e4e3ec464c00bfa9568723a75f80d74a19f1ac9dc05.exe
    "C:\Users\Admin\AppData\Local\Temp\ebff69daab03914f10326e4e3ec464c00bfa9568723a75f80d74a19f1ac9dc05.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uG2IM55.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uG2IM55.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lY4IV92.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lY4IV92.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1820
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rL9nw79.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rL9nw79.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1cF59QS7.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1cF59QS7.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4432
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2KE4633.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2KE4633.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3108
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2696
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3nE33bm.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3nE33bm.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4972
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
              • Checks SCSI registry key(s)
              PID:2344
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4ik113DR.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4ik113DR.exe
          3⤵
          • Executes dropped EXE
          PID:2284

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uG2IM55.exe
      Filesize

      898KB

      MD5

      150c007d5eefa3d9c3c779d833323a00

      SHA1

      b9f5c6fc673154eefd06299cb5af022f18193107

      SHA256

      f95fcd562d164a66052add082911b74df982423e19e4dcb48a153f15b7b4b082

      SHA512

      29fa977f1927affdb4d7b78a1d5adaf959d552db46285a008aa73ab6976e3dca8c899113518a2a14bfe0361064abbde8dcbe12be921057a3a113b0e95483c190

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4ik113DR.exe
      Filesize

      361KB

      MD5

      16613ce7ef9be2c93d25b9d04c1ed958

      SHA1

      70b15fe2d1cc653ffa495b41d0dee1f9acf0ad43

      SHA256

      ce800f1a497ba831a8424146f2b22ca5fb494997778f3ea7792552fa20ce866c

      SHA512

      de90ba8ef3f594169f34e5f6f1b4e6696fa7d1d7b6f963626b50848c83e2ef9f761862ec702926c6015c8cb8e4e4a742aeac9ba3f92217ba283831c38fdd0ac5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lY4IV92.exe
      Filesize

      648KB

      MD5

      f3640147495d8bd242247bb219075a44

      SHA1

      19f66de43b7441284ed323740c028c48bce9e40e

      SHA256

      e3a942e9cea16aaf2dcadc318ef30c5dca801d0c29be5c6d13be4337f6951d76

      SHA512

      36ae5cfff7e9026dcf3f1bb9665e02ef06c017a1e9f73d9034fbdec16ffff4852a84ed1821a7dbeb1cfa6ef3c06e752728cdcda833f542779d42a78c6d0efdc6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3nE33bm.exe
      Filesize

      170KB

      MD5

      89561b3b9dbb7d548247e07d0ab9d38c

      SHA1

      1a961b8b92e90ef22902685ed8f14fcb0f7888aa

      SHA256

      9508b92daa6e1b96dcc70228a36efaedabc3543b01336bb9e10f71dcce8a0273

      SHA512

      9b05417d42680948a62530bfb889c959cff04ed8c02259464d00e0960326807f716aa096acb19a2435340b310c3389ccc58fccf690961ee82d408c7ef46ff02c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rL9nw79.exe
      Filesize

      448KB

      MD5

      b27738cddbdc71b0d6c17ddf4acf51aa

      SHA1

      f1efe34713d260e91e8c7e51d3804871219b860f

      SHA256

      190c748a3878e8037bf4e10e5b0911708d8a36504c243e2a9f7a7e0572926e0f

      SHA512

      16671a266f4813a85da4ba8cf55912b0b1921371117cc2009a3f4f601deacef9dee4d9c1fd9a8398edfe2be09efd739d27d071520bf84c143a70b2072b0cb43b

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1cF59QS7.exe
      Filesize

      201KB

      MD5

      a07f1de1c9774d5a490b599e98a87928

      SHA1

      2e89540d18db9fc57132372abad292db56697b22

      SHA256

      4d39a22a2ac96eba80c0f05c8f198a8f62d49ec226a658ca9a4026f96a7799bb

      SHA512

      9d2366b0e427dde753c065430ae26ece060b70df1e6369e178a945e83efa0aec72e5d6ed236d41c09e342ec7f5040173d1d7edb46e3d1fe5877b60263747fb81

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2KE4633.exe
      Filesize

      320KB

      MD5

      f2e2698326d362023b54a615aa3c82d3

      SHA1

      032030dce1cbab97e1ec12d875a7c022897c30e3

      SHA256

      c828c094ca802f33ffd51dcaca196288808cfc4fdffadfcd24003ca6a50bcd59

      SHA512

      9adf9f160b74244acb64bb01a80bccc69e48093f0b529f0e1194df17a05b6de33b78d06a02e8f6eb2a09c4b7e49523dd5a915697e320b298f8e863031908c000

    • memory/2344-43-0x0000000000400000-0x0000000000409000-memory.dmp
      Filesize

      36KB

    • memory/2696-36-0x0000000000400000-0x0000000000432000-memory.dmp
      Filesize

      200KB

    • memory/2696-41-0x0000000000400000-0x0000000000432000-memory.dmp
      Filesize

      200KB

    • memory/2696-39-0x0000000000400000-0x0000000000432000-memory.dmp
      Filesize

      200KB

    • memory/4432-31-0x0000000005090000-0x0000000005122000-memory.dmp
      Filesize

      584KB

    • memory/4432-30-0x0000000002460000-0x000000000247E000-memory.dmp
      Filesize

      120KB

    • memory/4432-29-0x00000000049E0000-0x0000000004F84000-memory.dmp
      Filesize

      5.6MB

    • memory/4432-28-0x0000000002360000-0x0000000002380000-memory.dmp
      Filesize

      128KB