Overview
overview
10Static
static
3072894a720...70.exe
windows10-2004-x64
10075e0048e6...e5.exe
windows10-2004-x64
10131b78a330...7b.exe
windows10-2004-x64
1056b0ed98e3...54.exe
windows10-2004-x64
10807255749f...62.exe
windows7-x64
10807255749f...62.exe
windows10-2004-x64
108a8433aeba...ed.exe
windows10-2004-x64
108cae2c42df...9a.exe
windows7-x64
108cae2c42df...9a.exe
windows10-2004-x64
10d730c48963...34.exe
windows10-2004-x64
10e98954290c...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
134s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
075e0048e616f67de702a289e630f2df2651249474b3366d424d5bfefc2071e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
131b78a330f033599e72f43b4c44a4ce16181a4de774a7e0ebc96fe998dea67b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
56b0ed98e3472c3ed4c501f9630c8e00fd98a17a99687541889c257dffc5d254.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win7-20240215-en
Behavioral task
behavioral9
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
e98954290c7c1115f81a9b91ee8f444cad7f016d85fb2d9b70793e27c9384365.exe
Resource
win10v2004-20240508-en
General
-
Target
8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe
-
Size
319KB
-
MD5
9ffe17af29c1d6b4a7c753348624c0a7
-
SHA1
e252ed955d1edfbc89afc53a0453b9af16b6fd4a
-
SHA256
8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed
-
SHA512
9dc8415111c176ba626eef704c4e3a4f3e2acceb46f529b359d811a6f0da154d1dd650493f0da812c38758ee5cb954ad3a88441e1bec0a5c987a5d3ebd9095ea
-
SSDEEP
6144:K8y+bnr+yp0yN90QEFrKEP3ve7yRfsK6KRFjEXtaBv7yZez3x81WO6:UMrGy90LKU/e7RK6KRdEXYp7YezB8kl
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral7/files/0x00070000000233f7-17.dat mystic_family -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation l7763482.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 5 IoCs
pid Process 964 l7763482.exe 4708 saves.exe 1236 m5246380.exe 1072 saves.exe 456 saves.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1980 wrote to memory of 964 1980 8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe 83 PID 1980 wrote to memory of 964 1980 8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe 83 PID 1980 wrote to memory of 964 1980 8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe 83 PID 964 wrote to memory of 4708 964 l7763482.exe 84 PID 964 wrote to memory of 4708 964 l7763482.exe 84 PID 964 wrote to memory of 4708 964 l7763482.exe 84 PID 1980 wrote to memory of 1236 1980 8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe 85 PID 1980 wrote to memory of 1236 1980 8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe 85 PID 1980 wrote to memory of 1236 1980 8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe 85 PID 4708 wrote to memory of 2592 4708 saves.exe 86 PID 4708 wrote to memory of 2592 4708 saves.exe 86 PID 4708 wrote to memory of 2592 4708 saves.exe 86 PID 4708 wrote to memory of 2316 4708 saves.exe 88 PID 4708 wrote to memory of 2316 4708 saves.exe 88 PID 4708 wrote to memory of 2316 4708 saves.exe 88 PID 2316 wrote to memory of 748 2316 cmd.exe 90 PID 2316 wrote to memory of 748 2316 cmd.exe 90 PID 2316 wrote to memory of 748 2316 cmd.exe 90 PID 2316 wrote to memory of 2824 2316 cmd.exe 91 PID 2316 wrote to memory of 2824 2316 cmd.exe 91 PID 2316 wrote to memory of 2824 2316 cmd.exe 91 PID 2316 wrote to memory of 3572 2316 cmd.exe 92 PID 2316 wrote to memory of 3572 2316 cmd.exe 92 PID 2316 wrote to memory of 3572 2316 cmd.exe 92 PID 2316 wrote to memory of 5092 2316 cmd.exe 93 PID 2316 wrote to memory of 5092 2316 cmd.exe 93 PID 2316 wrote to memory of 5092 2316 cmd.exe 93 PID 2316 wrote to memory of 3752 2316 cmd.exe 94 PID 2316 wrote to memory of 3752 2316 cmd.exe 94 PID 2316 wrote to memory of 3752 2316 cmd.exe 94 PID 2316 wrote to memory of 2236 2316 cmd.exe 95 PID 2316 wrote to memory of 2236 2316 cmd.exe 95 PID 2316 wrote to memory of 2236 2316 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe"C:\Users\Admin\AppData\Local\Temp\8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l7763482.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l7763482.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F4⤵
- Creates scheduled task(s)
PID:2592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"5⤵PID:2824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E5⤵PID:3572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5092
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"5⤵PID:3752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E5⤵PID:2236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5246380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5246380.exe2⤵
- Executes dropped EXE
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1072
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD55cf59da88e05784c437700249a089c70
SHA1fad30fd30e7522b056309bb277cc4f6aad2d5d06
SHA256c781d55006ac4c90fc0e62e9034a5fd56d80205cb41efa8cd98dbf9437798e06
SHA512f97b6202ae7556a90937ad5db20ce1fd96a47bb4690ec296c0f9fc137e632fd6c5c59d0aa321a3c68ae2ced3ead17712cdab523c1ca8f2ae934f0bdc6016f649
-
Filesize
140KB
MD58db6d938db922f00902a4a932e24d1c8
SHA10e863bf8577408eb4aa38d875df6f63a4c67d487
SHA2561c11cbe430612147d0a4d27037950317eba64b3c2e669ce1cb17ac3dc0346590
SHA51260312c62365d31c89b1eedb9ec4b0adb015b1baa837e202f08c4bdaa543b0f34b04c61631b9cb842497a86dcb58a2c7b770871e6b061af5986e7412b4db1585f