Overview
overview
10Static
static
3006388190d...bb.exe
windows10-2004-x64
100254882920...b5.exe
windows10-2004-x64
10059acceaf9...4e.exe
windows10-2004-x64
1023e52eabfc...16.exe
windows10-2004-x64
10346c48a087...17.exe
windows10-2004-x64
103a559db9fb...76.exe
windows10-2004-x64
103bd30de35b...fb.exe
windows10-2004-x64
104563b46d64...3c.exe
windows10-2004-x64
1045ab0e1069...0f.exe
windows10-2004-x64
10545f251975...f8.exe
windows10-2004-x64
105bd9b291d7...ab.exe
windows10-2004-x64
105e70f35516...00.exe
windows10-2004-x64
107348ee4e4e...6d.exe
windows10-2004-x64
108b460dc8cc...29.exe
windows10-2004-x64
10928c96df1b...ca.exe
windows10-2004-x64
10972fcfe587...1d.exe
windows10-2004-x64
10a025c0e619...2e.exe
windows10-2004-x64
10bc0667bb8d...75.exe
windows10-2004-x64
10cf82c35e0a...89.exe
windows10-2004-x64
10fbe2b19c30...62.exe
windows10-2004-x64
10Analysis
-
max time kernel
134s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
006388190d560f779193db075f918251d361e2b4d3964e52b02340d13f027cbb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0254882920b8d79aa87aa48e3861241d6f50bc1856fc52906e5a574397e08db5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
059acceaf93bade47e21b541d454c4c6306be3c538a4c3830fc06ede130ec54e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
23e52eabfc961f3968a8c831c24d36e0e9f098916b0ddf025ed159d3fc688616.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
346c48a0871c59620708e024ec279730125927376e659248d8497b58ee492d17.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
3bd30de35b2caa677c1a1d8eeb9a0878d3c396425a4501d3fc280590146a7efb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4563b46d64120bf9833b2c3a8c333cb31977f9c75d32f836c04620dc0ce6623c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
45ab0e1069984eb278e72231ed9a1e178170792eecd79ef0661dac877d441d0f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
545f251975e0336438e45247d53ca978f9025138b2622d8fe2787d5dba9f28f8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
5e70f35516878f784c795b9bc0d243a75bde82267717162cdb1838a7e102b600.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7348ee4e4ed1a5e949c6ba0b2c8eaee7bf5d5f120e8c79c61accf44a24e12c6d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
8b460dc8cc01a4935d8fd4d2c0274d449f186cacf64dabc12c6b9b32c1b3de29.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
972fcfe5872ab4a6b837384811a9bbe0624c3035a9a24dcd95984caca2e3b81d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
a025c0e61987ac5dff969885b12ced5a1064ab0b0ae71e3751eb0331b3e6332e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bc0667bb8d76b0eceab17620f9c43835fd5dbd1eebbf9f51744ad7e0c3852c75.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
cf82c35e0a5a0683a1f51d3806ea0eb39a59d81fd4fc110c9762ff99d4e3f389.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fbe2b19c3005d09f35a016c06bae0f79aabf8a1d61a477834dca18d82cb3aa62.exe
Resource
win10v2004-20240508-en
General
-
Target
3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe
-
Size
654KB
-
MD5
6bf1ef97fb912648145ba8485d0034aa
-
SHA1
ebe81236c38c87b10c18ac8294858b0dd5c723bd
-
SHA256
3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76
-
SHA512
33fe49918aa24ba2b8f91841d306be23331272e104ff45a02036d2ff23d18ff27eeab62dfdedd80adcfdc0b751d22fe5f24bf6956ef81a7f6e7def89d5ff0c13
-
SSDEEP
12288:TMrry90TX9G2u/oa4+IenzZPBXUafP5DyCMZ8Xvnr80snL:4yopa9lnsCMkC
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral6/memory/2336-18-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral6/memory/2336-19-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral6/memory/2336-21-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 2816 dY4qN56.exe 4008 1gb93pY5.exe 2544 2Kz6190.exe 1728 3Mj79rp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dY4qN56.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4008 set thread context of 4248 4008 1gb93pY5.exe 85 PID 2544 set thread context of 2336 2544 2Kz6190.exe 89 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Mj79rp.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Mj79rp.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Mj79rp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4248 AppLaunch.exe 4248 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4248 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3360 wrote to memory of 2816 3360 3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe 82 PID 3360 wrote to memory of 2816 3360 3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe 82 PID 3360 wrote to memory of 2816 3360 3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe 82 PID 2816 wrote to memory of 4008 2816 dY4qN56.exe 83 PID 2816 wrote to memory of 4008 2816 dY4qN56.exe 83 PID 2816 wrote to memory of 4008 2816 dY4qN56.exe 83 PID 4008 wrote to memory of 2188 4008 1gb93pY5.exe 84 PID 4008 wrote to memory of 2188 4008 1gb93pY5.exe 84 PID 4008 wrote to memory of 2188 4008 1gb93pY5.exe 84 PID 4008 wrote to memory of 4248 4008 1gb93pY5.exe 85 PID 4008 wrote to memory of 4248 4008 1gb93pY5.exe 85 PID 4008 wrote to memory of 4248 4008 1gb93pY5.exe 85 PID 4008 wrote to memory of 4248 4008 1gb93pY5.exe 85 PID 4008 wrote to memory of 4248 4008 1gb93pY5.exe 85 PID 4008 wrote to memory of 4248 4008 1gb93pY5.exe 85 PID 4008 wrote to memory of 4248 4008 1gb93pY5.exe 85 PID 4008 wrote to memory of 4248 4008 1gb93pY5.exe 85 PID 2816 wrote to memory of 2544 2816 dY4qN56.exe 86 PID 2816 wrote to memory of 2544 2816 dY4qN56.exe 86 PID 2816 wrote to memory of 2544 2816 dY4qN56.exe 86 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 2544 wrote to memory of 2336 2544 2Kz6190.exe 89 PID 3360 wrote to memory of 1728 3360 3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe 90 PID 3360 wrote to memory of 1728 3360 3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe 90 PID 3360 wrote to memory of 1728 3360 3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe"C:\Users\Admin\AppData\Local\Temp\3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dY4qN56.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dY4qN56.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1gb93pY5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1gb93pY5.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2188
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Kz6190.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Kz6190.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Mj79rp.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Mj79rp.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5215e3a9d31f716e9fa83930c20b0447b
SHA1eedb95d8509fd44874d0edd450afc719b179bb91
SHA256d3d4a9677a53e4a96c61e7db4859048dca12af579a174e69df3088d6efa0562d
SHA512f39ea66bf720fb573a7a45878d4bd255e66f3709c54f2a00877425072d1b16eca69cda79cabd95705a88b54fd6676e78d39de914470b2569707639681657c92d
-
Filesize
530KB
MD5e63ba8400f262a064a03ad903da92ea1
SHA1ee6722892cf70e631549afe07ef6566b85f5f92e
SHA256b85d1c3b8f669d663ed41d0075485df944d5e0fbacb12b285b30862afd9934f4
SHA512d831ba8fb671364601219947f67214321e4ab6e1bd5362446a90e0455e3095ad9f0d721338d4dbea284c53a51d469a6d575f162d0d36caa3493d69f730004dd5
-
Filesize
883KB
MD5e710131b72c78af653d8d53004137b86
SHA1e2130960a1e26da27507be5fdcf680ecb646914b
SHA256b0b161892bf942f12c413d1c9677688ea67d9e131236ab707726b0ce1b504f33
SHA512be99c3428847c92d735ffa581f9ec311f061285008b728e23dbe692ca3345e1ffedaea19ae55337b65664bfcb665ebe798f21a5c6d8c2bdcce4449b205eeabff
-
Filesize
1.1MB
MD5464cce29c9abcbab188937169d186a28
SHA16a2e7d87d074c17b945396562f140dc3582f41ee
SHA25622401410ce1fa30f7c3526c4e579f092c7b0d96205766eb7d69a34de62e7e2b6
SHA512fe18c91339bad1b6664a878fc73f35880d6ac765acc3f3390312751f1ece5c6aef87293c30af880e456827dd78fff42b345a078c2b9a677697bcde79f5bea98e