Overview
overview
10Static
static
30805913f50...13.exe
windows10-2004-x64
1011eba51293...3a.exe
windows10-2004-x64
1017a0568b20...3a.exe
windows10-2004-x64
10346c46bc82...26.exe
windows10-2004-x64
104867af9d5d...1f.exe
windows10-2004-x64
105f2f269e1f...9a.exe
windows10-2004-x64
1064e73ef21d...a1.exe
windows10-2004-x64
107c556f6f80...61.exe
windows10-2004-x64
108c970cc94c...d3.exe
windows10-2004-x64
109296923f57...24.exe
windows10-2004-x64
10ae96a881fd...69.exe
windows10-2004-x64
10b150b2b6ed...d5.exe
windows10-2004-x64
10c1b0ce286b...51.exe
windows10-2004-x64
10c1d1b117a2...35.exe
windows10-2004-x64
10d876400b35...04.exe
windows10-2004-x64
10eb3bd6af82...52.exe
windows10-2004-x64
10eb7c2e9dc2...28.exe
windows10-2004-x64
10ed2eb0d5dc...bf.exe
windows10-2004-x64
10fc2a396813...13.exe
windows10-2004-x64
10fd4ce916b7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
0805913f5039b1097cf6d0b178560036e0b99e52f86b3990bf7bd4b663d15513.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
11eba512939d3d17bcd0d5543f3a05dac69c96858fbb7120b8802814391c413a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
17a0568b2023370d14f35371e9d7c372589b91d4098eecace76d78c9a7587d3a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4867af9d5dda04a5ea012b876f663ee94f708e52fd230c829517d4b2b83e9d1f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
64e73ef21d2b9d5819334be729f07ac670e6fa83111bc1b666abffc261bc2da1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7c556f6f80bf250c2ce70d007250b6906c79d457969a75a3f17dc9885daf8761.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
8c970cc94c6aab0b503af6d60e60f5c6c870576c82be9233ab884894899a97d3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
9296923f571779b37e571b296a597c9c5eb71a0a616bfd3ddab9f7d20c509c24.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
ae96a881fddd0471c5a462a0b27848d72c34ba866c6061e0f84ab3a1097a7a69.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
b150b2b6edd507299c5ac9c6a165df425596a5b2a6f78c7ee7594e3f19a28fd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eb7c2e9dc2416d5168ea11cdee85ea662e4aa32921edbe521787e1a7dcc79228.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
fc2a3968133c3c96ae55dfdd56ca5b4dd51ed30658a98d55193b96e1533f4013.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe
Resource
win10v2004-20240508-en
General
-
Target
eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe
-
Size
645KB
-
MD5
5c7efd9ec3e27bb93244365f3ccf6bd7
-
SHA1
8cff2506763935140038ddfd27738d40ebf05eab
-
SHA256
eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352
-
SHA512
ea7f94292cb9c024af86dd3176afb4daa7940d2fc6c3616bbba3d9493251273ab921916a04f6a5fd629a5204199ea9dac8948bd03a5031333773e695bf32ac20
-
SSDEEP
12288:6cMrEy90nyAH07CUhQWRNJcN7MOApGiBg4D/ovR18txF7y+bR6Vq:64y13eUhiPA8iBDxF7+o
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral16/memory/4496-18-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral16/memory/4496-19-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral16/memory/4496-21-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 2024 bO1Oi36.exe 1056 1QD06VA8.exe 556 2GQ9959.exe 2780 3La00TE.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" bO1Oi36.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1056 set thread context of 1168 1056 1QD06VA8.exe 84 PID 556 set thread context of 4496 556 2GQ9959.exe 87 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3La00TE.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3La00TE.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3La00TE.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 AppLaunch.exe 1168 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1168 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3580 wrote to memory of 2024 3580 eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe 82 PID 3580 wrote to memory of 2024 3580 eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe 82 PID 3580 wrote to memory of 2024 3580 eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe 82 PID 2024 wrote to memory of 1056 2024 bO1Oi36.exe 83 PID 2024 wrote to memory of 1056 2024 bO1Oi36.exe 83 PID 2024 wrote to memory of 1056 2024 bO1Oi36.exe 83 PID 1056 wrote to memory of 1168 1056 1QD06VA8.exe 84 PID 1056 wrote to memory of 1168 1056 1QD06VA8.exe 84 PID 1056 wrote to memory of 1168 1056 1QD06VA8.exe 84 PID 1056 wrote to memory of 1168 1056 1QD06VA8.exe 84 PID 1056 wrote to memory of 1168 1056 1QD06VA8.exe 84 PID 1056 wrote to memory of 1168 1056 1QD06VA8.exe 84 PID 1056 wrote to memory of 1168 1056 1QD06VA8.exe 84 PID 1056 wrote to memory of 1168 1056 1QD06VA8.exe 84 PID 2024 wrote to memory of 556 2024 bO1Oi36.exe 85 PID 2024 wrote to memory of 556 2024 bO1Oi36.exe 85 PID 2024 wrote to memory of 556 2024 bO1Oi36.exe 85 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 556 wrote to memory of 4496 556 2GQ9959.exe 87 PID 3580 wrote to memory of 2780 3580 eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe 88 PID 3580 wrote to memory of 2780 3580 eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe 88 PID 3580 wrote to memory of 2780 3580 eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe"C:\Users\Admin\AppData\Local\Temp\eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bO1Oi36.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bO1Oi36.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1QD06VA8.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1QD06VA8.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2GQ9959.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2GQ9959.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3La00TE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3La00TE.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5d84569a706b9c209fe691fb20af40afe
SHA12fd9b3710be51ee7318be4b905cf17447331cc73
SHA2568225d0527e3a0ad5fd83412ed5d2c026ed2677b3f8f221160d64e5bbbe492838
SHA512c346a73bb0710f520524e3b0680f14c9e53428842850c000d5a1d02fcfda0014f57d619e295ad3b45bb31724e6edb69229e77d1ab73a082620ab0ba1cdc9feee
-
Filesize
521KB
MD57f35d65926d1b28d7e70210e085c6caf
SHA1461a90b25f1c893a50394ec5f7765761892a40f1
SHA256c55be9f930e9865d003860a3f6389c6e3e70dd04879076d6c654387c79e7cfae
SHA512e1d511dde2beb736c7f745bcc72ac30827ef82e4fe6d4410701b735e45c2ad56483fea01ddcda331e9420c4d6c76eab1170a64ed6acabd72f8ca3765d3158c0e
-
Filesize
878KB
MD5010bf0c94334d77fdcd5ebf4c268a1f2
SHA1dbbf0d948f8eb38a89081c350ed15a6d5237b234
SHA2565cbe4f941a16573029af6f3d4339e987280ad08f7fe84aae64627c182fe95fcd
SHA512033ba8a967f16a25245fa384d132fdb1b8b0ad28620987a81824261317c19dcdf1e7a935ea3d901596f9a4030cebeff27379ad745d920f47c300a4ddb2460e85
-
Filesize
1.1MB
MD5b14d236952119c720e5dd5981abcf5ac
SHA15fe5e42551f0339ee787f0e14c4b0d347031cbcc
SHA256587a9ec0924567e8ae88d08796671f0f6a39fb31cd7e53fe268fc7b83f3af1f6
SHA512dc2c37208b00c4188b05285d70735497407a3217ed4218fed6a7ff716994e59004ae6f824538a01b2dc82e540f91bf53aa5e51905fc7f59c414b997870fcbda8