Overview
overview
10Static
static
31b7cbee30e...8d.exe
windows10-2004-x64
101cb2277eea...2a.exe
windows10-2004-x64
1026dae86d00...a2.exe
windows10-2004-x64
1035cd974b16...ec.exe
windows10-2004-x64
1045e7028a78...91.exe
windows10-2004-x64
104cd2f124df...48.exe
windows10-2004-x64
105fdef2b38d...0a.exe
windows10-2004-x64
107284e9e031...c7.exe
windows10-2004-x64
10781c022afd...54.exe
windows10-2004-x64
1084163f9b0d...a5.exe
windows10-2004-x64
1090251e43cd...e4.exe
windows10-2004-x64
109a3023ff33...37.exe
windows10-2004-x64
10b4b999d8f3...50.exe
windows7-x64
10b4b999d8f3...50.exe
windows10-2004-x64
10bdd93956fe...8b.exe
windows10-2004-x64
10cf840721c0...70.exe
windows10-2004-x64
10e52fb58b8a...f1.exe
windows10-2004-x64
10ecfbac56ff...9e.exe
windows10-2004-x64
10f0f492b9b0...9a.exe
windows10-2004-x64
10f921df4c23...0d.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
26dae86d0011ac84e93abfd2169b28a6dee3498b8be9c3b84f657506d4e2a9a2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
35cd974b16f79c47cbb0de20c8a1ff5494093da28e9909d73df1cc40bc1e6dec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
45e7028a78d903a8ece02b9d51f82b76972b2b5e64db0bc12aa6cb69f53a2291.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cd2f124dfaf247a46d235c0823069c1056a2efb67c0f74547fb75dcfb603748.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
5fdef2b38d6a927d590cbceb6a8c3f4e278c41ce01d872925603603cd7d0bc0a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7284e9e031d95f98bb1c673f3691adb26e5acc31e6d2c745b85bc97fc82edec7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
781c022afdd03ecc97a7195986c14b7a81fc5a02d1b0e8c7561a1a1ff3406754.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
84163f9b0d959067de44eac4cb117f34b55119476a35c8291d0be25585618ea5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9a3023ff334b34f4bea043eedeced95c41485b4799d3c2d56c0cb04b60143937.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
cf840721c08fa286313bd7ac68fc5bac88559652036dfbdcc7b3c6f0cfa13d70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
ecfbac56ff2c59238da4332d5cd1561d05a08ac0d65b57b9caf329f063fc939e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
f0f492b9b0439f9df9e575d91555b387484582434a05ee11e543b6cd24ed979a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f921df4c23777a797ffd956196cd2ea4805eaf3eefcc839de781c7e6af836f0d.exe
Resource
win10v2004-20240508-en
General
-
Target
1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe
-
Size
320KB
-
MD5
49302c87b30d9bcb659e9a43e23d1a35
-
SHA1
158af98db3289bffa6b03298388b58c60767c686
-
SHA256
1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a
-
SHA512
be18bcdcb8bbf1b2cae94571e87a1487d1eda7f269204a93cb782532114cff7872df250cd3cfaa0a1a8dea3b35a8a8de9b3026409019c0a28a2d854a8de9bbb6
-
SSDEEP
6144:KCy+bnr+Hp0yN90QEIrKEP3ve7yRfsK6KRFjEXtaBv7uNC3QdGYHeZDSRA:KMrTy90SKU/e7RK6KRdEXYp7PQj0b
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023428-17.dat mystic_family -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation l0162996.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 6 IoCs
pid Process 764 l0162996.exe 5084 saves.exe 3420 m0401484.exe 4220 saves.exe 892 saves.exe 228 saves.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4576 wrote to memory of 764 4576 1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe 83 PID 4576 wrote to memory of 764 4576 1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe 83 PID 4576 wrote to memory of 764 4576 1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe 83 PID 764 wrote to memory of 5084 764 l0162996.exe 84 PID 764 wrote to memory of 5084 764 l0162996.exe 84 PID 764 wrote to memory of 5084 764 l0162996.exe 84 PID 4576 wrote to memory of 3420 4576 1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe 85 PID 4576 wrote to memory of 3420 4576 1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe 85 PID 4576 wrote to memory of 3420 4576 1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe 85 PID 5084 wrote to memory of 2884 5084 saves.exe 86 PID 5084 wrote to memory of 2884 5084 saves.exe 86 PID 5084 wrote to memory of 2884 5084 saves.exe 86 PID 5084 wrote to memory of 4972 5084 saves.exe 88 PID 5084 wrote to memory of 4972 5084 saves.exe 88 PID 5084 wrote to memory of 4972 5084 saves.exe 88 PID 4972 wrote to memory of 5064 4972 cmd.exe 90 PID 4972 wrote to memory of 5064 4972 cmd.exe 90 PID 4972 wrote to memory of 5064 4972 cmd.exe 90 PID 4972 wrote to memory of 4072 4972 cmd.exe 91 PID 4972 wrote to memory of 4072 4972 cmd.exe 91 PID 4972 wrote to memory of 4072 4972 cmd.exe 91 PID 4972 wrote to memory of 5020 4972 cmd.exe 92 PID 4972 wrote to memory of 5020 4972 cmd.exe 92 PID 4972 wrote to memory of 5020 4972 cmd.exe 92 PID 4972 wrote to memory of 2448 4972 cmd.exe 93 PID 4972 wrote to memory of 2448 4972 cmd.exe 93 PID 4972 wrote to memory of 2448 4972 cmd.exe 93 PID 4972 wrote to memory of 4040 4972 cmd.exe 94 PID 4972 wrote to memory of 4040 4972 cmd.exe 94 PID 4972 wrote to memory of 4040 4972 cmd.exe 94 PID 4972 wrote to memory of 4764 4972 cmd.exe 95 PID 4972 wrote to memory of 4764 4972 cmd.exe 95 PID 4972 wrote to memory of 4764 4972 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe"C:\Users\Admin\AppData\Local\Temp\1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l0162996.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l0162996.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F4⤵
- Creates scheduled task(s)
PID:2884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"5⤵PID:4072
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E5⤵PID:5020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"5⤵PID:4040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E5⤵PID:4764
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0401484.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0401484.exe2⤵
- Executes dropped EXE
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4220
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:892
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD5203d31724da362ad17ad5508a220ff41
SHA1aa9b35b8baf97bbceaa15abab56a885cdf378f84
SHA256631c64e2e865e763c704d3a3a0b9c58c428f1cc93ba022eabfeb846869bd8e6d
SHA5125bc62fcd95096851f38c1c4e56b70a1347512e893466e2dba00e6c6f7f4ad2531d28eaf7711bc3907642c5d1ea6fcd9eb7feda2018635f50ebb56f92994671ca
-
Filesize
141KB
MD5a551f4027ec2c2a9e6444bb50f011d94
SHA156e5cc596e006ffa885463c91fb45fd33dd0385d
SHA2564020fdfde2faff7ded9fe4bcbde17eac766bf54fb7764b251e5fe9147f4b91c0
SHA512fad89eac2f771ccc3c35504d82da589f3ec9bbdab50a080e210581596ca876b1ff2aaf034b47e10869802ac5aa3f399c471707d15cb454633db6806a35bf6db8