Overview
overview
10Static
static
306f1b755da...d3.exe
windows10-2004-x64
1014b33a31c1...19.exe
windows10-2004-x64
1016f3c19a7f...1a.exe
windows10-2004-x64
10192ce44be6...d3.exe
windows10-2004-x64
10208bd49be4...cf.exe
windows10-2004-x64
102ae8e0e720...19.exe
windows10-2004-x64
102b74e820a6...32.exe
windows10-2004-x64
10396631ba37...a0.exe
windows10-2004-x64
10777259b2de...25.exe
windows10-2004-x64
107f06170b1d...e6.exe
windows10-2004-x64
1080f9db3963...66.exe
windows10-2004-x64
108d2837f05f...42.exe
windows10-2004-x64
109a7ee6b801...e4.exe
windows10-2004-x64
109c8e4ed081...a3.exe
windows10-2004-x64
10a68c5e94f5...52.exe
windows10-2004-x64
10aaed2c62a2...28.exe
windows10-2004-x64
10e097574588...fe.exe
windows10-2004-x64
10e256d9f4b9...eb.exe
windows10-2004-x64
10f02caa1867...71.exe
windows10-2004-x64
10f7447a8c0b...af.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
06f1b755da951fcf461e1c619e531208a68c60a692e3a2869f7207254aaea1d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
208bd49be44846fa019a8a4b21da09b934676de6c05e6688624fa6608f3917cf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2ae8e0e7200682b017c2fa4be81c84b2547e0238ade702b5112641b6b336bc19.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
777259b2de1e73f2f79c2edbd0a7a6b94de34bca7c3376f8e9aae8a4e44be025.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
7f06170b1d7c15c8654c820aed9d163b0f686b8b747df4651e3c2d91e1e1bee6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
80f9db396349ffd316d40f58b12121eb8671e0af591fa231cd1037ed80d55c66.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
9a7ee6b801d877ebe30af54c64afce444a041f28ac9cb08964f0d97a0fa17fe4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9c8e4ed08188524a9beb39dfd35cc3c50ed0a6344464afcdff53746ddccee6a3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a68c5e94f561ee7f4e5edc6e64db2ccc6083a9a34acd478da0b5a3003a233e52.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e0975745886991171c59c0c9a7b781238f54c7dbc7be68e29315487b94f3cafe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e256d9f4b9031db67a2e5cd1574fceafc35d62734d1079c433dd19867ee9c3eb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
f02caa18679b8af0e356c5ecf5b840b3c4f001b4c623c0cf33686d9cf4111871.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f7447a8c0bbf4733ba4bef9129e0bcb98bcfe4fd1b57d2ec4e9349b333329aaf.exe
Resource
win10v2004-20240426-en
General
-
Target
16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe
-
Size
657KB
-
MD5
01a84bc0f9662c85b3e51840340584e7
-
SHA1
f9b058a4d293cd4736466b97a75159823e2a0ac9
-
SHA256
16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a
-
SHA512
b78da685b4ac48bf111285dadd929e76f2282f50e66c31df783dc92c677d8c6d3ee5d64aa11b7d70102cf556565bdd29b6a7bbd0b88582115471d77ef73f193d
-
SSDEEP
12288:KMrhy90Dr/7bS2jGH0CwdYQS6QbyfFAF0oxJ5myPoOmIfb:TyanVGUCwd/S6QbyfFA75oOmGb
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral3/memory/3556-18-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral3/memory/3556-21-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral3/memory/3556-19-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 3012 Id1Tk83.exe 3476 1Tl75WE8.exe 1836 2iu9448.exe 3088 3uE65Mj.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Id1Tk83.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3476 set thread context of 2068 3476 1Tl75WE8.exe 84 PID 1836 set thread context of 3556 1836 2iu9448.exe 89 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3uE65Mj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3uE65Mj.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3uE65Mj.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2068 AppLaunch.exe 2068 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2068 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3080 wrote to memory of 3012 3080 16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe 82 PID 3080 wrote to memory of 3012 3080 16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe 82 PID 3080 wrote to memory of 3012 3080 16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe 82 PID 3012 wrote to memory of 3476 3012 Id1Tk83.exe 83 PID 3012 wrote to memory of 3476 3012 Id1Tk83.exe 83 PID 3012 wrote to memory of 3476 3012 Id1Tk83.exe 83 PID 3476 wrote to memory of 2068 3476 1Tl75WE8.exe 84 PID 3476 wrote to memory of 2068 3476 1Tl75WE8.exe 84 PID 3476 wrote to memory of 2068 3476 1Tl75WE8.exe 84 PID 3476 wrote to memory of 2068 3476 1Tl75WE8.exe 84 PID 3476 wrote to memory of 2068 3476 1Tl75WE8.exe 84 PID 3476 wrote to memory of 2068 3476 1Tl75WE8.exe 84 PID 3476 wrote to memory of 2068 3476 1Tl75WE8.exe 84 PID 3476 wrote to memory of 2068 3476 1Tl75WE8.exe 84 PID 3012 wrote to memory of 1836 3012 Id1Tk83.exe 86 PID 3012 wrote to memory of 1836 3012 Id1Tk83.exe 86 PID 3012 wrote to memory of 1836 3012 Id1Tk83.exe 86 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 1836 wrote to memory of 3556 1836 2iu9448.exe 89 PID 3080 wrote to memory of 3088 3080 16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe 90 PID 3080 wrote to memory of 3088 3080 16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe 90 PID 3080 wrote to memory of 3088 3080 16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe"C:\Users\Admin\AppData\Local\Temp\16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Id1Tk83.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Id1Tk83.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Tl75WE8.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Tl75WE8.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2iu9448.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2iu9448.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3uE65Mj.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3uE65Mj.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3088
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD502bf10f796901f77e15450a0ade88c5c
SHA1370b1f21850f48c7118294254c4b0cccbe3d6ce6
SHA256d1086600b1cb6172db50366e66a6884381d2f17f94a0c26c606243a9e39086ff
SHA512effec019ccd580e58ddf3dace92794ad8f85fa6e22e1f1f8bf28bcd38f6ca01f24b4c70cc8575fcb6c29a7403a3b79b75354d2754451565d46cdd9fefa6b7bc0
-
Filesize
533KB
MD5987805bec721420c6dbae12d3fef4175
SHA1180daf1addf6fbb464bc1600337ca9125a68e7ad
SHA2560562354daac0af76f2fc26f6cb1b1c836dbc44897cd3c21b86f06ece5009624d
SHA51294b528330591235178e77f24753da94c5afc451cf02e865dfd406e881e36a59dea3812a02731b9f02b79269cfa7a0f225eb35c64049bae1f14575db1900a24bf
-
Filesize
886KB
MD51d9d7a899796eeef436cd9bd87c3f80b
SHA1022ca79920460943be3633016075272c4a990cfe
SHA256ca9d570cd537a6c8f6b48c2c92a7c95e7ff837d3084f6e3c7803897a5a63fb95
SHA5121e7d9b16e4690b59d7b7a281668ddc3a3fc5b8d51f50c92dbaef5ecee6e770fb531ac266eab83480b21e7f49fe863225eebe86b602d47f8523bde4e672ef041e
-
Filesize
1.1MB
MD5773e9b58999ac4f1a4f26929f85883e4
SHA146a9342c366ef802375e2d48d904227ac819b157
SHA256fb4ed616baeaaf895b7aafbbb9595f00a883982fa4a08c17b03fda80e05936a7
SHA512d63ba4f2a5746119d7cd5be602cb0f8797ddef0d1fe2effa997cef7b9f1ad03b5d2c34a19c03dec6e5b6498d0dfb51832e8cd7199633ef8170b85791e956b280