Analysis

  • max time kernel
    135s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 10:05

General

  • Target

    bdef450da794b4f4ae5a97848eb8c7e8075b0a2f19e500d6373ad4d4da725b8e.exe

  • Size

    648KB

  • MD5

    78560e3710160b589c68ffb486269717

  • SHA1

    d7947a041177ec309ddcfbdfac376d93127f33c9

  • SHA256

    bdef450da794b4f4ae5a97848eb8c7e8075b0a2f19e500d6373ad4d4da725b8e

  • SHA512

    bf231646ea976ceb3ef1fc5248fb54051bf7c23f80adaed24ceafe4764757c54c0cf081d7ea915c2b6bc645280d067bcd3cc81d129d8f949d5aca6449df270f3

  • SSDEEP

    12288:QMrfy906D01jVaMIgw+rPQUDcrNl4I7mSor/2fxJ3bNIxbeuBK:fyhGjoMFwgPQEcrNrw4xJrNuez

Malware Config

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdef450da794b4f4ae5a97848eb8c7e8075b0a2f19e500d6373ad4d4da725b8e.exe
    "C:\Users\Admin\AppData\Local\Temp\bdef450da794b4f4ae5a97848eb8c7e8075b0a2f19e500d6373ad4d4da725b8e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rd7FR91.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rd7FR91.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1wS75VV5.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1wS75VV5.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3520
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2zD8293.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2zD8293.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:2692
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3CL62Eh.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3CL62Eh.exe
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:4804
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:3472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3CL62Eh.exe

      Filesize

      31KB

      MD5

      788639e9fda87bab32d2d5e4086c24b2

      SHA1

      79177ebde64b7f0edcfadd9c46e32d464138d463

      SHA256

      d0d58e4871c9eff51a28a9c17b46d42013193f2c00a9462c3adce29e07f7d839

      SHA512

      47c489c33090c614e2cad90314521669f8b4f34d876f2e7249ac6c1e6b063db3cbca2d1c5fb973da69fd67ee2dde3df174321498cdfdfe923b2c557366758ed2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rd7FR91.exe

      Filesize

      523KB

      MD5

      0266c19589ffdf20316c5e19be6f7fe2

      SHA1

      196d0c0653a5e09a98c89b3ffda87d61ec6169d1

      SHA256

      57f7ca651d33eeb0eaa17a10d7f195da54810612b8557b4cbc67b1b620fa7e28

      SHA512

      64e7a2badc64bbc67069505d00cbf69d4f2a9cd4c1be42bebf2aea67809dbf3b9179f2e669bda52c4de6dd46ccf426fdec6e9701d876b9e30f2da172739da769

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1wS75VV5.exe

      Filesize

      874KB

      MD5

      c1079f39e435b304272b2d668cf19921

      SHA1

      c8c7c7b15c5e2c71e87ece71c55f61e2d35b59aa

      SHA256

      35fb4f9c39be77010c8a54b5d4ef5e044ac94b01ca8ac3461d6321b3b514ae4f

      SHA512

      a6c1e9e10f21926b481463ab116974f67f962c7b65950db0c7d5c7d5fe4977db16cbec0674f76f45339bd5f64f3215657861d3ea7b2bb457439ec3949db912ee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2zD8293.exe

      Filesize

      1.1MB

      MD5

      2a4fc8cdc7ae1f672c43f45b356a07fe

      SHA1

      a55c266b7e3c257f62d11e28e48e9ddfe5ed5dc6

      SHA256

      5606eed917e232c85490f6518f182dfc032c6386e511797dd6f1638fb223a2b3

      SHA512

      7debe6dda68f02ed742eccc0a2b1aada3ea54d9d66cff436b7a4630007e62e93754fc6595fdecfabd584b810fde7eb05f15e6c786515c6ddeb259dac2d8617f3

    • memory/2692-21-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2692-19-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2692-18-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4744-14-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4804-25-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4804-26-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB