Overview
overview
10Static
static
309aa894ba7...91.exe
windows7-x64
309aa894ba7...91.exe
windows10-2004-x64
100a8ac35e43...21.exe
windows10-2004-x64
101b7a61dc3f...51.exe
windows10-2004-x64
10551b1eafcb...e2.exe
windows10-2004-x64
107ca70af036...50.exe
windows10-2004-x64
108744deeac7...a9.exe
windows10-2004-x64
108b831a9336...51.exe
windows10-2004-x64
109bcf3e48a2...50.exe
windows10-2004-x64
109d0a8b0afa...78.exe
windows10-2004-x64
10a457720537...84.exe
windows10-2004-x64
10a6aa2043f4...84.exe
windows10-2004-x64
10b52c912b98...a3.exe
windows10-2004-x64
10b9636f454e...f7.exe
windows10-2004-x64
10b9cf5844f6...d1.exe
windows10-2004-x64
10bdef450da7...8e.exe
windows10-2004-x64
10eae63cf77a...de.exe
windows10-2004-x64
10f1c0aed941...02.exe
windows10-2004-x64
10f1cfe53024...42.exe
windows10-2004-x64
10f726f9f109...ad.exe
windows10-2004-x64
10fbaaf142d7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0a8ac35e43f621292035c3d74429426db38475babb90b9f0a7b48a6eb9e2d121.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
551b1eafcb4ad29033561c600fd2cd92b4dbcea53d7714de0fb1b61ceb59b6e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
7ca70af036250048ae92d2d5fde5b7a3179535a16c027d4f2bb5fa57b04f5550.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8b831a9336cb726a32f32c055467a35735f51b643a2cbb5d4269348fd570bb51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a4577205375947aa64ee39ff4d1938582d51a0f54aa5db974cf2942d70642f84.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b52c912b9847cdf65a1dcf4bf8c550affc88bb7a8d9de2f77219a62d75890ea3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b9636f454e7a68c89164dedcf58da53a18aeb784c2db2df56f5684178058c7f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b9cf5844f6f5b6bc020ebfcf05d096f8176125e06f1618580463eca739c9b3d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bdef450da794b4f4ae5a97848eb8c7e8075b0a2f19e500d6373ad4d4da725b8e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eae63cf77a61c6d0fdef1aa4ee5b17218c6245ddb0a23c6b72a19176b5095ade.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f1c0aed941c5429f8f293ac0efea5efc12bafcadd77be2033716f222b3f38402.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f1cfe53024b51863e86f65b542899f29902cf448eed0ef609d8fa925d11e3542.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f726f9f1096ec4de08baa4d02b85caf3855704f948bf62de21cebf55aa17c9ad.exe
Resource
win10v2004-20240426-en
General
-
Target
1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe
-
Size
646KB
-
MD5
e2db11b377767c7ba56c9431f36b58da
-
SHA1
3bec05b3db7568098f0f4bdcdb7d9d21ade87395
-
SHA256
1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51
-
SHA512
c5ba5b4cdd5ceccd93d5f4a90145c31e907a8e7b3f4eafadfc5e1fa235f576031047302e94be9161f95e9ef1e006fa74b99bf4735336a85662a5fce79f3b6e1b
-
SSDEEP
12288:OMray90FFVjBHc0CmRuetVkt10YiPzUR0H7J0nT:gy6FVj2EuetVe1RE2T
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral4/memory/2388-18-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral4/memory/2388-19-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family behavioral4/memory/2388-21-0x0000000000400000-0x0000000000434000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 3376 eg6pa69.exe 956 1Cn18FE0.exe 1292 2KH0743.exe 60 3AD04UT.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" eg6pa69.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 956 set thread context of 4364 956 1Cn18FE0.exe 86 PID 1292 set thread context of 2388 1292 2KH0743.exe 94 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3AD04UT.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3AD04UT.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3AD04UT.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4364 AppLaunch.exe 4364 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4364 AppLaunch.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3376 5092 1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe 83 PID 5092 wrote to memory of 3376 5092 1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe 83 PID 5092 wrote to memory of 3376 5092 1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe 83 PID 3376 wrote to memory of 956 3376 eg6pa69.exe 84 PID 3376 wrote to memory of 956 3376 eg6pa69.exe 84 PID 3376 wrote to memory of 956 3376 eg6pa69.exe 84 PID 956 wrote to memory of 4144 956 1Cn18FE0.exe 85 PID 956 wrote to memory of 4144 956 1Cn18FE0.exe 85 PID 956 wrote to memory of 4144 956 1Cn18FE0.exe 85 PID 956 wrote to memory of 4364 956 1Cn18FE0.exe 86 PID 956 wrote to memory of 4364 956 1Cn18FE0.exe 86 PID 956 wrote to memory of 4364 956 1Cn18FE0.exe 86 PID 956 wrote to memory of 4364 956 1Cn18FE0.exe 86 PID 956 wrote to memory of 4364 956 1Cn18FE0.exe 86 PID 956 wrote to memory of 4364 956 1Cn18FE0.exe 86 PID 956 wrote to memory of 4364 956 1Cn18FE0.exe 86 PID 956 wrote to memory of 4364 956 1Cn18FE0.exe 86 PID 3376 wrote to memory of 1292 3376 eg6pa69.exe 87 PID 3376 wrote to memory of 1292 3376 eg6pa69.exe 87 PID 3376 wrote to memory of 1292 3376 eg6pa69.exe 87 PID 1292 wrote to memory of 4896 1292 2KH0743.exe 91 PID 1292 wrote to memory of 4896 1292 2KH0743.exe 91 PID 1292 wrote to memory of 4896 1292 2KH0743.exe 91 PID 1292 wrote to memory of 1088 1292 2KH0743.exe 92 PID 1292 wrote to memory of 1088 1292 2KH0743.exe 92 PID 1292 wrote to memory of 1088 1292 2KH0743.exe 92 PID 1292 wrote to memory of 1044 1292 2KH0743.exe 93 PID 1292 wrote to memory of 1044 1292 2KH0743.exe 93 PID 1292 wrote to memory of 1044 1292 2KH0743.exe 93 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 1292 wrote to memory of 2388 1292 2KH0743.exe 94 PID 5092 wrote to memory of 60 5092 1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe 95 PID 5092 wrote to memory of 60 5092 1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe 95 PID 5092 wrote to memory of 60 5092 1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe"C:\Users\Admin\AppData\Local\Temp\1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eg6pa69.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eg6pa69.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Cn18FE0.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Cn18FE0.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2KH0743.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2KH0743.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3AD04UT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3AD04UT.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:60
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5ce91f8bb990fc9f9e2d2a1743a9afe9d
SHA13bc028b461b81f01b2b39bf6236fc815cc963dcc
SHA25610b857c9d78e392a5fe60221c60d369e4fa959f85334f45f94ae1a37ebcac8f3
SHA512f7a2bd324e365316697a141e2bd7966e6fdae87642d240455855cb3ee420cd8ef28509bb5d2c2c1b9322226b244376eed354fedb56dc39405321e83a70b85141
-
Filesize
522KB
MD591cd1f2b0ef4f882bcd29b1c00216e87
SHA1ce0e1183fb7bc9461f5b71601f065ac0699b6da3
SHA2563cd4ad151a459690669e1a76179e2b8e578f0b1d28ef84a640cee089b636d12a
SHA512425a3564f87f595d92ed33d6c6c0a0ed4076e6154a1ff7852f812eeac0774604395535ae33355b06a543d8f21a13d2ca086b3b22286c024b263358a61436901c
-
Filesize
886KB
MD5743dfd32eda71cc753130e5381575b55
SHA1dec0edf128c9d7874ef64a8bb80691523ef87303
SHA25673d7e9558a6971d49b740f7a98f78f768c775027ac7302f146b366a96175dc3c
SHA5125423499a52ef975ac51e1b31e4b96049cee96aa78ba9d1e64c7a82c91d4a1cdf51ec4b23be98ccf61147908c4d8673523d95f6072e6130b77099aa15375d5975
-
Filesize
1.1MB
MD5a8323aabbf7b579c33dc80ab9197f4f1
SHA11a85d2590664ab9a29f0c35d30fa62e23fa75b52
SHA25686dc8bca3662d1a5bcee01642d241ef0bf7c42b50dc57c45820449184a2dc7b0
SHA51261c0bf7a19355c10f8bee1dab5961e8bebfe021f67d4db7faf739af06f3dd2a3e335086f93fa355be0c8ce84a32d1c71d336cf06235ba07538d748cee4c44058