Overview
overview
10Static
static
309aa894ba7...91.exe
windows7-x64
309aa894ba7...91.exe
windows10-2004-x64
100a8ac35e43...21.exe
windows10-2004-x64
101b7a61dc3f...51.exe
windows10-2004-x64
10551b1eafcb...e2.exe
windows10-2004-x64
107ca70af036...50.exe
windows10-2004-x64
108744deeac7...a9.exe
windows10-2004-x64
108b831a9336...51.exe
windows10-2004-x64
109bcf3e48a2...50.exe
windows10-2004-x64
109d0a8b0afa...78.exe
windows10-2004-x64
10a457720537...84.exe
windows10-2004-x64
10a6aa2043f4...84.exe
windows10-2004-x64
10b52c912b98...a3.exe
windows10-2004-x64
10b9636f454e...f7.exe
windows10-2004-x64
10b9cf5844f6...d1.exe
windows10-2004-x64
10bdef450da7...8e.exe
windows10-2004-x64
10eae63cf77a...de.exe
windows10-2004-x64
10f1c0aed941...02.exe
windows10-2004-x64
10f1cfe53024...42.exe
windows10-2004-x64
10f726f9f109...ad.exe
windows10-2004-x64
10fbaaf142d7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09aa894ba7cc236be8d443f3b9222b92ba109fb13098306f60f3ef9f66388291.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0a8ac35e43f621292035c3d74429426db38475babb90b9f0a7b48a6eb9e2d121.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1b7a61dc3f4d8e760c0fc26e93a4fdc49438eea43c70dc3927c7f99f2ab42d51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
551b1eafcb4ad29033561c600fd2cd92b4dbcea53d7714de0fb1b61ceb59b6e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
7ca70af036250048ae92d2d5fde5b7a3179535a16c027d4f2bb5fa57b04f5550.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8b831a9336cb726a32f32c055467a35735f51b643a2cbb5d4269348fd570bb51.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
9bcf3e48a23154e18a57f5f75e8997e1399e48275d8e3f11ae57ae34df1ede50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
9d0a8b0afa79db37dbe567f56af169f6ab02e6ce973136343ada62eb54580f78.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a4577205375947aa64ee39ff4d1938582d51a0f54aa5db974cf2942d70642f84.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a6aa2043f478ddce45828d300d2a16520cd53a9cad9b7a83a8534bf055146784.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b52c912b9847cdf65a1dcf4bf8c550affc88bb7a8d9de2f77219a62d75890ea3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b9636f454e7a68c89164dedcf58da53a18aeb784c2db2df56f5684178058c7f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
b9cf5844f6f5b6bc020ebfcf05d096f8176125e06f1618580463eca739c9b3d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bdef450da794b4f4ae5a97848eb8c7e8075b0a2f19e500d6373ad4d4da725b8e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eae63cf77a61c6d0fdef1aa4ee5b17218c6245ddb0a23c6b72a19176b5095ade.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
f1c0aed941c5429f8f293ac0efea5efc12bafcadd77be2033716f222b3f38402.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f1cfe53024b51863e86f65b542899f29902cf448eed0ef609d8fa925d11e3542.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f726f9f1096ec4de08baa4d02b85caf3855704f948bf62de21cebf55aa17c9ad.exe
Resource
win10v2004-20240426-en
General
-
Target
8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe
-
Size
721KB
-
MD5
9a26c20f51835cb007fdff0db4ce43cb
-
SHA1
d367a8eb9da2192c49270744ddea30989279ca92
-
SHA256
8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9
-
SHA512
1fb9ffb86556d6c4f1b32379322920583ceaa41829103982aa5f07f8b52782d7e7425f9433084825588727cda7a483c88cf8acda53a8ce8ee624a7ab3261d04d
-
SSDEEP
12288:CMr4y905oyLLefbcmB20yALGAUMUjeueJ9Sd6ufO2/HXdKsbiNBlFK9rB:6yXW0AnHAbhFDujNKsbiNJK9t
Malware Config
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral7/files/0x0007000000023411-17.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1Wr56jI5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1Wr56jI5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1Wr56jI5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1Wr56jI5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1Wr56jI5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1Wr56jI5.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 2696 fW2SR70.exe 4248 1Wr56jI5.exe 5056 2nN2635.exe 3716 3EK78uC.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1Wr56jI5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1Wr56jI5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fW2SR70.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3716 set thread context of 4156 3716 3EK78uC.exe 99 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4248 1Wr56jI5.exe 4248 1Wr56jI5.exe 4248 1Wr56jI5.exe 4248 1Wr56jI5.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2696 2040 8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe 83 PID 2040 wrote to memory of 2696 2040 8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe 83 PID 2040 wrote to memory of 2696 2040 8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe 83 PID 2696 wrote to memory of 4248 2696 fW2SR70.exe 84 PID 2696 wrote to memory of 4248 2696 fW2SR70.exe 84 PID 3624 wrote to memory of 536 3624 cmd.exe 90 PID 3624 wrote to memory of 536 3624 cmd.exe 90 PID 2696 wrote to memory of 5056 2696 fW2SR70.exe 96 PID 2696 wrote to memory of 5056 2696 fW2SR70.exe 96 PID 2696 wrote to memory of 5056 2696 fW2SR70.exe 96 PID 2040 wrote to memory of 3716 2040 8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe 97 PID 2040 wrote to memory of 3716 2040 8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe 97 PID 2040 wrote to memory of 3716 2040 8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe 97 PID 3716 wrote to memory of 4156 3716 3EK78uC.exe 99 PID 3716 wrote to memory of 4156 3716 3EK78uC.exe 99 PID 3716 wrote to memory of 4156 3716 3EK78uC.exe 99 PID 3716 wrote to memory of 4156 3716 3EK78uC.exe 99 PID 3716 wrote to memory of 4156 3716 3EK78uC.exe 99 PID 3716 wrote to memory of 4156 3716 3EK78uC.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe"C:\Users\Admin\AppData\Local\Temp\8744deeac7c3aff839db1009ce9ff2e37892105dcc730c203816f9be8df214a9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fW2SR70.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fW2SR70.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Wr56jI5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Wr56jI5.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2nN2635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2nN2635.exe3⤵
- Executes dropped EXE
PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3EK78uC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3EK78uC.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
PID:4156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c regini "C:\Users\Admin\AppData\Roaming\random_1716458807.txt"1⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\system32\regini.exeregini "C:\Users\Admin\AppData\Roaming\random_1716458807.txt"2⤵PID:536
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916KB
MD5788be6a311582a44182f6d9d172f0f9a
SHA15932e09819401428474670ea3a21216f5702897e
SHA2563f06bfdfeafbdc36fc543165c92fd3ee1ca020b21f4c0135f66664ac47e5f79c
SHA512d1e2263cf857b76819adb51a9caf31555b276ab465815d890effb87159a10a8ca39836c1a5f6b3b94da270811b0db1c1342a8ed7d73d87e6451a48dbd19e4edc
-
Filesize
354KB
MD5a6f785f708371065b133cfa60015d409
SHA1b26c8bc485a0921683b5f95fbed394950b934492
SHA2566179e00197ae153783bd271bfedab22af3ae2d77c04a7eeeeedb8f36eac43543
SHA512105dfc4c130a9e0ff7b7dd59d776ad07cae49ed84f8e166eb0c2a74b0d249393bb2a0e23c305bd480a8b1f6f9ea9c3c11f17776c8c04d8ede6e3db70c4a3a33d
-
Filesize
265KB
MD515fe972bcfd9189d826083838645b850
SHA1d2bf7fee68e358fa71b942b8ae92e483536abf86
SHA256ec739f26f487bcc65718bb8c28a5e3adf817a18e01952bd888f618a57c1e61d4
SHA51230f7c8daa78ba9bb32d5dca56440fd9b1d36336f496521920ab41737787c1c8e0bcdd714b72249e0ab52908d7918afcaf9e0b3f5ba2a8a2888e9adb538810cfe
-
Filesize
180KB
MD553e28e07671d832a65fbfe3aa38b6678
SHA16f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA2565c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9
-
Filesize
78B
MD52d245696c73134b0a9a2ac296ea7c170
SHA1f234419d7a09920a46ad291b98d7dca5a11f0da8
SHA256ed83e1f6850e48029654e9829cbf6e2cdff82f55f61d1449f822e448f75e8930
SHA512af0b981ef20aa94aff080fbd2030556fe47c4cc563885b162e604f72bc70c4a0eee4ee57ce4ea8964e6363a32ba34f8bee933db30d3d61392c42299621a4fc79