Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 09:42

General

  • Target

    823db2b88de38daac96f8e746abe924341117f170be5cd8a57a2db86d001bc40.exe

  • Size

    654KB

  • MD5

    531a55b0843787d264949a52cffaf364

  • SHA1

    03beb7ab2f6cdcb2d8e50e0c421c477ec542485a

  • SHA256

    823db2b88de38daac96f8e746abe924341117f170be5cd8a57a2db86d001bc40

  • SHA512

    13767a9564609db88521e9606781d881b87d1ad6e774849d8c0cc7ba9ffded0853d0404f5bd16013d94203c270c9586987f12eb5eee879318287e3f06f7a6280

  • SSDEEP

    12288:/Mr6y90PeSqiA6ByIjd/ZMQCXOps5DgKWwLNWaUN1MOgsoo0H02LY:RyJhJs/ZMQCv/LNWqOgsbq9Y

Malware Config

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\823db2b88de38daac96f8e746abe924341117f170be5cd8a57a2db86d001bc40.exe
    "C:\Users\Admin\AppData\Local\Temp\823db2b88de38daac96f8e746abe924341117f170be5cd8a57a2db86d001bc40.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yk6uL64.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yk6uL64.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1CB89dT8.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1CB89dT8.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4740
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2yo2654.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2yo2654.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:220
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:1236
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3ZX35rY.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3ZX35rY.exe
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:4416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3ZX35rY.exe

      Filesize

      30KB

      MD5

      b3a38653e82e3e04cea0c18cc694e136

      SHA1

      b286df0eb93d10f5c566d4d8d386b2b782616db0

      SHA256

      76e50a42960ab6e72f8e898ae2ff54f4cc3a881924da045ce96770e46b79a490

      SHA512

      0f8b1340810592fff870c192df2b48384d78e79a4f946c7bb38fd175bb866bb5094493535b4d7fe4f8a076c10aa756e51c1747e35b54bcf2cc56aeeefe9609c4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yk6uL64.exe

      Filesize

      530KB

      MD5

      ddc8abfed19f1f6e359bf47f6f3c6550

      SHA1

      b62d5dd47e644c308a1249268a507bff94a60d14

      SHA256

      7bc7e03ef71896fdeb3a6a43e36ac8cbe7c77c2c79a81ad38afcc67b90592791

      SHA512

      9447ccfd1fb356501df31968655d2649f08b6f735044477cfe134170bb4ea9f7137dd3018527a3fcc43392a7918d2a344c3b06972a6d7eb2bd7a545d16a023f4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1CB89dT8.exe

      Filesize

      883KB

      MD5

      caa88ce4c0fadad5c978cb5cc49ab324

      SHA1

      3245052b5b2c63a4612a31348d30a42982a1cbdf

      SHA256

      69264f90596997245842390e3880c24544884982b79f97625056f459622f3bba

      SHA512

      928855c9af2b52ab215133ae3b30147eab8096e882c55578d2dcfef4ed12c5b25f369deb663f6099b547d49d0459e6713bde160806203e46c3cb4b26faf12a9d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2yo2654.exe

      Filesize

      1.1MB

      MD5

      a509c76fa57b9006d3c40bb19f8e6c30

      SHA1

      4318bcc9ac8806640fc4289bad531a4eee1346c6

      SHA256

      f729b516040f4e77783dd04cffe2b7dc63b87633110eabac9689538469f2f3bc

      SHA512

      a1ecc6db078967a3ba302a353faad552629e680a1dd84631da92f4ea690c16f8d2d7bf56e4c4a9f8e3096199f10eca3c30afde4eeab58dc3c188e400bd8d81aa

    • memory/1236-18-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1236-21-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1236-19-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3056-14-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4416-25-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4416-26-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB