Overview
overview
10Static
static
3005cc897c6...01.exe
windows7-x64
3005cc897c6...01.exe
windows10-2004-x64
100f5dadb4ff...d5.exe
windows10-2004-x64
1015191ca573...45.exe
windows10-2004-x64
101f1cdd32ef...a5.exe
windows7-x64
31f1cdd32ef...a5.exe
windows10-2004-x64
1033277efd72...bf.exe
windows7-x64
333277efd72...bf.exe
windows10-2004-x64
1039b1b5acca...89.exe
windows10-2004-x64
1041914bb3aa...45.exe
windows10-2004-x64
104dc93952d5...05.exe
windows10-2004-x64
10636c6831e9...2d.exe
windows10-2004-x64
106371475aa9...ca.exe
windows10-2004-x64
106d98d2425a...11.exe
windows7-x64
36d98d2425a...11.exe
windows10-2004-x64
107d59382353...89.exe
windows7-x64
37d59382353...89.exe
windows10-2004-x64
107e9155d192...9c.exe
windows10-2004-x64
10817be3f5a4...87.exe
windows10-2004-x64
1084d690a678...8a.exe
windows10-2004-x64
108a833f1e2a...9a.exe
windows10-2004-x64
10a6207c613c...04.exe
windows7-x64
3a6207c613c...04.exe
windows10-2004-x64
10b843b5d179...78.exe
windows10-2004-x64
10bc0a361a97...2b.exe
windows10-2004-x64
10ccede3ed34...14.exe
windows10-2004-x64
10Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
005cc897c6fa2cdd0e0e44ec50a4f2ff3e7fa8269fe1ec09728e601cc06d9e01.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
005cc897c6fa2cdd0e0e44ec50a4f2ff3e7fa8269fe1ec09728e601cc06d9e01.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0f5dadb4ffffdd1baa1ca124e7bb4eaf0a415a1b71fc3e54a6944ac0f07a7cd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1f1cdd32efd5cdc4a70d77af2754296f6ddbca64d78c083caa19118964d61da5.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1f1cdd32efd5cdc4a70d77af2754296f6ddbca64d78c083caa19118964d61da5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
33277efd72a246f701b9c69dc414ee0ebab7e3cb5f576fa767dd942f09ac2dbf.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
33277efd72a246f701b9c69dc414ee0ebab7e3cb5f576fa767dd942f09ac2dbf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
39b1b5acca4de23a0180f902e3a92a03033ff877100271cfa20f0e782d62e989.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
41914bb3aa2d5a67292b5d348f81c71672076d674269fd9bfcbdb103aebf3d45.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
4dc93952d5fe7ecacd61cc033cbd3cdb682618f54ff89b22880ba0684a40e205.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
636c6831e9337ae0be8ccc466e94bff1945dfb0b1bb8dad69a2978f68f48512d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
6371475aa9cb4cc2dbcc2fa375c4d6e0f02eafc68e30119f4364189b97538dca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
6d98d2425aec61b790c642e31bda2ca87b98b6470b4dd60c08de1708587f1411.exe
Resource
win7-20240220-en
Behavioral task
behavioral15
Sample
6d98d2425aec61b790c642e31bda2ca87b98b6470b4dd60c08de1708587f1411.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
7d593823534c8bf5350a484383ae4c14165657f28d693b17a2faa06916c58289.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
7d593823534c8bf5350a484383ae4c14165657f28d693b17a2faa06916c58289.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
7e9155d19244bf4b3b908d8e3f9ee675fe08dd54149e960aadc1447230b8319c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
817be3f5a49a23d678fd0cb76bb61abf50214569606ac3d0d0600befd2d9c787.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
84d690a678e5c3055ce0a83992c921f35e5bf7b165506a695de85c34cf7b138a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
8a833f1e2a239f2ae11656b13c90eb1a39d92f5fca65599dbebd1081f208469a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
a6207c613c2f1beb9db6fd16ae372212cbd82f73a8c94afafe4c867a27518304.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
a6207c613c2f1beb9db6fd16ae372212cbd82f73a8c94afafe4c867a27518304.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
b843b5d1795644ec9e6dd14071ee33ee66683585f07a6c89d61ec113d763d278.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
bc0a361a973318fa776eb3e7f9c88901ca8d1d588434f1df0348b63576b6412b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
ccede3ed348e14362603f903262b1aaa83c22032a82a06b2b9e809756507f214.exe
Resource
win10v2004-20240426-en
General
-
Target
15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe
-
Size
696KB
-
MD5
1e67de39f39ec0ebf57a99f3c9792db4
-
SHA1
d48b53c6db8b76e897bed7fcf4d71a4b251761e2
-
SHA256
15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345
-
SHA512
207f4467ff437c5ee0c1bcfffbc4c9e04730f4425675284a796d139fd7847b5860ec0e519d0bddf522c5d61fd1e8b6b1843a4ca647655e470d223782e5408576
-
SSDEEP
12288:nMrfy90WDGzmGYraY2DHabvD7z61CHlrdMJY1v2w7N2dnPcAXej5+uttq1:QyrMmGYranDiYCHvUa7Y0AXw+utk1
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral4/memory/3376-54-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral4/memory/3376-55-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral4/memory/3376-57-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1GM40Wh1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1GM40Wh1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1GM40Wh1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1GM40Wh1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1GM40Wh1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1GM40Wh1.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 2448 HR7jR27.exe 2912 1GM40Wh1.exe 2924 2gt7231.exe 1628 3Kv71oF.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1GM40Wh1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1GM40Wh1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" HR7jR27.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2924 set thread context of 3376 2924 2gt7231.exe 96 PID 1628 set thread context of 556 1628 3Kv71oF.exe 102 -
Program crash 2 IoCs
pid pid_target Process procid_target 4152 2924 WerFault.exe 94 4588 1628 WerFault.exe 100 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2912 1GM40Wh1.exe 2912 1GM40Wh1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2912 1GM40Wh1.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4072 wrote to memory of 2448 4072 15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe 85 PID 4072 wrote to memory of 2448 4072 15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe 85 PID 4072 wrote to memory of 2448 4072 15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe 85 PID 2448 wrote to memory of 2912 2448 HR7jR27.exe 86 PID 2448 wrote to memory of 2912 2448 HR7jR27.exe 86 PID 2448 wrote to memory of 2912 2448 HR7jR27.exe 86 PID 2448 wrote to memory of 2924 2448 HR7jR27.exe 94 PID 2448 wrote to memory of 2924 2448 HR7jR27.exe 94 PID 2448 wrote to memory of 2924 2448 HR7jR27.exe 94 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 2924 wrote to memory of 3376 2924 2gt7231.exe 96 PID 4072 wrote to memory of 1628 4072 15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe 100 PID 4072 wrote to memory of 1628 4072 15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe 100 PID 4072 wrote to memory of 1628 4072 15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe 100 PID 1628 wrote to memory of 556 1628 3Kv71oF.exe 102 PID 1628 wrote to memory of 556 1628 3Kv71oF.exe 102 PID 1628 wrote to memory of 556 1628 3Kv71oF.exe 102 PID 1628 wrote to memory of 556 1628 3Kv71oF.exe 102 PID 1628 wrote to memory of 556 1628 3Kv71oF.exe 102 PID 1628 wrote to memory of 556 1628 3Kv71oF.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe"C:\Users\Admin\AppData\Local\Temp\15191ca5733dc24267c62d313d67d3b681de7a4926e8471dff771f7f746cf345.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HR7jR27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HR7jR27.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1GM40Wh1.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1GM40Wh1.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2gt7231.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2gt7231.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 5964⤵
- Program crash
PID:4152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Kv71oF.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Kv71oF.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
PID:556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 1523⤵
- Program crash
PID:4588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2924 -ip 29241⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1628 -ip 16281⤵PID:3496
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5f09b788bfb242f8edcb4b4ab2bd0275a
SHA171b2273479460cbda9d08073d0b116935d2c6813
SHA256f291d8694f3198b824474d57a18792218a5d622f2f59370efe6679563db87521
SHA512709bdc1a303159b27f7e7fa793d1c78f3d6223b5a3ba2c03cbea36eafc1bd0e2edc1bd19e61f7ed5ca53a1ab5018d7c171fc9c3c4ff67b02b4087a07cfd5dda6
-
Filesize
452KB
MD52c132cb787182fc57772d3028ba707ba
SHA10cbd1c2515b7d7f7aaa7f15eac097e949e0494f1
SHA25664cd99f027ad9ee9e152eebc28a16b3e27817bc00328d2cb1f99d8fec792f50d
SHA5125e074ce5fb2eafe680918b51395865c1ed77df9b07de63e0e48ddbe3c4d30c4b243ec82facc51c55c046839df9bb10dad07826c47791833519d1179e20666676
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3