Analysis

  • max time kernel
    131s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 17:01

General

  • Target

    5d2993b3c14eb3f833d52e4874f37ee17b3eeb5d75594bb31700eeb723ec95f9.exe

  • Size

    452KB

  • MD5

    39526e106dbda09d8e555a0ff20f30d0

  • SHA1

    a91b8cf366ff6fb255556160147aca84a2531ec8

  • SHA256

    5d2993b3c14eb3f833d52e4874f37ee17b3eeb5d75594bb31700eeb723ec95f9

  • SHA512

    ecabf935ad68fa4ff5a0791092d34f356850dec9c893f3f22c0c443353cec50aecf12a9957f4951d3f32c5362541a4a1dd87c90c6d81573cd9ab6baf84d9aca1

  • SSDEEP

    12288:fMrsy906un5B6oTqaKjD7Lh1SsmrdMZ71c2w7F:LySB6oTsPSs2Uo7F

Malware Config

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d2993b3c14eb3f833d52e4874f37ee17b3eeb5d75594bb31700eeb723ec95f9.exe
    "C:\Users\Admin\AppData\Local\Temp\5d2993b3c14eb3f833d52e4874f37ee17b3eeb5d75594bb31700eeb723ec95f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1xr29Lp5.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1xr29Lp5.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2ti1092.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2ti1092.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:1200
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 596
          3⤵
          • Program crash
          PID:1968
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1452 -ip 1452
      1⤵
        PID:4964

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1xr29Lp5.exe

        Filesize

        192KB

        MD5

        8904f85abd522c7d0cb5789d9583ccff

        SHA1

        5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

        SHA256

        7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

        SHA512

        04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2ti1092.exe

        Filesize

        378KB

        MD5

        f0831f173733de08511f3a0739f278a6

        SHA1

        06dc809d653c5d2c97386084ae13b50a73eb5b60

        SHA256

        8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

        SHA512

        19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

      • memory/1200-48-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1200-51-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1200-49-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1200-47-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2384-21-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-15-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-35-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-33-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-31-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-29-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-27-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-25-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-23-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-19-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-17-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-37-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-13-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-39-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-12-0x0000000004F60000-0x0000000004F76000-memory.dmp

        Filesize

        88KB

      • memory/2384-40-0x0000000073E00000-0x00000000745B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2384-41-0x0000000073E00000-0x00000000745B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2384-43-0x0000000073E00000-0x00000000745B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2384-11-0x0000000004F60000-0x0000000004F7C000-memory.dmp

        Filesize

        112KB

      • memory/2384-10-0x00000000049B0000-0x0000000004F54000-memory.dmp

        Filesize

        5.6MB

      • memory/2384-9-0x0000000073E00000-0x00000000745B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2384-8-0x0000000002280000-0x000000000229E000-memory.dmp

        Filesize

        120KB

      • memory/2384-7-0x0000000073E0E000-0x0000000073E0F000-memory.dmp

        Filesize

        4KB