Overview
overview
10Static
static
30d17733c30...5d.exe
windows10-2004-x64
1012afd6aace...a7.exe
windows10-2004-x64
101a9919325d...ce.exe
windows10-2004-x64
101b565f7ed3...1d.exe
windows10-2004-x64
102c58ee5805...6e.exe
windows10-2004-x64
1033598ea86e...12.exe
windows10-2004-x64
104e5d421522...cb.exe
windows10-2004-x64
104ff3477e4f...b7.exe
windows10-2004-x64
106ee2a56c58...f5.exe
windows10-2004-x64
10803bdeb4bc...3b.exe
windows10-2004-x64
1082c26e730c...f6.exe
windows10-2004-x64
1092d5779e2c...c1.exe
windows10-2004-x64
10b0845c677f...61.exe
windows10-2004-x64
10b82c1f093a...b3.exe
windows10-2004-x64
10c52f1aa452...c1.exe
windows10-2004-x64
10c7bf16d19a...5c.exe
windows10-2004-x64
10d85805160c...b3.exe
windows10-2004-x64
10e4e49b8568...6d.exe
windows10-2004-x64
10e5ef76e6dd...ba.exe
windows10-2004-x64
10fac8fce7e3...0e.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
0d17733c3019d71570f413fb2cf93247ef44984d57c0d378e5853597b1efcc5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
12afd6aace975903b46162ca80f43ceaeffd722715cf2a23433c1c09c4bdf7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1a9919325da63b8484a6bd765fb24e43189e13130d5740306b71aac0ea7178ce.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1b565f7ed39bcb3768a8d15009e2ee03870984f6900010642cd696ee9c5efc1d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
33598ea86e5fb6e4703678ac412886ef6b59161a6c845c900d25dda182afa112.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4e5d421522773b4acede9491200eb6a0479ef03a8892230b81ba0d0ed10d98cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4ff3477e4f6bd6e3e862b79ae405c63df8d69b707138781208fb58578b8246b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
6ee2a56c58d7b91b6debe8aed2285fcef3c3e50613fe3c8b6f7d5a94968b59f5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92d5779e2c52f5941931dde42396f724a8986970826adad853ad885da3caccc1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b0845c677fbb6f6769b22ee306bf30e9c9d49caa3bfd274fceb91e91bd6ee061.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b82c1f093a07f8365a76b180a16ceba720e598167e3d606f93fedc39de6692b3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c52f1aa4527983452b72bfcc7c7498055116825e436d192acbb7b799124415c1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c7bf16d19af53ce0e356ff0a03ca5f2bf14034d9e265c438dc88513cd09cf55c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d85805160cf3294fe4b79968f7cee19fdaf73c0a9ed5ab8fffa11fa7fd3bddb3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e4e49b8568937c43bba5621fcfe9e3762efb9c4078b3287603ef249c522d126d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e5ef76e6dd861b064544fe5f0400d8d476e07d29a56f78d564dd2a73252e39ba.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fac8fce7e33f863be353a7bbf44a4fc673ab60a051fa66cebe5511a000ee1a0e.exe
Resource
win10v2004-20240226-en
General
-
Target
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe
-
Size
1.2MB
-
MD5
55cdd95fc367cdccba3cf9a83bb8676e
-
SHA1
8ded20c3a09f0ebf77a6412e07b088f478a5b61c
-
SHA256
82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6
-
SHA512
528acc8bcd165996bb7fdc3429c933f94cd9b8f8565df5bf54a331519241efac28938ed6b066938b94fac46dd71affd424b2ec225466675dae91778ce47d3caf
-
SSDEEP
24576:gyd1h+cgcAt/V3DklK4IxQzHTV8XP3sWlHRUGJoK+oYMNyK:n5gr3QoLxQN0P8WxUzWN
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral11/memory/2868-56-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral11/memory/2868-54-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral11/memory/2868-53-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 4172 VE1Mv64.exe 3160 1Wz73oG2.exe 2268 2lM4333.exe 4872 3gJ06Ji.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" VE1Mv64.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3160 set thread context of 4484 3160 1Wz73oG2.exe 88 PID 2268 set thread context of 2868 2268 2lM4333.exe 93 PID 4872 set thread context of 384 4872 3gJ06Ji.exe 97 -
Program crash 3 IoCs
pid pid_target Process procid_target 3140 3160 WerFault.exe 85 1056 2268 WerFault.exe 92 4792 4872 WerFault.exe 96 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4484 AppLaunch.exe 4484 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4484 AppLaunch.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4172 1004 82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe 83 PID 1004 wrote to memory of 4172 1004 82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe 83 PID 1004 wrote to memory of 4172 1004 82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe 83 PID 4172 wrote to memory of 3160 4172 VE1Mv64.exe 85 PID 4172 wrote to memory of 3160 4172 VE1Mv64.exe 85 PID 4172 wrote to memory of 3160 4172 VE1Mv64.exe 85 PID 3160 wrote to memory of 4484 3160 1Wz73oG2.exe 88 PID 3160 wrote to memory of 4484 3160 1Wz73oG2.exe 88 PID 3160 wrote to memory of 4484 3160 1Wz73oG2.exe 88 PID 3160 wrote to memory of 4484 3160 1Wz73oG2.exe 88 PID 3160 wrote to memory of 4484 3160 1Wz73oG2.exe 88 PID 3160 wrote to memory of 4484 3160 1Wz73oG2.exe 88 PID 3160 wrote to memory of 4484 3160 1Wz73oG2.exe 88 PID 3160 wrote to memory of 4484 3160 1Wz73oG2.exe 88 PID 3160 wrote to memory of 4484 3160 1Wz73oG2.exe 88 PID 4172 wrote to memory of 2268 4172 VE1Mv64.exe 92 PID 4172 wrote to memory of 2268 4172 VE1Mv64.exe 92 PID 4172 wrote to memory of 2268 4172 VE1Mv64.exe 92 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 2268 wrote to memory of 2868 2268 2lM4333.exe 93 PID 1004 wrote to memory of 4872 1004 82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe 96 PID 1004 wrote to memory of 4872 1004 82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe 96 PID 1004 wrote to memory of 4872 1004 82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe 96 PID 4872 wrote to memory of 384 4872 3gJ06Ji.exe 97 PID 4872 wrote to memory of 384 4872 3gJ06Ji.exe 97 PID 4872 wrote to memory of 384 4872 3gJ06Ji.exe 97 PID 4872 wrote to memory of 384 4872 3gJ06Ji.exe 97 PID 4872 wrote to memory of 384 4872 3gJ06Ji.exe 97 PID 4872 wrote to memory of 384 4872 3gJ06Ji.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe"C:\Users\Admin\AppData\Local\Temp\82c26e730c449cb8fa3b24eb4cad396dfb875eecd3ee1ccbb1d8fe29530d3ef6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VE1Mv64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VE1Mv64.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Wz73oG2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Wz73oG2.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 5764⤵
- Program crash
PID:3140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2lM4333.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2lM4333.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 6004⤵
- Program crash
PID:1056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3gJ06Ji.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3gJ06Ji.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 5723⤵
- Program crash
PID:4792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3160 -ip 31601⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2268 -ip 22681⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4872 -ip 48721⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5bb15cec1552b814cd4f121eacaf07ca3
SHA148b19541a3315d5d45f6d9c58386f999f340696a
SHA256ac592ed0fd072aa98b1098b5d23de6a8e09b5e33c21fb0e1705458a5a6d3e28a
SHA5129f6aff698162c4fc7cbe5112e53389d5d3253926e778fda16811cdb52ff1554023f5f029b704149f05c7121ee774b247f47db8f9904c83866484103db9e0b1c2
-
Filesize
739KB
MD5d9672337e47855244e5e59f1b51af06f
SHA15e3d0295d1b779e95199a24d130331c6f2a0512a
SHA25656b70ed46710e95d76904d25e723f62385f6c9da77fa44e58ce8db00abc4ce23
SHA512c416e769de5c65fb1ae7e849b82b3ab3fb21dec9cec0ce5620a266c0eb1aeb7ed9df939f392158f30ca1441738e32a997c48f4fb52058af34a7065e95cc7be4f
-
Filesize
1.8MB
MD57ff60b81cdc13db40d086d86b470072f
SHA16024ad854cb6f149391930388c9851888db87b08
SHA256d0b4d52ab3e17f14e34c1751fa2b69ce52e34ca0076663a7fdeeed7824faa08f
SHA512fc4cac5efbbbf6b3cf4a6e327d29ee52f42bc6df4eacb3a2e77c1b4b9cdda5107ebf7478c4e974d1beff96957021de0354183b6a97af1b1812bade382f0f90c7
-
Filesize
1.7MB
MD552f182039ef01e396d7302aaf7391a19
SHA160e94cc7454ea39596cd62a9a51145de6a28d224
SHA256995cb76b4703e2c98b500dab899c7225f639d4b4a0103d2923cad1f34ff062ca
SHA512fb48e713594f60f2e867aaa99deafeeffdc2bebff8b344578c5a7b49b1949b08e8159750ea99f5cef9bc185eb2d319bee1ccae4c86faf3b005a8c7ff173a300f