Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 17:26

General

  • Target

    36b2548e8cff694e8667d04ab33d149c6e8bc4cad4bc4adc501ac7c1189f6c4f.exe

  • Size

    696KB

  • MD5

    60a06b357591f715a801b79c5b32967a

  • SHA1

    5dd59fe5078e07bac523f417ff4b99df60df684a

  • SHA256

    36b2548e8cff694e8667d04ab33d149c6e8bc4cad4bc4adc501ac7c1189f6c4f

  • SHA512

    0b0c2da8a778fbdd211ebddef16aa59f39fdfe5f3b460d065a7e6ca0d8988b18d7ff0d6a5b3f97367e239a85cee2ac89ac6733026ed0f5df2bd2ca235b8730ba

  • SSDEEP

    12288:rMrty90OK5hhGOKyXEEGFQabDD7zd1pHlrdMz6172w7XQcVIfGQWsCDDM:eyIPxPNGFNLpHv247AcVIvfCPM

Malware Config

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36b2548e8cff694e8667d04ab33d149c6e8bc4cad4bc4adc501ac7c1189f6c4f.exe
    "C:\Users\Admin\AppData\Local\Temp\36b2548e8cff694e8667d04ab33d149c6e8bc4cad4bc4adc501ac7c1189f6c4f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MW4tw07.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MW4tw07.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Oe20KW3.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Oe20KW3.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2yK9039.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2yK9039.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3088
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:3640
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 156
            4⤵
            • Program crash
            PID:1516
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3DV57YK.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3DV57YK.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4412
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:5080
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
            • Checks SCSI registry key(s)
            PID:1756
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 256
            3⤵
            • Program crash
            PID:724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3088 -ip 3088
        1⤵
          PID:3820
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4412 -ip 4412
          1⤵
            PID:216

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3DV57YK.exe

            Filesize

            268KB

            MD5

            f09b788bfb242f8edcb4b4ab2bd0275a

            SHA1

            71b2273479460cbda9d08073d0b116935d2c6813

            SHA256

            f291d8694f3198b824474d57a18792218a5d622f2f59370efe6679563db87521

            SHA512

            709bdc1a303159b27f7e7fa793d1c78f3d6223b5a3ba2c03cbea36eafc1bd0e2edc1bd19e61f7ed5ca53a1ab5018d7c171fc9c3c4ff67b02b4087a07cfd5dda6

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MW4tw07.exe

            Filesize

            452KB

            MD5

            e723e66d50960c4f8874f27c00f0fde8

            SHA1

            64de6968e6858883d1176c76d74c7a2d0f09e794

            SHA256

            563cfc38646b7f60b5722d0ce0c1b114ed4ebd5ae4034df42fcf9988dff0935a

            SHA512

            12f1b7db162bed457634913e926adb4a53abbe80f49bd418a023e42769c3c1d9e2e4966612014c21240d279437b0b8011034a5fed161d5c66e99678d9e4d0685

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Oe20KW3.exe

            Filesize

            192KB

            MD5

            8904f85abd522c7d0cb5789d9583ccff

            SHA1

            5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

            SHA256

            7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

            SHA512

            04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2yK9039.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • memory/928-35-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-31-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-18-0x0000000004AD0000-0x0000000004AEC000-memory.dmp

            Filesize

            112KB

          • memory/928-19-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/928-47-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-45-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-43-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-41-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-39-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-37-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-16-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/928-48-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/928-33-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-17-0x0000000004C50000-0x00000000051F4000-memory.dmp

            Filesize

            5.6MB

          • memory/928-29-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-27-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-25-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-23-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-21-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-20-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

            Filesize

            88KB

          • memory/928-50-0x0000000073C50000-0x0000000074400000-memory.dmp

            Filesize

            7.7MB

          • memory/928-15-0x0000000002360000-0x000000000237E000-memory.dmp

            Filesize

            120KB

          • memory/928-14-0x0000000073C5E000-0x0000000073C5F000-memory.dmp

            Filesize

            4KB

          • memory/1756-61-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/3640-57-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3640-55-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3640-54-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB