Analysis

  • max time kernel
    134s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:30

General

  • Target

    6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478.exe

  • Size

    421KB

  • MD5

    a724995af13018d9a70245cec8f7678c

  • SHA1

    0a6821ee014bbc65ba0d5d93a0f9bfc27a59b8a7

  • SHA256

    6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478

  • SHA512

    ab2e981992379507a8c9ad0e1863022df69199815ee0637a794009487529baaa937f2f20538a8311662f18a45f4bb0d1d9838addca80925aa5693df89c9c9d90

  • SSDEEP

    12288:XMrJy90h+08qFUvuohyGkUvWZ32N5spIb8lEQi:yyj08qF3oa2NPb8+F

Malware Config

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478.exe
    "C:\Users\Admin\AppData\Local\Temp\6be7b83314dc014eebc2d7cc17ce0021ea7d66e03bf91c49ddd8050fdb95b478.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1BR81le0.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1BR81le0.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2HZ1997.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2HZ1997.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2236
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:3480
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:740
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 148
              3⤵
              • Program crash
              PID:4076
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1604 -ip 1604
          1⤵
            PID:5032

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1BR81le0.exe

            Filesize

            188KB

            MD5

            425e2a994509280a8c1e2812dfaad929

            SHA1

            4d5eff2fb3835b761e2516a873b537cbaacea1fe

            SHA256

            6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a

            SHA512

            080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2HZ1997.exe

            Filesize

            295KB

            MD5

            2535d13665aaea8bc291e0f740873a35

            SHA1

            700518b8ea3c64773e7e599a966db1132eb9cdc2

            SHA256

            8cc60ce23f0e123c796fabd56886254252bf42b0a9ee711fb0a84f229b87ecb4

            SHA512

            8a188c50f6bae7a325c9198c49f42bc2bc6f3e4e806649e24b6fff5eec513b097c057380a41595449e08c06f563f4017075344a07e984c9a9733f5285818000b

          • memory/740-22-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/740-24-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/740-21-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/740-20-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/3368-12-0x00000000741C0000-0x0000000074970000-memory.dmp

            Filesize

            7.7MB

          • memory/3368-13-0x00000000741C0000-0x0000000074970000-memory.dmp

            Filesize

            7.7MB

          • memory/3368-14-0x0000000005290000-0x0000000005322000-memory.dmp

            Filesize

            584KB

          • memory/3368-16-0x00000000741C0000-0x0000000074970000-memory.dmp

            Filesize

            7.7MB

          • memory/3368-11-0x0000000002670000-0x000000000268E000-memory.dmp

            Filesize

            120KB

          • memory/3368-10-0x0000000004BE0000-0x0000000005184000-memory.dmp

            Filesize

            5.6MB

          • memory/3368-9-0x00000000741C0000-0x0000000074970000-memory.dmp

            Filesize

            7.7MB

          • memory/3368-8-0x0000000002280000-0x00000000022A0000-memory.dmp

            Filesize

            128KB

          • memory/3368-7-0x00000000741CE000-0x00000000741CF000-memory.dmp

            Filesize

            4KB