Overview
overview
10Static
static
304a87b8f05...aa.exe
windows10-2004-x64
10114af5c13b...fd.exe
windows10-2004-x64
101e8dd381c7...01.exe
windows10-2004-x64
1022e22c4ac4...b8.exe
windows10-2004-x64
102539ef3c9e...7a.exe
windows10-2004-x64
1028e3223b75...cb.exe
windows10-2004-x64
102a370f0b1b...d2.exe
windows10-2004-x64
10312eee3369...2a.exe
windows10-2004-x64
1049fe85c527...13.exe
windows10-2004-x64
105b3b69df98...46.exe
windows10-2004-x64
1073935ea9dd...cf.exe
windows10-2004-x64
107afbfc55db...35.exe
windows10-2004-x64
107b920ad0a6...fd.exe
windows10-2004-x64
10867a7ac357...10.exe
windows10-2004-x64
10a69474bf18...5d.exe
windows10-2004-x64
10c1509297f2...7d.exe
windows10-2004-x64
10c1821fe13b...86.exe
windows10-2004-x64
10d431e54eb0...f6.exe
windows10-2004-x64
10e0e0fe767a...79.exe
windows10-2004-x64
10f1372b1a09...cc.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
114af5c13b66325340fcc0e38e22cb3c0a2f713ad1346010b0a9fc80f025e1fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1e8dd381c7b2d8b87f2596a2bfbccc3c813d8571fdbe788e678c3a733a5cae01.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
22e22c4ac4de60508d13a9152534da8f1fe27d387785252b3e90c5daa1939eb8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
28e3223b75032745af45a606afdbd1788365c7af9b20cc01d5892478c17d91cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2a370f0b1b44ffdfd5105d8de5cdb127afee410219b503b0620c23343a163ad2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
312eee33696f223c1d77f63d4f4fa6692b492a19e1815f424ea276db2dfa312a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
49fe85c527d85f575f10ffaacbea94923608dbe00ee181347f30f31686a10513.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5b3b69df98aea93f199289802070d29f0815829817936cfd60b3b627e0d20146.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
73935ea9dd223123d7d2e2b97d297ba24e82bd39f8b4e6004027a7cc1b07ffcf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
7afbfc55db219ad6f0335344f7e4d1119a281a9e98656ca51496a2ccedc75d35.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
867a7ac357adfff48d6fc2820efa7db93b3c2303fa2c5f2570c1760004b2a310.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a69474bf18a7cca7eda490dd3a0e3f56de60989fbd935adbc91521cc640dd35d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c1509297f254a9c327f8d2f138ec5907931f396cedb4bb4796c5057e78cda87d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c1821fe13b3b9c1fc3fe603dfd3668b199fd7d6f671e0f72b8a9fff5a38fd286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d431e54eb05e1ec91d96e56b56b50a6e510a259b69f7c5c8254a8954192e94f6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e0e0fe767a4d28c22c9164941b937ca32139dda9a5ac00b380e14f39f0bc2e79.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f1372b1a0961a0c57fe69d716e6992ea2a6a82ef2944465f88c1a99f117de4cc.exe
Resource
win10v2004-20240426-en
General
-
Target
7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe
-
Size
490KB
-
MD5
e0f4a803421ae7cf8f3ec6b79f4e6644
-
SHA1
879c5d1acd49dc1de7a5038961b6a176bd32be94
-
SHA256
7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd
-
SHA512
a77d1a1f049c018be195de927b94de1465c0e51020232f5307d567ee994abac101208796e01d0bd4f7064c7d8d2bea2b9a73f8543dbacf4f878a9b8faa31ee83
-
SSDEEP
12288:YMrfy90TEL3H7cAAP1fbuq6Sn5ZM+eLtR6:ny13IzCq6Sn5G+eLtR6
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral13/memory/3244-24-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral13/memory/3244-25-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral13/memory/3244-27-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral13/files/0x0008000000023440-12.dat healer behavioral13/memory/944-14-0x00000000008A0000-0x00000000008AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1mo64pt1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1mo64pt1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1mo64pt1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1mo64pt1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1mo64pt1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1mo64pt1.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 336 lf7vs80.exe 944 1mo64pt1.exe 3932 2rn8858.exe 4344 3VR83ec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1mo64pt1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" lf7vs80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3932 set thread context of 4868 3932 2rn8858.exe 98 PID 4344 set thread context of 3244 4344 3VR83ec.exe 104 -
Program crash 2 IoCs
pid pid_target Process procid_target 2932 3932 WerFault.exe 95 1700 4344 WerFault.exe 102 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 944 1mo64pt1.exe 944 1mo64pt1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 944 1mo64pt1.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3712 wrote to memory of 336 3712 7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe 82 PID 3712 wrote to memory of 336 3712 7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe 82 PID 3712 wrote to memory of 336 3712 7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe 82 PID 336 wrote to memory of 944 336 lf7vs80.exe 83 PID 336 wrote to memory of 944 336 lf7vs80.exe 83 PID 336 wrote to memory of 3932 336 lf7vs80.exe 95 PID 336 wrote to memory of 3932 336 lf7vs80.exe 95 PID 336 wrote to memory of 3932 336 lf7vs80.exe 95 PID 3932 wrote to memory of 4744 3932 2rn8858.exe 97 PID 3932 wrote to memory of 4744 3932 2rn8858.exe 97 PID 3932 wrote to memory of 4744 3932 2rn8858.exe 97 PID 3932 wrote to memory of 4868 3932 2rn8858.exe 98 PID 3932 wrote to memory of 4868 3932 2rn8858.exe 98 PID 3932 wrote to memory of 4868 3932 2rn8858.exe 98 PID 3932 wrote to memory of 4868 3932 2rn8858.exe 98 PID 3932 wrote to memory of 4868 3932 2rn8858.exe 98 PID 3932 wrote to memory of 4868 3932 2rn8858.exe 98 PID 3712 wrote to memory of 4344 3712 7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe 102 PID 3712 wrote to memory of 4344 3712 7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe 102 PID 3712 wrote to memory of 4344 3712 7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe 102 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104 PID 4344 wrote to memory of 3244 4344 3VR83ec.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe"C:\Users\Admin\AppData\Local\Temp\7b920ad0a6eced7be30fccab39067587eeb4a839174adbe7371d2a0ebb0206fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lf7vs80.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lf7vs80.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1mo64pt1.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1mo64pt1.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2rn8858.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2rn8858.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 6164⤵
- Program crash
PID:2932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3VR83ec.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3VR83ec.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 1523⤵
- Program crash
PID:1700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3932 -ip 39321⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4344 -ip 43441⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD54857564c4f915db2e05b86f8d3aaa8d5
SHA119fa7769475a5f25d0aa0112a8deaa3bb491a55a
SHA256df243004cdb7bd239defd6085631357e6ec12ff4631ae96a2be2a661d2509ec3
SHA512b6934cb88e03c134aff18f82299fa9420be59445c929f5a076d7609067729efaa39f908ea31ecce02d036dd84a599742061373ca25156b52084b1f2c51a5f444
-
Filesize
248KB
MD5c4ac9d6c522c95e1e93aba4c4aa3fdd5
SHA19008a4934ed242ab356778843c09babd4113ef78
SHA256662f398e8091ccc4bdd7634d852d8be2f818508950739d642859eb725f090fd3
SHA5129c78ab38dd4e0006471b925b496c83d5e0843fb5e10241283a7ac75c9efb9c6c887744ae8666866f63509a1c9869577f4c8147805dd03f2ec0defee0a0e23c79
-
Filesize
12KB
MD576a340002dd78e493c77072d011742a6
SHA18c228a72586a68ed08a66398865414070171782b
SHA2568d38bfbaab1e977e27444bd4055630ce14685811b7b0595dfe5fbc5e08ac3ec1
SHA5121f833f39cd12235dfe381b06e29fc76e6980e73aae44b1ce3098dd2074d87a7d57cca9555ae69b01deeeb295f16608a5787f9d3d5210d73bd78ecb64124edf53
-
Filesize
175KB
MD5f8dbfa9ac5dee6c7a21c9db4eef38608
SHA1fd920470d0b2720bc1a6fa473f1654ca1fe60cb2
SHA256fe0adc1a700eb1bf5685f0a0e40ce264d5a9ecd4ddefb0429d13ad7e0df606da
SHA5120e134d4033bc2ce7b545d7abc43c094ea0a48532e246ca32f999bc1d0aa708f4e941426ded22b034def980fa84189809192fd3915f28df5cb981688c74bb53bb