Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 17:43

General

  • Target

    2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a.exe

  • Size

    696KB

  • MD5

    d5ec309839dfeecd969b8130e5749026

  • SHA1

    a98c8fcf74497f87b6554539ecfe827944173f1e

  • SHA256

    2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a

  • SHA512

    62621d7a1dcaec6d38821b675d253e1fcb3842f8681d5381891195347ab4f932dfe67662b77dc8565b04ab00c8757de19640964f6563523280e8c044b8a9b7cb

  • SSDEEP

    12288:1Mrqy90mN/4HcEZACMRlEsnBc13cGdab7D7z717HlrdMDc1r2w7hxvqNSmjB8PYy:ryDJ4Hc8ACMPEE2z257HvSC7h7YXje

Malware Config

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a.exe
    "C:\Users\Admin\AppData\Local\Temp\2539ef3c9ef568b60de04a70266f168cf5565fa88027d7d88812aed2417d527a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PB3RP77.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PB3RP77.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1lN02DS2.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1lN02DS2.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2xE5175.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2xE5175.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:3780
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 596
            4⤵
            • Program crash
            PID:4300
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Qw83fo.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Qw83fo.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:3260
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
            • Checks SCSI registry key(s)
            PID:4184
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 588
            3⤵
            • Program crash
            PID:3940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 932 -ip 932
        1⤵
          PID:3788
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2488 -ip 2488
          1⤵
            PID:3500
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe start wuauserv
            1⤵
            • Launches sc.exe
            PID:2228

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Qw83fo.exe

            Filesize

            268KB

            MD5

            f09b788bfb242f8edcb4b4ab2bd0275a

            SHA1

            71b2273479460cbda9d08073d0b116935d2c6813

            SHA256

            f291d8694f3198b824474d57a18792218a5d622f2f59370efe6679563db87521

            SHA512

            709bdc1a303159b27f7e7fa793d1c78f3d6223b5a3ba2c03cbea36eafc1bd0e2edc1bd19e61f7ed5ca53a1ab5018d7c171fc9c3c4ff67b02b4087a07cfd5dda6

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PB3RP77.exe

            Filesize

            452KB

            MD5

            a497555e753a22fa2cd865169eeed2bd

            SHA1

            ced835e2e1921c35b477fa8a2bce27ec799264e6

            SHA256

            0863952871c6e55ddcac6bd71da4e6cee203eddc3b6ccfec5e3fda4cdbf627e4

            SHA512

            77657aee28ee2d802ad1388511ae49f9aca465d0e0fadaf7f54439ede9026834722e3908dab94fdab38f6dfabcd075eb1e6606dd89df8f01e90e03f21c16030c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1lN02DS2.exe

            Filesize

            192KB

            MD5

            8904f85abd522c7d0cb5789d9583ccff

            SHA1

            5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

            SHA256

            7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

            SHA512

            04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2xE5175.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • memory/2496-38-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-32-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-18-0x0000000004990000-0x00000000049AC000-memory.dmp

            Filesize

            112KB

          • memory/2496-20-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-26-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-46-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-44-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-47-0x0000000074310000-0x0000000074AC0000-memory.dmp

            Filesize

            7.7MB

          • memory/2496-42-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-40-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-16-0x0000000004AC0000-0x0000000005064000-memory.dmp

            Filesize

            5.6MB

          • memory/2496-36-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-34-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-17-0x0000000074310000-0x0000000074AC0000-memory.dmp

            Filesize

            7.7MB

          • memory/2496-30-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-28-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-24-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-22-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-19-0x0000000004990000-0x00000000049A6000-memory.dmp

            Filesize

            88KB

          • memory/2496-48-0x0000000074310000-0x0000000074AC0000-memory.dmp

            Filesize

            7.7MB

          • memory/2496-50-0x0000000074310000-0x0000000074AC0000-memory.dmp

            Filesize

            7.7MB

          • memory/2496-15-0x0000000002330000-0x000000000234E000-memory.dmp

            Filesize

            120KB

          • memory/2496-14-0x000000007431E000-0x000000007431F000-memory.dmp

            Filesize

            4KB

          • memory/3780-56-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3780-57-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3780-54-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/4184-61-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB