Overview
overview
10Static
static
30e266a7216...9f.exe
windows10-2004-x64
100fed7be9f1...18.exe
windows10-2004-x64
1016ac715816...ea.exe
windows10-2004-x64
1026c470a8b0...9a.exe
windows10-2004-x64
102d47818e79...79.exe
windows10-2004-x64
102e6c446801...a5.exe
windows7-x64
102e6c446801...a5.exe
windows10-2004-x64
102f02d9074f...e7.exe
windows10-2004-x64
104d1fc94da1...dc.exe
windows10-2004-x64
10521f6870a3...07.exe
windows10-2004-x64
105e01d698ad...d1.exe
windows10-2004-x64
107dc4ebbe25...36.exe
windows10-2004-x64
10862a8f43d1...32.exe
windows10-2004-x64
10ba494624ee...0c.exe
windows10-2004-x64
10ba4c5213c0...28.exe
windows10-2004-x64
10bbfb7f577d...dc.exe
windows10-2004-x64
10be3d316058...ca.exe
windows10-2004-x64
10e1d166047d...d0.exe
windows10-2004-x64
10e56b24cbcd...10.exe
windows10-2004-x64
10ef4487829b...03.exe
windows10-2004-x64
10fdbb9a49cd...e7.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
0e266a72166321124c500c505eac80a998786768d1c1e7be12c0c09adbdb969f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16ac715816f3482cfc24aaddcdcd5f3994bb21599090c021f66c1dce047523ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
26c470a8b0d923529cb630dee55e87b901f38e0ee675c3213b68e8b1db239e9a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
2f02d9074fc5208b7b3e27f59a5867d15d3e0fa8490020ad8680b051f00a27e7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4d1fc94da13e115d0cfb24b80df5875a92e199a440121a1fe8c37f1258ef23dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5e01d698adb505dae22bf133909e0103e980c2f29ad0c1eecdf47f2487dafed1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
862a8f43d1bd92e93fbfad58f9943a043f45ae975ab50181d393ffb2fa848532.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
ba4c5213c01fa30e0752b610dd412c61729c7ecd046fa9a5bdde3b5bcccb9a28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
be3d3160582a8debaa43a4fd41c15c9912c7e9f9fd4b736991afb8ad220ebfca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e1d166047db27931c64d2750c2c0d4d27bb57655e624d6cd5eeed46b63a5cbd0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e56b24cbcd2f2dc78ead0bbfb6d673cbd44be4ae5db1dbbf9a1fdb709103d010.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
ef4487829bbec1eb751da8fe7227f27dccd52cd7f16d1d5d8bdcd1af42b36903.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe
Resource
win10v2004-20240508-en
General
-
Target
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe
-
Size
628KB
-
MD5
c0c6272b565328e812a8c7cea5d676c3
-
SHA1
47bfb96cc291735edbd66b7cbd703e0e2aa981f2
-
SHA256
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36
-
SHA512
65936efbfb6716abb04dde0c30d560080fd84654c040785a7e2c2369130aa821132f1488940adc980f66652cb864d444a542d95320d8abdd8776f1dfd5116c5c
-
SSDEEP
12288:MMrjy90HGqS2YZGj2whVmWX/q1LGHa9Db+3Mr89bwBUT:/yb2D2sVmWPmLGHH3MreyUT
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral12/memory/4920-27-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/4920-30-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/4920-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral12/memory/3620-20-0x0000000000D50000-0x0000000000D70000-memory.dmp net_reactor behavioral12/memory/3620-22-0x0000000002810000-0x000000000282E000-memory.dmp net_reactor -
Executes dropped EXE 4 IoCs
Processes:
du0FN18.exe1bI69hf7.exe2KN4523.exe3bz38Gf.exepid process 1964 du0FN18.exe 2488 1bI69hf7.exe 316 2KN4523.exe 2300 3bz38Gf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exedu0FN18.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" du0FN18.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
1bI69hf7.exe2KN4523.exe3bz38Gf.exedescription pid process target process PID 2488 set thread context of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 316 set thread context of 4920 316 2KN4523.exe AppLaunch.exe PID 2300 set thread context of 2404 2300 3bz38Gf.exe AppLaunch.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2444 2488 WerFault.exe 1bI69hf7.exe 460 316 WerFault.exe 2KN4523.exe 4888 2300 WerFault.exe 3bz38Gf.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3620 AppLaunch.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exedu0FN18.exe1bI69hf7.exe2KN4523.exe3bz38Gf.exedescription pid process target process PID 3212 wrote to memory of 1964 3212 7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe du0FN18.exe PID 3212 wrote to memory of 1964 3212 7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe du0FN18.exe PID 3212 wrote to memory of 1964 3212 7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe du0FN18.exe PID 1964 wrote to memory of 2488 1964 du0FN18.exe 1bI69hf7.exe PID 1964 wrote to memory of 2488 1964 du0FN18.exe 1bI69hf7.exe PID 1964 wrote to memory of 2488 1964 du0FN18.exe 1bI69hf7.exe PID 2488 wrote to memory of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 2488 wrote to memory of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 2488 wrote to memory of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 2488 wrote to memory of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 2488 wrote to memory of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 2488 wrote to memory of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 2488 wrote to memory of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 2488 wrote to memory of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 2488 wrote to memory of 3620 2488 1bI69hf7.exe AppLaunch.exe PID 1964 wrote to memory of 316 1964 du0FN18.exe 2KN4523.exe PID 1964 wrote to memory of 316 1964 du0FN18.exe 2KN4523.exe PID 1964 wrote to memory of 316 1964 du0FN18.exe 2KN4523.exe PID 316 wrote to memory of 1788 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 1788 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 1788 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 2844 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 2844 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 2844 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 316 wrote to memory of 4920 316 2KN4523.exe AppLaunch.exe PID 3212 wrote to memory of 2300 3212 7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe 3bz38Gf.exe PID 3212 wrote to memory of 2300 3212 7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe 3bz38Gf.exe PID 3212 wrote to memory of 2300 3212 7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe 3bz38Gf.exe PID 2300 wrote to memory of 2404 2300 3bz38Gf.exe AppLaunch.exe PID 2300 wrote to memory of 2404 2300 3bz38Gf.exe AppLaunch.exe PID 2300 wrote to memory of 2404 2300 3bz38Gf.exe AppLaunch.exe PID 2300 wrote to memory of 2404 2300 3bz38Gf.exe AppLaunch.exe PID 2300 wrote to memory of 2404 2300 3bz38Gf.exe AppLaunch.exe PID 2300 wrote to memory of 2404 2300 3bz38Gf.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe"C:\Users\Admin\AppData\Local\Temp\7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\du0FN18.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\du0FN18.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1bI69hf7.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1bI69hf7.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 5524⤵
- Program crash
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2KN4523.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2KN4523.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1788
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2844
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 5924⤵
- Program crash
PID:460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3bz38Gf.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3bz38Gf.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
PID:2404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 1483⤵
- Program crash
PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2488 -ip 24881⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 316 -ip 3161⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2300 -ip 23001⤵PID:3356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5a0fa1a3d5b63449f70b1bd626ae6e7fc
SHA1e7280f12fa5b570c3dbd1a21cc6f317ce40b6bb7
SHA2560bf46903bd866ef85fe5a391639b1c9888b53913ce2e37f56a69ad02b4e15b93
SHA512d486312351c1573d64b39221b6e6a716020304057244769aa74904b0dc7a7e6f0d9174d607b7e84ceeb1cafc0e1145dc1fb2a974a659da7c058ac269f53cd3de
-
Filesize
444KB
MD5aa61a3cd164b2fa2f88c2d0a955ff94a
SHA131f6ce582226abd4c20dec32aa4594d377e8ac57
SHA256a6c66037dfa253bcf8a254d37350aed7c32b36f6a854949354fa08f60922cf24
SHA512f58f34d35ee4a97a050b1071f5eaeaf6c3c3adea992788ce35c3199b06f5933ed15febb5aa5e61b4fb68d0d55f6a0ff2e96c9aea25297dba9124fa293f366bac
-
Filesize
306KB
MD5cffbf89be9b8ebbba9a11ea60f0be22e
SHA186269fe003ca2411781daf149ea2d8b91503c663
SHA256824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62
SHA5123690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273
-
Filesize
295KB
MD5542b4a3030dfa0a861ba6f782d6a6d0a
SHA1ca71dbaac51113c3a6e77f04da2cf80af02b8905
SHA25664844b2cdddd028c9f44f65658aa599cc805e33583e9da6a13decb55f5233fa6
SHA512305c5073d28cb5fa0b85cba10ff854f81e51b4be194108b3dfc2a924811f3ec2889b69eaf24a4757a28de1f9d534edb2e5093384543a0c35fad9b06c6ad8e0ff