Overview
overview
10Static
static
30e266a7216...9f.exe
windows10-2004-x64
100fed7be9f1...18.exe
windows10-2004-x64
1016ac715816...ea.exe
windows10-2004-x64
1026c470a8b0...9a.exe
windows10-2004-x64
102d47818e79...79.exe
windows10-2004-x64
102e6c446801...a5.exe
windows7-x64
102e6c446801...a5.exe
windows10-2004-x64
102f02d9074f...e7.exe
windows10-2004-x64
104d1fc94da1...dc.exe
windows10-2004-x64
10521f6870a3...07.exe
windows10-2004-x64
105e01d698ad...d1.exe
windows10-2004-x64
107dc4ebbe25...36.exe
windows10-2004-x64
10862a8f43d1...32.exe
windows10-2004-x64
10ba494624ee...0c.exe
windows10-2004-x64
10ba4c5213c0...28.exe
windows10-2004-x64
10bbfb7f577d...dc.exe
windows10-2004-x64
10be3d316058...ca.exe
windows10-2004-x64
10e1d166047d...d0.exe
windows10-2004-x64
10e56b24cbcd...10.exe
windows10-2004-x64
10ef4487829b...03.exe
windows10-2004-x64
10fdbb9a49cd...e7.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
0e266a72166321124c500c505eac80a998786768d1c1e7be12c0c09adbdb969f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16ac715816f3482cfc24aaddcdcd5f3994bb21599090c021f66c1dce047523ea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
26c470a8b0d923529cb630dee55e87b901f38e0ee675c3213b68e8b1db239e9a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d47818e79d8f9acc3caa85a2d99191ec3eff5843f379ecb9acf5e8610da5279.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
2e6c446801978c45f270ec540c0c9884a83b944218fb00b16d7091ab41c28ca5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
2f02d9074fc5208b7b3e27f59a5867d15d3e0fa8490020ad8680b051f00a27e7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4d1fc94da13e115d0cfb24b80df5875a92e199a440121a1fe8c37f1258ef23dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
521f6870a363ff65470792799f32a31b9a55349765195a9c0e5e0d64ffa38307.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5e01d698adb505dae22bf133909e0103e980c2f29ad0c1eecdf47f2487dafed1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
7dc4ebbe254d4cbc8e93064098173786d7ed5aa42b3c8d4abb55678e250a4b36.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
862a8f43d1bd92e93fbfad58f9943a043f45ae975ab50181d393ffb2fa848532.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ba494624eebd5343a245e58b1f24e0044ccb4c80897feb6a13e393719d23900c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
ba4c5213c01fa30e0752b610dd412c61729c7ecd046fa9a5bdde3b5bcccb9a28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
bbfb7f577d81fe47e80446b1eb11e1623a98b25decf06d6089302a7f9aa51adc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
be3d3160582a8debaa43a4fd41c15c9912c7e9f9fd4b736991afb8ad220ebfca.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e1d166047db27931c64d2750c2c0d4d27bb57655e624d6cd5eeed46b63a5cbd0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e56b24cbcd2f2dc78ead0bbfb6d673cbd44be4ae5db1dbbf9a1fdb709103d010.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
ef4487829bbec1eb751da8fe7227f27dccd52cd7f16d1d5d8bdcd1af42b36903.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
fdbb9a49cd039fc64f0cf2a64961e3168c0210a03dc0283c09dcd5f5d1b00ce7.exe
Resource
win10v2004-20240508-en
General
-
Target
0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe
-
Size
627KB
-
MD5
a023dcdf69a662c78b89ea42e27ddff1
-
SHA1
c285a8ddd972405bba6a643c45614bb9f6a7a1bb
-
SHA256
0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18
-
SHA512
02bed9b5c5bdabbb6890d92813c11c0401078a51762733a0ff1652860ce1f04b0df88f1a1873b940133dcdce2ca609897b00b27116b353b8b299daa662b1db9b
-
SSDEEP
12288:0Mrvy90w5u6t5if8iVo7jP8+ixDdt+PNbzQAyU9rwRxxDb/3brOw5aLc:Dyo6Ti27j0+ix8zQAXRCxb/3brL5l
Malware Config
Extracted
mystic
http://5.42.92.211/
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4584-19-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral2/memory/4584-22-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral2/memory/4584-20-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 4088 uw4jo81.exe 912 1yt26wD6.exe 2700 2UU0135.exe 4104 3HJ06gh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" uw4jo81.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 912 set thread context of 2088 912 1yt26wD6.exe 85 PID 2700 set thread context of 4584 2700 2UU0135.exe 93 PID 4104 set thread context of 768 4104 3HJ06gh.exe 99 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1056 sc.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 528 912 WerFault.exe 84 4708 2700 WerFault.exe 91 3228 4104 WerFault.exe 96 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2088 AppLaunch.exe 2088 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2088 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4088 2896 0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe 83 PID 2896 wrote to memory of 4088 2896 0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe 83 PID 2896 wrote to memory of 4088 2896 0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe 83 PID 4088 wrote to memory of 912 4088 uw4jo81.exe 84 PID 4088 wrote to memory of 912 4088 uw4jo81.exe 84 PID 4088 wrote to memory of 912 4088 uw4jo81.exe 84 PID 912 wrote to memory of 2088 912 1yt26wD6.exe 85 PID 912 wrote to memory of 2088 912 1yt26wD6.exe 85 PID 912 wrote to memory of 2088 912 1yt26wD6.exe 85 PID 912 wrote to memory of 2088 912 1yt26wD6.exe 85 PID 912 wrote to memory of 2088 912 1yt26wD6.exe 85 PID 912 wrote to memory of 2088 912 1yt26wD6.exe 85 PID 912 wrote to memory of 2088 912 1yt26wD6.exe 85 PID 912 wrote to memory of 2088 912 1yt26wD6.exe 85 PID 4088 wrote to memory of 2700 4088 uw4jo81.exe 91 PID 4088 wrote to memory of 2700 4088 uw4jo81.exe 91 PID 4088 wrote to memory of 2700 4088 uw4jo81.exe 91 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2700 wrote to memory of 4584 2700 2UU0135.exe 93 PID 2896 wrote to memory of 4104 2896 0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe 96 PID 2896 wrote to memory of 4104 2896 0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe 96 PID 2896 wrote to memory of 4104 2896 0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe 96 PID 4104 wrote to memory of 768 4104 3HJ06gh.exe 99 PID 4104 wrote to memory of 768 4104 3HJ06gh.exe 99 PID 4104 wrote to memory of 768 4104 3HJ06gh.exe 99 PID 4104 wrote to memory of 768 4104 3HJ06gh.exe 99 PID 4104 wrote to memory of 768 4104 3HJ06gh.exe 99 PID 4104 wrote to memory of 768 4104 3HJ06gh.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe"C:\Users\Admin\AppData\Local\Temp\0fed7be9f1bc5655b7c37c7839da72b6233320884e7029c3ca465ec9fa0bdc18.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uw4jo81.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uw4jo81.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1yt26wD6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1yt26wD6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 5844⤵
- Program crash
PID:528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2UU0135.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2UU0135.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 5644⤵
- Program crash
PID:4708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3HJ06gh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3HJ06gh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
PID:768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 5843⤵
- Program crash
PID:3228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 912 -ip 9121⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2700 -ip 27001⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4104 -ip 41041⤵PID:3656
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1056
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD542f7f253e4560c3f34e51224ff2db445
SHA19a498ee905e5b19a281996c16156746432e8177b
SHA25646751ea25f8226cf0b1d6c1d2d8ad7a261cb5fd48719ec669b2acc5a95bd508d
SHA512464a27fe76ce7aef5af45028020c7d85a60b4fe2ac01df40503a0b267b7ec7cfc23ec237ffbdc18364d68f066473685d522c0026792a7a91030fcb3ad6ced6c9
-
Filesize
388KB
MD5bea1f77d6043e836fb62540b338868c1
SHA1106977b5d3227b55becd83803ba51227dadb46df
SHA2563715bb832ec20a415c1ceb7b59fcd275de12645a9b7436cdbe56686a0465e45a
SHA512bb97470a52aec9c3c2486543fb3c73320a94548e305df298ce6b44fbe4dab7fc498a7cb2da953e64d737e7022e3ea553d5c7a64962be338d0c7dc26fbccb62d6
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
410KB
MD58e41a4f4df8c05d127d45ea1dc5a221d
SHA165b67a5618a75cb178aba2ce942e235c0c2cfd08
SHA256e213d0e65d3e73eecd6320248a0f4fad2db57d558639448e95e655c3c6da1d24
SHA5126d0c2e685b76c6c5c226bbbd8cf331bcdfb7eb3359a7e2ae7bee24482b2c00c3df7f186101dbc022be11d1ada80a84602f218cc61c6442617cdededad1cb1122