Analysis

  • max time kernel
    137s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 05:30

General

  • Target

    da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe

  • Size

    479KB

  • MD5

    a36f65f317ac41f8fd835d9472e54596

  • SHA1

    0770f7e17bee482e980bde6157d36ab6612eafa5

  • SHA256

    da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60

  • SHA512

    8dbfcc1b252a305f435b289ba4433e3c6c6256a8bfe99b73e1b323270c174885ad6ed3917607b1fc81573f79ce6e07ed7bb91dbae1d693ed9a04d948d58eb32d

  • SSDEEP

    12288:QMr5y90ud12LTOXvHR3swsWf4yLlnzmXJ:5yeTOXvHRLsWQ4lnzA

Malware Config

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe
    "C:\Users\Admin\AppData\Local\Temp\da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1iL26jR8.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1iL26jR8.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2wR4164.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2wR4164.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 576
          3⤵
          • Program crash
          PID:4296
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1920 -ip 1920
      1⤵
        PID:2104

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1iL26jR8.exe

        Filesize

        194KB

        MD5

        35d718538c3e1346cb4fcf54aaa0f141

        SHA1

        234c0aa0465c27c190a83936e8e3aa3c4b991224

        SHA256

        97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

        SHA512

        4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2wR4164.exe

        Filesize

        423KB

        MD5

        4c2bad1fd96c888ce1fe27e206e3f656

        SHA1

        9daab8534f7de7bb43472fc9c9672da31567fa0e

        SHA256

        e6f399a2b4b56b0bd7a9402e01ff13554fbae7195df6ec1e6faeafdc04f72537

        SHA512

        7174cba5194c8ea273d0ff3dce0a426eecb0ac86b4ad8defb1b5f29ad33f9f55a7fbb9d0ded82dfdcb2846963aabc8a23ad319568b6a379fdd27715fd4071976

      • memory/2372-47-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2372-50-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2372-48-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2372-46-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2448-25-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-12-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-39-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-37-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-35-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-40-0x0000000073B70000-0x0000000074320000-memory.dmp

        Filesize

        7.7MB

      • memory/2448-33-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-27-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-31-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-23-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-15-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-29-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-21-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-19-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-17-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-13-0x00000000049A0000-0x00000000049B6000-memory.dmp

        Filesize

        88KB

      • memory/2448-42-0x0000000073B70000-0x0000000074320000-memory.dmp

        Filesize

        7.7MB

      • memory/2448-11-0x00000000049A0000-0x00000000049BC000-memory.dmp

        Filesize

        112KB

      • memory/2448-10-0x0000000004A20000-0x0000000004FC4000-memory.dmp

        Filesize

        5.6MB

      • memory/2448-9-0x0000000073B70000-0x0000000074320000-memory.dmp

        Filesize

        7.7MB

      • memory/2448-8-0x00000000021A0000-0x00000000021BE000-memory.dmp

        Filesize

        120KB

      • memory/2448-7-0x0000000073B7E000-0x0000000073B7F000-memory.dmp

        Filesize

        4KB