Overview
overview
10Static
static
30697314d1d...a5.exe
windows10-2004-x64
100f998493b8...79.exe
windows10-2004-x64
1021e1937094...38.exe
windows10-2004-x64
102800d64eb3...31.exe
windows10-2004-x64
10299e46ee08...d5.exe
windows10-2004-x64
103d64fae31a...d7.exe
windows10-2004-x64
10652a4e2d36...35.exe
windows10-2004-x64
106b4d258a8d...1a.exe
windows10-2004-x64
1074c99e0dfd...42.exe
windows10-2004-x64
107e6bab9491...d0.exe
windows10-2004-x64
1080af2b3540...7e.exe
windows10-2004-x64
10a96b277202...ca.exe
windows10-2004-x64
10b618a9cedf...7f.exe
windows10-2004-x64
10c1237a6a46...5b.exe
windows10-2004-x64
10d7fde0f5ef...97.exe
windows10-2004-x64
10da85318c86...60.exe
windows10-2004-x64
10dc220ed080...4e.exe
windows10-2004-x64
10e5e7bb0a7c...4a.exe
windows10-2004-x64
10e91c8d8104...e0.exe
windows10-2004-x64
10f3b6442113...3b.exe
windows10-2004-x64
10Analysis
-
max time kernel
137s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
0697314d1d15813c538133353196a25ddf09e9340585e2de0be061757a02bea5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0f998493b83f94488301c2a7f85ec4ad445820110ece601aee7e9d15a5ae5179.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
21e19370941ed45f65950d345652c8fe76f4f409b0bbb8261c579fb219042338.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
2800d64eb3bc5b7c1f807e9baaf76c469f1d63f07cc116fb310c5c866087d931.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
299e46ee08841fc6eb4d1c18d756d39f82a681622c3d6cb0e68ec7f71013a4d5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
3d64fae31acb5d4e6e0319606608e94d2b3a017279c295dba43ce4d28aab53d7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
652a4e2d36de8360e61d407c228b3eb8948cafa60881c208bbd568afd7222f35.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6b4d258a8d8ba67789ff7894ed84c9e89d61a4f8f9d156a7c732ddf5e5f4511a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
74c99e0dfdc0750268c34c3d63288e0bea52796a82c9b157a495fbe2608d4942.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7e6bab949194c1776ccda7ecf613ef45e2d619717d44730efec0049e322789d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
80af2b3540716fa5dcd664b7f7ed120e1c1aa575c2fc1e1b6ee5df1723f2ab7e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a96b2772021c2a9c228f53c7583855c51eac18dbb16e1dc62969e62c6aa9ceca.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b618a9cedf57a29c508359374db294c624b68a83d6b7b01f154cd25515b3777f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
c1237a6a46458518390f044aae909d7b4e395ae64c6bb1db16e0cbe581f8d65b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d7fde0f5efb7f555528ff1c98946e36088ec7396d07c4fd0a577c6b49c4bcd97.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
dc220ed080f58ca4a078f8ea2a3ba2d42611f3da8514d41359c39eae805b1c4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e5e7bb0a7cc45636a72f93a4151ea7e22ee4ee9111c58d3a429b065f67104b4a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
f3b64421133b7924d58e6aecea4508423a6b611f1b55b129f7ac031c0458b73b.exe
Resource
win10v2004-20240426-en
General
-
Target
da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe
-
Size
479KB
-
MD5
a36f65f317ac41f8fd835d9472e54596
-
SHA1
0770f7e17bee482e980bde6157d36ab6612eafa5
-
SHA256
da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60
-
SHA512
8dbfcc1b252a305f435b289ba4433e3c6c6256a8bfe99b73e1b323270c174885ad6ed3917607b1fc81573f79ce6e07ed7bb91dbae1d693ed9a04d948d58eb32d
-
SSDEEP
12288:QMr5y90ud12LTOXvHR3swsWf4yLlnzmXJ:5yeTOXvHRLsWQ4lnzA
Malware Config
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral16/memory/2372-46-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/2372-48-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/2372-50-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral16/memory/2372-47-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1iL26jR8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1iL26jR8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1iL26jR8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1iL26jR8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1iL26jR8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1iL26jR8.exe -
Executes dropped EXE 2 IoCs
pid Process 2448 1iL26jR8.exe 1920 2wR4164.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1iL26jR8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1iL26jR8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1920 set thread context of 2372 1920 2wR4164.exe 98 -
Program crash 1 IoCs
pid pid_target Process procid_target 4296 1920 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2448 1iL26jR8.exe 2448 1iL26jR8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2448 1iL26jR8.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2448 4060 da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe 83 PID 4060 wrote to memory of 2448 4060 da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe 83 PID 4060 wrote to memory of 2448 4060 da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe 83 PID 4060 wrote to memory of 1920 4060 da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe 97 PID 4060 wrote to memory of 1920 4060 da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe 97 PID 4060 wrote to memory of 1920 4060 da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe 97 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98 PID 1920 wrote to memory of 2372 1920 2wR4164.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe"C:\Users\Admin\AppData\Local\Temp\da85318c86e347642de41ee65fd6363813b5e0b29587b390f0258c819f35ec60.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1iL26jR8.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1iL26jR8.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2wR4164.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2wR4164.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 5763⤵
- Program crash
PID:4296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1920 -ip 19201⤵PID:2104
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD535d718538c3e1346cb4fcf54aaa0f141
SHA1234c0aa0465c27c190a83936e8e3aa3c4b991224
SHA25697e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36
SHA5124bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3
-
Filesize
423KB
MD54c2bad1fd96c888ce1fe27e206e3f656
SHA19daab8534f7de7bb43472fc9c9672da31567fa0e
SHA256e6f399a2b4b56b0bd7a9402e01ff13554fbae7195df6ec1e6faeafdc04f72537
SHA5127174cba5194c8ea273d0ff3dce0a426eecb0ac86b4ad8defb1b5f29ad33f9f55a7fbb9d0ded82dfdcb2846963aabc8a23ad319568b6a379fdd27715fd4071976