Overview
overview
10Static
static
30314c3cf58...62.exe
windows10-2004-x64
10142ed11f80...59.exe
windows10-2004-x64
101f54336cee...4f.exe
windows10-2004-x64
102470f02746...37.exe
windows10-2004-x64
10357dca1dd0...e2.exe
windows7-x64
10357dca1dd0...e2.exe
windows10-2004-x64
10367729c840...03.exe
windows10-2004-x64
103ae8cc733e...e3.exe
windows10-2004-x64
103ff87c5bd0...30.exe
windows10-2004-x64
104157cda315...a6.exe
windows10-2004-x64
105f318080c6...ea.exe
windows10-2004-x64
10620f9ee1b4...8f.exe
windows10-2004-x64
106817354347...3a.exe
windows10-2004-x64
10753cdc12b9...91.exe
windows10-2004-x64
10a4215d26b6...74.exe
windows10-2004-x64
10a4375e040f...82.exe
windows10-2004-x64
10a619ae77d5...2e.exe
windows10-2004-x64
10aaab139650...12.exe
windows10-2004-x64
10aefec08eba...49.exe
windows10-2004-x64
10d12f5fa25c...70.exe
windows10-2004-x64
7e5b42981fd...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
0314c3cf5875f5a348b62f28e53ec17a9180933fb126d66b7184ebbc62e3c362.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
367729c84050746eb20cd233e6b8d8cfe0625110da6e43f4b4c486aa19d08103.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
3ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
3ff87c5bd0d476dfc954d3706672474698d1e412030e6189e037c2474b97b730.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
4157cda3159c7d2c99d18138d2e023dd1d821d09ae77e78901a80b26492981a6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5f318080c6c0aef583c575f49bd61e9b4e8b6784f4c52b512e9c07090e4cedea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
620f9ee1b442855f9904f5108cf7185b16d0acbacad9aaa076f02e0ffd4f588f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
753cdc12b984ece991f2018329d37985ee627640895e2d9b9a43a13a6dd6fb91.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a4375e040f13128a4dc747d845dd82b7204008c71beb526483b369eea30d2582.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
a619ae77d542717361e631ceb6fe3fab295af4ccef45ae4774b92a9355b6bb2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d12f5fa25c8ef0ae322be4daa1b08acf499c9d1be60c2f8d6f6b5a65c28f0a70.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
e5b42981fd5d352478cd9e79d582bc92295cb43d3d32dfd59e84008eb4216c65.exe
Resource
win10v2004-20240426-en
General
-
Target
142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe
-
Size
645KB
-
MD5
ef0669622d6448e4556501afe1dad056
-
SHA1
c85d621294c88c8050b202b0e20f62d7889a86c5
-
SHA256
142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59
-
SHA512
64f71711babea80de14ca75680b8abb38ce5326b86925f6121a3a3724739158930c09b6b077d473e08661b508ae585973c7e6dd31a848f06bf16b2eb67026b34
-
SSDEEP
12288:aMray909okg/mJPJBxxSrCUHBayC0xzVN5Hn7uQQrzHWw:cy6HJ5UdhadGzVLHCr7Ww
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4092-18-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral2/memory/4092-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral2/memory/4092-19-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 3012 ER7ZO53.exe 4728 1Jb47aJ2.exe 2984 2ef9383.exe 4588 3FJ40tG.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ER7ZO53.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4728 set thread context of 904 4728 1Jb47aJ2.exe 84 PID 2984 set thread context of 4092 2984 2ef9383.exe 87 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3FJ40tG.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3FJ40tG.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3FJ40tG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 904 AppLaunch.exe 904 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 904 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 900 wrote to memory of 3012 900 142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe 82 PID 900 wrote to memory of 3012 900 142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe 82 PID 900 wrote to memory of 3012 900 142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe 82 PID 3012 wrote to memory of 4728 3012 ER7ZO53.exe 83 PID 3012 wrote to memory of 4728 3012 ER7ZO53.exe 83 PID 3012 wrote to memory of 4728 3012 ER7ZO53.exe 83 PID 4728 wrote to memory of 904 4728 1Jb47aJ2.exe 84 PID 4728 wrote to memory of 904 4728 1Jb47aJ2.exe 84 PID 4728 wrote to memory of 904 4728 1Jb47aJ2.exe 84 PID 4728 wrote to memory of 904 4728 1Jb47aJ2.exe 84 PID 4728 wrote to memory of 904 4728 1Jb47aJ2.exe 84 PID 4728 wrote to memory of 904 4728 1Jb47aJ2.exe 84 PID 4728 wrote to memory of 904 4728 1Jb47aJ2.exe 84 PID 4728 wrote to memory of 904 4728 1Jb47aJ2.exe 84 PID 3012 wrote to memory of 2984 3012 ER7ZO53.exe 85 PID 3012 wrote to memory of 2984 3012 ER7ZO53.exe 85 PID 3012 wrote to memory of 2984 3012 ER7ZO53.exe 85 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 2984 wrote to memory of 4092 2984 2ef9383.exe 87 PID 900 wrote to memory of 4588 900 142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe 88 PID 900 wrote to memory of 4588 900 142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe 88 PID 900 wrote to memory of 4588 900 142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe"C:\Users\Admin\AppData\Local\Temp\142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ER7ZO53.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ER7ZO53.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Jb47aJ2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Jb47aJ2.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ef9383.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2ef9383.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3FJ40tG.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3FJ40tG.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD50c60dc000d08a97e584db700c23f486e
SHA11f216996ecc70011624c09ba2b1cd7c4f5c51964
SHA256967172026135b940948c9b5fe8f63fb4bfd462cbf5d1140262b13c66028d8d39
SHA5122250ae181d9b7af35126bc3492b32cf24220a909f802301267421ddbdbf9824afee5f7fa1242adf5e15e4f4b40abaa60166c6b167ad5286bb38ea03e3801dccb
-
Filesize
520KB
MD5f346ea95de2b6798a719cb31ac5d0bee
SHA10b8d003e0e65c2dc1d17056bd5b2653dd7f15e5e
SHA256efc8bc507e209597af278cc2aea99c47bda1cf652e0b778be31ebbde1732a2a5
SHA5129849acb7dd4c8ed5d7fd268e9062d0a1a02e78f6819c92ea4cbe57048f726c7bbc2724a54918cdb3669e77a6b15225ac75a2c4fb57aaff4d29a4d92c39adfb33
-
Filesize
869KB
MD5f387640a209aecb0c90b8f1e34336797
SHA115b7666b93c541ae347806317d960589005ae2cd
SHA25604de1502a47290c5318ab8a07bc45c3267be8c621ecfce3afd63517098b3e756
SHA512d8c79dd36bc4f056286eebb9478a92b32591bc35b6a7a6a9d565448557df65852510f43cd3c586f5de0467df766e58f110ac744d8f27273cb4a46502be9bfaae
-
Filesize
1.0MB
MD521ca6d9e474ccb28faacb35f436fe8e4
SHA18e78bed30accf9e921538a06cb7caf98c9c1d2c2
SHA256143a4e5dd66463b2434597a5ddba47f9114e3f353c0c455e070ec802f90c23e9
SHA5127223cd673addc4a4365efc013948a18f6edd2f9df32525c6040104485d2b5e681eb13f1f8d39e79b6c344963a7690b71e4293fd952bbfb4eda2d3103b8fb8459