Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 07:42

General

  • Target

    d0c5f927631e1bb113c5cb5f1178cddd83c9fa595df60b9ffc903fe23c0bcb68.exe

  • Size

    605KB

  • MD5

    0fb1a131811a12a0d0ad0d4541a5aba9

  • SHA1

    4c07fea4019f52ce63d16bb4c377e4225c38a00a

  • SHA256

    d0c5f927631e1bb113c5cb5f1178cddd83c9fa595df60b9ffc903fe23c0bcb68

  • SHA512

    aca05ebce3ef3442caa6246f4d2477406240f773d1aea34f2f290b98896bc7acb1053aa930f32197be52d94693d514c74fc36ecf41625ec0d97466b92fb5808f

  • SSDEEP

    12288:KMrby90W2qciukb5sgQoP8kvuQhyz9bw6YSG6N9IV3KpfPdcR0Z:By0Zk97QlQK9bw6Bj/IVo3dcR0Z

Malware Config

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0c5f927631e1bb113c5cb5f1178cddd83c9fa595df60b9ffc903fe23c0bcb68.exe
    "C:\Users\Admin\AppData\Local\Temp\d0c5f927631e1bb113c5cb5f1178cddd83c9fa595df60b9ffc903fe23c0bcb68.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ph5Aw73.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ph5Aw73.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1nU46VV6.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1nU46VV6.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Ig7188.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Ig7188.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:2268
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 224
            4⤵
            • Program crash
            PID:412
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3WY74Ov.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3WY74Ov.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3296
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
          • Checks SCSI registry key(s)
          PID:4864
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 148
          3⤵
          • Program crash
          PID:936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4608 -ip 4608
      1⤵
        PID:1920
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3296 -ip 3296
        1⤵
          PID:4740

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3WY74Ov.exe

          Filesize

          145KB

          MD5

          4baa331c8ee623ba24e1863789b1dfd4

          SHA1

          9beaa55a2f7333772f6fcd5ebbd16b1b9d07f53b

          SHA256

          a6fe19dd7f402d7efa6e5aa146b2892ccd1cf58dafefc63c163613b2a3876f04

          SHA512

          904dd0a441b7af873fa5d90beec2f670a9e083a3b98407cb7be86c9ae7b58d01ba5b6c888fcf38d9cb4bea3222b7e982d48b1130c3119219faeec2292210def2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ph5Aw73.exe

          Filesize

          421KB

          MD5

          12d2c1d384eb62acddf7555762bae107

          SHA1

          0daed334c6485bfb5ffe9f1c29d28ef542d65c66

          SHA256

          cde87968a7dac4e3668c254c54ec743d1a79004c92cdb28369556ac38d60dbed

          SHA512

          a7368fd82c9ab8352fe2b58f678da3587a1e9bfc80232332679c4f705afe01f0be123c9861e1f6141c0890eb9cd347252ba2ff2d566bfeabd656e841fa12a3cc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1nU46VV6.exe

          Filesize

          188KB

          MD5

          425e2a994509280a8c1e2812dfaad929

          SHA1

          4d5eff2fb3835b761e2516a873b537cbaacea1fe

          SHA256

          6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a

          SHA512

          080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Ig7188.exe

          Filesize

          295KB

          MD5

          04ba5a6800a46a8756bff97719e69da7

          SHA1

          f7078c073f986403e445e421d7a42b39ddbe9ea9

          SHA256

          6a4d65f6f0fb2ef1431bdb666536b3cfa72c7e76cc4bf5a8445ed85bd6bc2271

          SHA512

          e7fdf90a592d92021970ae95b217ffe7490a9f10a3d15eeb0d32f085af09c32d8f3f9f34a7b42954ade71eef3d2056d5e081c04d036f9c08b9935af30a775581

        • memory/2268-30-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2268-28-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/2268-27-0x0000000000400000-0x0000000000432000-memory.dmp

          Filesize

          200KB

        • memory/4864-34-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/5052-16-0x0000000074820000-0x0000000074FD0000-memory.dmp

          Filesize

          7.7MB

        • memory/5052-21-0x0000000074820000-0x0000000074FD0000-memory.dmp

          Filesize

          7.7MB

        • memory/5052-23-0x0000000074820000-0x0000000074FD0000-memory.dmp

          Filesize

          7.7MB

        • memory/5052-20-0x0000000002480000-0x0000000002512000-memory.dmp

          Filesize

          584KB

        • memory/5052-19-0x0000000074820000-0x0000000074FD0000-memory.dmp

          Filesize

          7.7MB

        • memory/5052-18-0x0000000002450000-0x000000000246E000-memory.dmp

          Filesize

          120KB

        • memory/5052-17-0x0000000004AC0000-0x0000000005064000-memory.dmp

          Filesize

          5.6MB

        • memory/5052-15-0x00000000020A0000-0x00000000020C0000-memory.dmp

          Filesize

          128KB

        • memory/5052-14-0x000000007482E000-0x000000007482F000-memory.dmp

          Filesize

          4KB