Analysis

  • max time kernel
    135s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 07:44

General

  • Target

    7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe

  • Size

    749KB

  • MD5

    33805f2b53d2f319d3b41a7ed74278a1

  • SHA1

    201de42d0319e08a3b40a9489c96a564f4b93a53

  • SHA256

    7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324

  • SHA512

    77794e49ec66fc5b92e0ae589cf830fe6c7ac82bf48846985f24ead9cd453f3ca922d770c21d0241b75164ce4a07c98426343efda7a184979eac34070d5b5075

  • SSDEEP

    12288:pMrBy90akPV3+Jj1f+wYXvVoE3JXwU3Ceszc+jy39BKwpVi3WkwPRImpi6pr:Iy3Y+Ft+w+53RUeszfgKuRkA+hO

Malware Config

Signatures

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe
    "C:\Users\Admin\AppData\Local\Temp\7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wQ9Hq82.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wQ9Hq82.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Aa91Rd9.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Aa91Rd9.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2qS2422.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2qS2422.exe
        3⤵
        • Executes dropped EXE
        PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3te55lH.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3te55lH.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3688
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Checks SCSI registry key(s)
        PID:2372

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3te55lH.exe
    Filesize

    973KB

    MD5

    5dc4be46727c1853e63ebdd240ec9bd9

    SHA1

    6265b41bbecbb96cf666d2b4cbd6f209f44d7a2d

    SHA256

    1df63e2de3adac7ff425c75b3f649078fd7a8e0008e5063bd290adb1cdba2446

    SHA512

    59828cba7af9fb26c6717eb3e655eec07f732ec92d3ec0cce7ed2df1acf6095dec2d97cdbbd3591ed96c08cb2adcff12c31534a93b48757ff8976c0a4233062b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wQ9Hq82.exe
    Filesize

    364KB

    MD5

    b8d672199c76119b66c2c48e1a5358e3

    SHA1

    fae47d050ccebbdba031ae817669f3e99fa2456e

    SHA256

    982709238d54e82a0f8788604af8ee343a70522d72279368a009923bf8ef2813

    SHA512

    93204b331d71e31e2b96120aef2e519457e2e9f3973e8f829ddb783b069e4f636127132e5cceed0d9365028f943e169ba45fd0f38b6763ce8864b92f670160ec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Aa91Rd9.exe
    Filesize

    188KB

    MD5

    425e2a994509280a8c1e2812dfaad929

    SHA1

    4d5eff2fb3835b761e2516a873b537cbaacea1fe

    SHA256

    6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a

    SHA512

    080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2qS2422.exe
    Filesize

    186KB

    MD5

    3a24a41f3044d90555f6cdea0f2533f8

    SHA1

    25a1913e9e41dd13039d023a5f63a050256c72ca

    SHA256

    5e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253

    SHA512

    8d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837

  • memory/2372-29-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/4332-18-0x0000000004950000-0x000000000496E000-memory.dmp
    Filesize

    120KB

  • memory/4332-17-0x0000000004990000-0x0000000004F34000-memory.dmp
    Filesize

    5.6MB

  • memory/4332-19-0x0000000005080000-0x0000000005112000-memory.dmp
    Filesize

    584KB

  • memory/4332-20-0x0000000074890000-0x0000000075040000-memory.dmp
    Filesize

    7.7MB

  • memory/4332-22-0x0000000074890000-0x0000000075040000-memory.dmp
    Filesize

    7.7MB

  • memory/4332-16-0x0000000074890000-0x0000000075040000-memory.dmp
    Filesize

    7.7MB

  • memory/4332-15-0x00000000022C0000-0x00000000022E0000-memory.dmp
    Filesize

    128KB

  • memory/4332-14-0x000000007489E000-0x000000007489F000-memory.dmp
    Filesize

    4KB