Analysis

  • max time kernel
    131s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 07:44

General

  • Target

    d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe

  • Size

    421KB

  • MD5

    cbdd721a570f358915a7aecafb93bef8

  • SHA1

    3c849cac1c801fc0b88c54650592510a00c018a3

  • SHA256

    d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590

  • SHA512

    08fd1698d69f47a0d4024e240dd2d5f4c098ec2370813e96f18e682216ccb824185bcbc85f0cd85a2366de63a47a3eae3012c97610cde921be2267c27bd1393f

  • SSDEEP

    12288:EMrLy90B+08qFUvuShyk/C0Dtolno1qQ/gBsne:nyD08qF3St/C025lQ/ve

Malware Config

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe
    "C:\Users\Admin\AppData\Local\Temp\d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1oR09mV4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1oR09mV4.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2YF2471.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2YF2471.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3200
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 564
          3⤵
          • Program crash
          PID:1420
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3200 -ip 3200
      1⤵
        PID:4636

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1oR09mV4.exe
        Filesize

        188KB

        MD5

        425e2a994509280a8c1e2812dfaad929

        SHA1

        4d5eff2fb3835b761e2516a873b537cbaacea1fe

        SHA256

        6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a

        SHA512

        080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2YF2471.exe
        Filesize

        295KB

        MD5

        31e63ff215baaa1ef4772291d1b5e6f3

        SHA1

        85970e05389b5a9a8c5e70827ffd670012de9b54

        SHA256

        0206b068b399f2b7d64f2fa94fac0971a72f0bbc2902bde57fd78e1e0fc7fa14

        SHA512

        db2d4832d5dbcb757fae6955c714bbf204d1e49c3f2adaf6a99f3a41cd2ad63711744a42d59dc06005b6b530e58600f0228e7ccab7bb85d3f64f2f611a9a9846

      • memory/376-24-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/376-22-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/376-21-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/376-20-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/1352-12-0x00000000050C0000-0x0000000005152000-memory.dmp
        Filesize

        584KB

      • memory/1352-13-0x0000000074B10000-0x00000000752C0000-memory.dmp
        Filesize

        7.7MB

      • memory/1352-14-0x0000000074B10000-0x00000000752C0000-memory.dmp
        Filesize

        7.7MB

      • memory/1352-16-0x0000000074B10000-0x00000000752C0000-memory.dmp
        Filesize

        7.7MB

      • memory/1352-11-0x00000000021C0000-0x00000000021DE000-memory.dmp
        Filesize

        120KB

      • memory/1352-9-0x0000000074B10000-0x00000000752C0000-memory.dmp
        Filesize

        7.7MB

      • memory/1352-10-0x0000000004B10000-0x00000000050B4000-memory.dmp
        Filesize

        5.6MB

      • memory/1352-8-0x0000000002060000-0x0000000002080000-memory.dmp
        Filesize

        128KB

      • memory/1352-7-0x0000000074B1E000-0x0000000074B1F000-memory.dmp
        Filesize

        4KB