Overview
overview
10Static
static
3016b8fab11...90.exe
windows10-2004-x64
10046f35763e...68.exe
windows10-2004-x64
1014e25178ee...de.exe
windows10-2004-x64
1058609bf38b...1d.exe
windows10-2004-x64
105e46be5a16...b4.exe
windows10-2004-x64
1064220efa05...b0.exe
windows10-2004-x64
107252b3ba90...cd.exe
windows10-2004-x64
10761baf17cd...b8.exe
windows10-2004-x64
1079b34442d1...59.exe
windows10-2004-x64
107bca30b01b...44.exe
windows10-2004-x64
77f2d656f1a...24.exe
windows10-2004-x64
1092903f5aac...33.exe
windows10-2004-x64
10a6fd8428c6...ff.exe
windows10-2004-x64
10a9a24c6b40...79.exe
windows10-2004-x64
10c957c1f7d6...20.exe
windows10-2004-x64
10d30a3fe09c...90.exe
windows10-2004-x64
10d4c8c5a1d2...4e.exe
windows10-2004-x64
10e2ca05276c...37.exe
windows10-2004-x64
10e79c48869d...9a.exe
windows10-2004-x64
10fff53a878c...d6.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
016b8fab114770bc330d8c49bc8909920899011e9018ceeaa5233b1b572c4190.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
14e25178ee8b8712bc968c820fb869e90a44dec170ecd8a6483ae8f108b1f2de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
5e46be5a1605d21562eda70cd21e2675e650c3789e8dde9dfb908ec546adc9b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64220efa0582fe1aec27096123429aeb58dc263d43340ad6613555ad427544b0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
79b34442d1c8507ff7bb7f184e63b7b674da3847ab0d3d8203b60c93467fa859.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7bca30b01b52faa483cb9bba6adca25589109b55d6cd6c01bb4219ef6d8f4444.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
a6fd8428c609450c9b2629eda53c7749e0bb145c64d6bcfc5071adec21c467ff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
a9a24c6b40b53ea0f85263a4222bf4792c43b7f26287058d9cd536b2ceb5a779.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
c957c1f7d6e812384412b37342974d2234a9d5e5aaa2e53f0e6e41977b4af020.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e2ca05276c37a88d337993eae49ec4ac99bf1c9f9e56112366021c7a649bf337.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe
Resource
win10v2004-20240426-en
General
-
Target
fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe
-
Size
896KB
-
MD5
acb96f2c56fdf3eb258c2edae74918b8
-
SHA1
b4f63010294375e0655311a97aa2fbe840d04ae3
-
SHA256
fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6
-
SHA512
2e147a07f4f1f043ed3bdcb3a066e2d6b3691bf4d395c23f16c93c3ed6bd2d783e4b9b6e8b67dca4677bba1eeccd8919f41912caafed8c4f9449c7ee7d742ab7
-
SSDEEP
24576:zyyDiQj64i1K7jr+ihsg6rCm8dR9N4NuayU40/JOLuy:Gypj6h6j66+CHzWFyDS0Lu
Malware Config
Extracted
mystic
http://5.42.92.211/
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral20/memory/4676-19-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral20/memory/4676-22-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral20/memory/4676-20-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 4320 eq7EB65.exe 3288 1mW05hR9.exe 4472 2IL7615.exe 4540 3NI02mm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" eq7EB65.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3288 set thread context of 1256 3288 1mW05hR9.exe 86 PID 4472 set thread context of 4676 4472 2IL7615.exe 97 PID 4540 set thread context of 2376 4540 3NI02mm.exe 105 -
Program crash 3 IoCs
pid pid_target Process procid_target 4196 3288 WerFault.exe 85 1068 4472 WerFault.exe 93 3840 4540 WerFault.exe 100 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1256 AppLaunch.exe 1256 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1256 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4320 3144 fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe 84 PID 3144 wrote to memory of 4320 3144 fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe 84 PID 3144 wrote to memory of 4320 3144 fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe 84 PID 4320 wrote to memory of 3288 4320 eq7EB65.exe 85 PID 4320 wrote to memory of 3288 4320 eq7EB65.exe 85 PID 4320 wrote to memory of 3288 4320 eq7EB65.exe 85 PID 3288 wrote to memory of 1256 3288 1mW05hR9.exe 86 PID 3288 wrote to memory of 1256 3288 1mW05hR9.exe 86 PID 3288 wrote to memory of 1256 3288 1mW05hR9.exe 86 PID 3288 wrote to memory of 1256 3288 1mW05hR9.exe 86 PID 3288 wrote to memory of 1256 3288 1mW05hR9.exe 86 PID 3288 wrote to memory of 1256 3288 1mW05hR9.exe 86 PID 3288 wrote to memory of 1256 3288 1mW05hR9.exe 86 PID 3288 wrote to memory of 1256 3288 1mW05hR9.exe 86 PID 4320 wrote to memory of 4472 4320 eq7EB65.exe 93 PID 4320 wrote to memory of 4472 4320 eq7EB65.exe 93 PID 4320 wrote to memory of 4472 4320 eq7EB65.exe 93 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 4472 wrote to memory of 4676 4472 2IL7615.exe 97 PID 3144 wrote to memory of 4540 3144 fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe 100 PID 3144 wrote to memory of 4540 3144 fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe 100 PID 3144 wrote to memory of 4540 3144 fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe 100 PID 4540 wrote to memory of 2376 4540 3NI02mm.exe 105 PID 4540 wrote to memory of 2376 4540 3NI02mm.exe 105 PID 4540 wrote to memory of 2376 4540 3NI02mm.exe 105 PID 4540 wrote to memory of 2376 4540 3NI02mm.exe 105 PID 4540 wrote to memory of 2376 4540 3NI02mm.exe 105 PID 4540 wrote to memory of 2376 4540 3NI02mm.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe"C:\Users\Admin\AppData\Local\Temp\fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eq7EB65.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eq7EB65.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1mW05hR9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1mW05hR9.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 5644⤵
- Program crash
PID:4196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2IL7615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2IL7615.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 1364⤵
- Program crash
PID:1068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3NI02mm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3NI02mm.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 5683⤵
- Program crash
PID:3840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3288 -ip 32881⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4472 -ip 44721⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4540 -ip 45401⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD51b03d1a599fe2b528de2ab58cadf06ce
SHA139bba094894b5fc7d2b4dd7b5e9751d79080f1e4
SHA256a0aef99670f72d858bf596dafc4807222e01941b8481e084870388a0412bdf46
SHA5122644770935bb7e2c3228581c45774285584a7c594497b2a3568c86ae7225eafd01ef74f6a7b2c1862d52ec1d9ac1ff85512df1ba4c203e96b2857958bf33a665
-
Filesize
534KB
MD59bb62ac4c4a11244ac2d48acc361a173
SHA1cb21091838b45262bc60a3978fe9fbd10a287359
SHA25650bd44f2f38a1486ec19c1450c215b29968172d80ac2a0c8a0ca89c8102c615b
SHA512a8341626d729084d0db2649c0f818174168a908e76c62f1fc07a1bf6b444f7e95a027728e8bca38915551aa3b66cb1802702b00d5992f8ac609011533c2aadaa
-
Filesize
232KB
MD53ff825411b1fe07e712a5dcae34f80eb
SHA1e3e4358cabfa74d6e36e26754b01ed78434a6877
SHA25669bba958a5dcd8650921b25d978c4847819eb83adc143ba2bd396811d7d73739
SHA512325c098b5a0a0ffee16a6074616126f9f4c7930b74507d38c63a294f659ab26fe1674af85a8ff495bd268aa821cc9d85f80f11ab1e7f828015920220e456ab81
-
Filesize
1.1MB
MD5ab7bca2a84b52b77d01bcfb149e5b8dd
SHA127c5a572787ec979aca90d0b2b19c7b6cb35d122
SHA2565bcd00727a0ee6755aeea34aa9e091894cdeb0c32714dfbe97d6b1fb1e1d0503
SHA512453fdff06af99ccc261f692545341474453c1a2ee566c11cab646e9d869382145d59968dea7ba80812c2b4c8347bc220eef4153cb538088e165064630eb7ef6a