Overview
overview
10Static
static
3016b8fab11...90.exe
windows10-2004-x64
10046f35763e...68.exe
windows10-2004-x64
1014e25178ee...de.exe
windows10-2004-x64
1058609bf38b...1d.exe
windows10-2004-x64
105e46be5a16...b4.exe
windows10-2004-x64
1064220efa05...b0.exe
windows10-2004-x64
107252b3ba90...cd.exe
windows10-2004-x64
10761baf17cd...b8.exe
windows10-2004-x64
1079b34442d1...59.exe
windows10-2004-x64
107bca30b01b...44.exe
windows10-2004-x64
77f2d656f1a...24.exe
windows10-2004-x64
1092903f5aac...33.exe
windows10-2004-x64
10a6fd8428c6...ff.exe
windows10-2004-x64
10a9a24c6b40...79.exe
windows10-2004-x64
10c957c1f7d6...20.exe
windows10-2004-x64
10d30a3fe09c...90.exe
windows10-2004-x64
10d4c8c5a1d2...4e.exe
windows10-2004-x64
10e2ca05276c...37.exe
windows10-2004-x64
10e79c48869d...9a.exe
windows10-2004-x64
10fff53a878c...d6.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
016b8fab114770bc330d8c49bc8909920899011e9018ceeaa5233b1b572c4190.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
046f35763e317ea5c0e4e5bc1725bc6e4fbd85ebf7a2820a18b9033c87584f68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
14e25178ee8b8712bc968c820fb869e90a44dec170ecd8a6483ae8f108b1f2de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
58609bf38be4777dd43032b4b64e68420854d83e377491d6356127f6c112181d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
5e46be5a1605d21562eda70cd21e2675e650c3789e8dde9dfb908ec546adc9b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
64220efa0582fe1aec27096123429aeb58dc263d43340ad6613555ad427544b0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
7252b3ba9094d91a1e12f9c9944f24ccf25c9a4c75e7f7e3380ca37b8e6bfbcd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
79b34442d1c8507ff7bb7f184e63b7b674da3847ab0d3d8203b60c93467fa859.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
7bca30b01b52faa483cb9bba6adca25589109b55d6cd6c01bb4219ef6d8f4444.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7f2d656f1a4331d02ffea567b5177c3a772a6a6e9c022b13e9042bd0dccbf324.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
92903f5aac10e31279ef8ae844a86a677e02e1799ba17380867ee77d55b31433.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
a6fd8428c609450c9b2629eda53c7749e0bb145c64d6bcfc5071adec21c467ff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
a9a24c6b40b53ea0f85263a4222bf4792c43b7f26287058d9cd536b2ceb5a779.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
c957c1f7d6e812384412b37342974d2234a9d5e5aaa2e53f0e6e41977b4af020.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
d30a3fe09c9a256105cd948f3eb2049778fcc4c34bdd05779bd39a344805a590.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d4c8c5a1d2ba6f3920e2785153bc3ad1843efb3696b1cfd86ebffe60bc121e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e2ca05276c37a88d337993eae49ec4ac99bf1c9f9e56112366021c7a649bf337.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e79c48869da7300155b8f28e75c456d3c8b56a174d85529c97d8307a157a099a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fff53a878cc4bf75cd2f5a6ea052244eda18185761d3173fcd0c10469adce0d6.exe
Resource
win10v2004-20240426-en
General
-
Target
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe
-
Size
640KB
-
MD5
54c00829bacd1fac5f4b3dd3ccddab88
-
SHA1
f240b2d3e965a8519ff74ceb16a32c54c94f52f2
-
SHA256
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8
-
SHA512
8ba3f790616051fbad5142c887b050ae7589bf97b51b8c8ec1faba98689b6ee48b2ac543652cdfac240ce3c1af2f6a3c2f544309a903257000bcce614c2e2cdd
-
SSDEEP
12288:kMrMy90wSaqrzDRHYtbtxNKS7vr+BFVP5NjOFPUMhqOMDQ:Iyzor3RMbtmSn+JP5NCFP9tMDQ
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral8/memory/3084-18-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral8/memory/3084-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral8/memory/3084-19-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
Processes:
Tq8bq28.exe1Ij00nl7.exe2hg2480.exe3RW86Mn.exepid process 3404 Tq8bq28.exe 3472 1Ij00nl7.exe 4596 2hg2480.exe 4208 3RW86Mn.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exeTq8bq28.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Tq8bq28.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1Ij00nl7.exe2hg2480.exedescription pid process target process PID 3472 set thread context of 5088 3472 1Ij00nl7.exe AppLaunch.exe PID 4596 set thread context of 3084 4596 2hg2480.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3RW86Mn.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3RW86Mn.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3RW86Mn.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3RW86Mn.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 5088 AppLaunch.exe 5088 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 5088 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exeTq8bq28.exe1Ij00nl7.exe2hg2480.exedescription pid process target process PID 5104 wrote to memory of 3404 5104 761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe Tq8bq28.exe PID 5104 wrote to memory of 3404 5104 761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe Tq8bq28.exe PID 5104 wrote to memory of 3404 5104 761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe Tq8bq28.exe PID 3404 wrote to memory of 3472 3404 Tq8bq28.exe 1Ij00nl7.exe PID 3404 wrote to memory of 3472 3404 Tq8bq28.exe 1Ij00nl7.exe PID 3404 wrote to memory of 3472 3404 Tq8bq28.exe 1Ij00nl7.exe PID 3472 wrote to memory of 5088 3472 1Ij00nl7.exe AppLaunch.exe PID 3472 wrote to memory of 5088 3472 1Ij00nl7.exe AppLaunch.exe PID 3472 wrote to memory of 5088 3472 1Ij00nl7.exe AppLaunch.exe PID 3472 wrote to memory of 5088 3472 1Ij00nl7.exe AppLaunch.exe PID 3472 wrote to memory of 5088 3472 1Ij00nl7.exe AppLaunch.exe PID 3472 wrote to memory of 5088 3472 1Ij00nl7.exe AppLaunch.exe PID 3472 wrote to memory of 5088 3472 1Ij00nl7.exe AppLaunch.exe PID 3472 wrote to memory of 5088 3472 1Ij00nl7.exe AppLaunch.exe PID 3404 wrote to memory of 4596 3404 Tq8bq28.exe 2hg2480.exe PID 3404 wrote to memory of 4596 3404 Tq8bq28.exe 2hg2480.exe PID 3404 wrote to memory of 4596 3404 Tq8bq28.exe 2hg2480.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 4596 wrote to memory of 3084 4596 2hg2480.exe AppLaunch.exe PID 5104 wrote to memory of 4208 5104 761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe 3RW86Mn.exe PID 5104 wrote to memory of 4208 5104 761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe 3RW86Mn.exe PID 5104 wrote to memory of 4208 5104 761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe 3RW86Mn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe"C:\Users\Admin\AppData\Local\Temp\761baf17cd7e790b03075c76f9e902cd11700ce8b920d2741b04a70371069ab8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tq8bq28.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Tq8bq28.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Ij00nl7.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Ij00nl7.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2hg2480.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2hg2480.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3RW86Mn.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3RW86Mn.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4208
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ce3ea54aa29976f92dbb026924e6580c
SHA16cf2bf75090b1c9276cd11cd1ff429e26cbcb84b
SHA256f7641d7a71c1ad7d965531c9b975046d8c146209189887ef24c5bf42467a27b7
SHA51217df9b428f974c5fec4643e22584684f20d133661e7c1c0dde8fe2391ef34964141298457d2fb042dd0e9883af460688d5f9f1d83659ef5f1574366a94b37eb9
-
Filesize
515KB
MD5f24d725b3fbbff06b37c7edc7f22ba1c
SHA1ce77269d92ec548c0340e1027dbcbba923143879
SHA256e15c944f15c57f02ccaeea55591311bb37af2f22dac067e1c4e8a3e9de98e914
SHA512233e3d51652d4895415e8de42528ad50f0584b9fe2a9f1b87191a1f92d17d7cfde346bb5405b19a7c2b18fb29ad2e8d49f00b31d43fc423e043403c5f5296df9
-
Filesize
869KB
MD5ed431060c97b12b5b24d40df072cc520
SHA1058afa4b30d9aa1cc634b740a42575fe7d516f05
SHA256832f1fd68693d595ac4a815eb17253a8652a30ef35cabaad6542be8ff24ef9fc
SHA512c15981976106ef1a97cc8ac9f179e944c8da6736bc08e1154e42aeaa1f1539d17345352db2a322469f3497e4a47c35b77291a0d2bf64a80771800bc295c9b187
-
Filesize
1.0MB
MD5ade60db339f9a15d8e6690883e78a0f5
SHA1f56ece723454dc52282f0c2d5e5a7698d64ade6f
SHA25613779f99e39a684bcd1ed479b17daddae7ccde369a879d9319c02c4d4faae469
SHA5127566ebe6340cda81ea5e3388660bac198c1f377f164adc6a8816ca6a929b5aa83961342e9287e9d95f6ca42b2f9e2a57a87ed7f207a311953d589cba9a86c97a