Overview
overview
10Static
static
304079e5802...9d.exe
windows10-2004-x64
101c1f4eb981...3b.exe
windows10-2004-x64
102598a43559...cf.exe
windows10-2004-x64
103aa30d5528...5d.exe
windows10-2004-x64
1046e0ffa2e7...59.exe
windows10-2004-x64
104cc86e1dc4...05.exe
windows10-2004-x64
1061799398ea...0c.exe
windows10-2004-x64
106bfb353493...b4.exe
windows10-2004-x64
1070f5b2bcd0...c3.exe
windows7-x64
1070f5b2bcd0...c3.exe
windows10-2004-x64
107363065308...5d.exe
windows10-2004-x64
10864fc02972...03.exe
windows10-2004-x64
10979a085483...e6.exe
windows10-2004-x64
109bbc6ca861...5b.exe
windows10-2004-x64
10a22013e24e...09.exe
windows10-2004-x64
10c31e600a38...cd.exe
windows10-2004-x64
10e2e852038c...e5.exe
windows10-2004-x64
10ec4e6a678a...72.exe
windows10-2004-x64
10f46c47981f...85.exe
windows10-2004-x64
10f603ceb39f...6e.exe
windows10-2004-x64
10fbe6d8ed22...1a.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
04079e58020489439890f3d5d0980b8ad79ac8f655923829037345651f2f1b9d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1c1f4eb981ff56766e6798073020add168a1f4134cf43e140302c7cec4a6763b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2598a435594fc87df1b99231c77f9f38793dd1d59b7f06388b1b60d59d0bbecf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3aa30d5528ebe1b7856b26587d689c01c4a94547c022f9b29bb7c32708782f5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
46e0ffa2e7aeb3575c3fe8308892dec47716f852e6427bc2c8e904e9cad2c659.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cc86e1dc4a166b675f01f27f52e179d83773f43736e54f40427866d6708ef05.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
61799398eaa0d8b997b6fa9158074d701b10e120c7cac093e92c6dfbd278f50c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6bfb35349386611e3f965528901140a62ac938c2c926d82e7c9f31d498ae60b4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
70f5b2bcd00d4e52e3ca12b277c6e1cf6e5f1d2359e7655daebb44704158a4c3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7363065308e9d849d49ab200817eb5d2d06c3616dc4e643be8502ff7eb2c0a5d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
979a085483810f4b695eb3d0c531439887861b90277b6ede2d4f9eb7983065e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9bbc6ca8610d7090cfeb2b3f3881a2526ac3f729f2cd3e749168fb38991b525b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a22013e24eeee6554ffcf19b609bfeede13c94b56b9432fbdd25b9cdebaab609.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c31e600a3856d09e64628abdd37725398f02702f9310c85833d3184bc7be85cd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
e2e852038c1504d54c9702b961095f0af961417103d2a5c8b10740dc188ac5e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ec4e6a678a24fbc6072d65beb0203bf9dc01f768df9a7430ed0d827b8d290172.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
f46c47981f634979a00e1ca71c39dccb4d7b92874955d836798a907aa4fdbf85.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f603ceb39fc4d835e57a02751723a2eb0538b0f955a7772c30556e0e0d723f6e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe
Resource
win10v2004-20240426-en
General
-
Target
864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe
-
Size
605KB
-
MD5
5232c11ee090fe4a8fbde69d1f452ba2
-
SHA1
ad508a34f36f8f0d1bcd7b06fc3e79a829a1f374
-
SHA256
864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03
-
SHA512
76c8261dc7a2dc3c849c2b0e4f36751604a969b2ed29029552014d664e7342b11472421330e3181126c87ba0e5cd4f14597a1fe37c0a28da54a21433f9b95270
-
SSDEEP
12288:LMr1y90+pMc0JJGdc9wvughyZh/rgUSt9F5vhz0Gz:ayOcU5zguFUvhwGz
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral12/memory/4588-27-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/4588-30-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/4588-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral12/memory/3316-15-0x0000000002330000-0x0000000002350000-memory.dmp net_reactor behavioral12/memory/3316-17-0x0000000004990000-0x00000000049AE000-memory.dmp net_reactor -
Executes dropped EXE 4 IoCs
pid Process 4348 cm1qj45.exe 3316 1Yx67SE5.exe 3936 2XJ2373.exe 1600 3gH49Ye.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" cm1qj45.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3936 set thread context of 4588 3936 2XJ2373.exe 97 PID 1600 set thread context of 2492 1600 3gH49Ye.exe 103 -
Program crash 2 IoCs
pid pid_target Process procid_target 3404 3936 WerFault.exe 93 756 1600 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3316 1Yx67SE5.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4348 3680 864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe 85 PID 3680 wrote to memory of 4348 3680 864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe 85 PID 3680 wrote to memory of 4348 3680 864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe 85 PID 4348 wrote to memory of 3316 4348 cm1qj45.exe 86 PID 4348 wrote to memory of 3316 4348 cm1qj45.exe 86 PID 4348 wrote to memory of 3316 4348 cm1qj45.exe 86 PID 4348 wrote to memory of 3936 4348 cm1qj45.exe 93 PID 4348 wrote to memory of 3936 4348 cm1qj45.exe 93 PID 4348 wrote to memory of 3936 4348 cm1qj45.exe 93 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3936 wrote to memory of 4588 3936 2XJ2373.exe 97 PID 3680 wrote to memory of 1600 3680 864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe 101 PID 3680 wrote to memory of 1600 3680 864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe 101 PID 3680 wrote to memory of 1600 3680 864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe 101 PID 1600 wrote to memory of 2492 1600 3gH49Ye.exe 103 PID 1600 wrote to memory of 2492 1600 3gH49Ye.exe 103 PID 1600 wrote to memory of 2492 1600 3gH49Ye.exe 103 PID 1600 wrote to memory of 2492 1600 3gH49Ye.exe 103 PID 1600 wrote to memory of 2492 1600 3gH49Ye.exe 103 PID 1600 wrote to memory of 2492 1600 3gH49Ye.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe"C:\Users\Admin\AppData\Local\Temp\864fc029724f0d9d2cbfc5469cf806bb3431fdde2ed473a19fbb890b3282bf03.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cm1qj45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cm1qj45.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Yx67SE5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Yx67SE5.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2XJ2373.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2XJ2373.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 1404⤵
- Program crash
PID:3404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3gH49Ye.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3gH49Ye.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 1523⤵
- Program crash
PID:756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3936 -ip 39361⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1600 -ip 16001⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD548bce5a94c23f5fb41fef672a154f3c3
SHA1592795aa9424bce8456ed6bf5145b4ee4030dea2
SHA256008ff96edda147b9f601f058ebbb51e36f7a191a186ad46a1d93b509670131be
SHA5128642ecd8722d39a9ccf860add0a3acf44790e253798b912c6be854a56a690d7522019873fb3824e96454a392ce60e41db12e81e45be96bad7ec1adc5a7b4348d
-
Filesize
421KB
MD587ee40d6c92bb156b8f33955a66bcb42
SHA138faa38fc6ac25f2bc3b6e6263cb38065dac7133
SHA256a213bb820e3b04aa0f9ed2d69ac5eef80ff185eb6883c7299d05ec8c635b44d6
SHA512bafe32eebdf7116c4f0ad625f58b82b4fdcfdce274b19c46e8c3312422b2da3022b848e5117a325e1fbe75bb0d6ae70a27fec8df530d50ff26ce85ec927aca7f
-
Filesize
188KB
MD5425e2a994509280a8c1e2812dfaad929
SHA14d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA2566f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0
-
Filesize
295KB
MD58e224abf2b75c656df5de9d7ad26a28f
SHA16966b62dc46debf777adacef5068e3fbaa531265
SHA256f00cbde5381a2a373ebabf761c6e7dc1a1724e56d97f381c5824da0d800bf42c
SHA5122c2ec21ac0608d46613cb0f432f79eb58270dddfdba7709a2c5a1c65ff182698f5ec084a6d76cfdf168c0e376c96ba3b30b7647e16ed88a83247f57575a8a23e