Analysis

  • max time kernel
    136s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:02

General

  • Target

    2681e868e36ec912cf14855e552a41583eb47da1464ad71b64ddaae780d63101.exe

  • Size

    633KB

  • MD5

    497349983098259f6c07c33d745f116a

  • SHA1

    0a428f49d309f05ea36a491441ee2ab866261c66

  • SHA256

    2681e868e36ec912cf14855e552a41583eb47da1464ad71b64ddaae780d63101

  • SHA512

    cd775e963e0e5a4f01b3b0df71a5ff49e9a1ae4e7af333c34692fe8bffe86d24a91e6ff8997cb91eccbf81df61ecf960d982bd91dc821838da2fd8be15b7d901

  • SSDEEP

    12288:9MrJy901A8GwkPAcdjvughyEr4j8I4jVnczSsxJZxz2W0ZhJ:cyoAPPAOygFrJFczLx1X0ZhJ

Malware Config

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2681e868e36ec912cf14855e552a41583eb47da1464ad71b64ddaae780d63101.exe
    "C:\Users\Admin\AppData\Local\Temp\2681e868e36ec912cf14855e552a41583eb47da1464ad71b64ddaae780d63101.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JP3Xh11.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JP3Xh11.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Cj56Fo0.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Cj56Fo0.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2fU1429.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2fU1429.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4236
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3JA41Yf.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3JA41Yf.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
          • Checks SCSI registry key(s)
          PID:4400
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4396,i,7012731823941922179,12386606396608877869,262144 --variations-seed-version --mojo-platform-channel-handle=4024 /prefetch:8
      1⤵
        PID:2968

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3JA41Yf.exe
        Filesize

        164KB

        MD5

        a1b1f128cfe57119761068ba04f4f39a

        SHA1

        526cbb123beab2739db03117b7e828268b7e9bb7

        SHA256

        1f20739150a187fb178c7ed36062cfa7e91a6400a39d7059e30e5f3aceecad19

        SHA512

        7f4fb9dde3d76d5abd4efe1068b2c2f2cb133e51f1791950c0cb8610ec3b569514d527e4959e2422ed7292e030b201dce2b3ad330a5309a442474755c0fff011

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JP3Xh11.exe
        Filesize

        435KB

        MD5

        4ce9c70a86d52d0b5df1f43ee15b87fc

        SHA1

        6fb9cbf5814d0ed0426729930a4969989f1494b0

        SHA256

        111a7cd9797f72730ff5032691264b8c7e85b854afd6149fcc09ca4e7f7812bc

        SHA512

        69ba094d4c0c6e94a287b095f28e1fb01aea0538d5e57180f150539bebf952bc27c758f7f2fa88b85197444c935ff7b19ddb3e1899e456c11683b510458e0dda

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Cj56Fo0.exe
        Filesize

        188KB

        MD5

        425e2a994509280a8c1e2812dfaad929

        SHA1

        4d5eff2fb3835b761e2516a873b537cbaacea1fe

        SHA256

        6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a

        SHA512

        080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2fU1429.exe
        Filesize

        314KB

        MD5

        dbf28dfc5f5c0499a334ffbf393433b8

        SHA1

        35852646502d6fe2a1e7c60963c6811751bc3ddc

        SHA256

        12c1ae961dbad2b9668d0d69300d6510d6f3b5e9f967a1844b746fc03d47f8c0

        SHA512

        c1a7749ef40727d27b83e4237cd875caf3d92841c71a2336606acecbf7c20ed0204b8dbd91961e9081cc29d01734610f0a053cb13830548b6ad1a8ecdbf1b34b

      • memory/2972-19-0x0000000074AF0000-0x00000000752A0000-memory.dmp
        Filesize

        7.7MB

      • memory/2972-16-0x0000000074AF0000-0x00000000752A0000-memory.dmp
        Filesize

        7.7MB

      • memory/2972-18-0x0000000002530000-0x000000000254E000-memory.dmp
        Filesize

        120KB

      • memory/2972-20-0x0000000002680000-0x0000000002712000-memory.dmp
        Filesize

        584KB

      • memory/2972-17-0x0000000004BB0000-0x0000000005154000-memory.dmp
        Filesize

        5.6MB

      • memory/2972-21-0x0000000074AF0000-0x00000000752A0000-memory.dmp
        Filesize

        7.7MB

      • memory/2972-23-0x0000000074AF0000-0x00000000752A0000-memory.dmp
        Filesize

        7.7MB

      • memory/2972-15-0x0000000002350000-0x0000000002370000-memory.dmp
        Filesize

        128KB

      • memory/2972-14-0x0000000074AFE000-0x0000000074AFF000-memory.dmp
        Filesize

        4KB

      • memory/4236-27-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/4236-33-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/4236-31-0x0000000000400000-0x0000000000432000-memory.dmp
        Filesize

        200KB

      • memory/4400-34-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB