Overview
overview
10Static
static
3028b296453...a5.exe
windows10-2004-x64
100ebae60c47...a6.exe
windows10-2004-x64
103ae03a392f...c7.exe
windows10-2004-x64
1049eb2b419a...61.exe
windows7-x64
1049eb2b419a...61.exe
windows10-2004-x64
104bb1d789df...b2.exe
windows10-2004-x64
104c0305778b...7c.exe
windows10-2004-x64
1056d014c086...70.exe
windows10-2004-x64
1064572328af...7c.exe
windows10-2004-x64
1068546b0231...3b.exe
windows10-2004-x64
10756d67f0f1...0a.exe
windows10-2004-x64
1088fc008066...39.exe
windows7-x64
1088fc008066...39.exe
windows10-2004-x64
108ab296834f...ad.exe
windows10-2004-x64
10903d5eea2e...ff.exe
windows10-2004-x64
10a667459185...08.exe
windows10-2004-x64
10b42e87afb8...84.exe
windows10-2004-x64
10cdc820df4b...04.exe
windows10-2004-x64
10d52db86881...86.exe
windows10-2004-x64
10e17fa1b4c1...2e.exe
windows10-2004-x64
10f068aa20f8...e6.exe
windows10-2004-x64
7f3bbfb34ef...1c.exe
windows10-2004-x64
10Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
028b2964534ec73672e940b1d39800c01228ab40cfa923a7921d7726c68878a5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
3ae03a392f3a264a9e73fa7a83c2de0795f5a49d845443f755496373bc4c0dc7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
49eb2b419a7fbc0c025450733e242f86ec67d7f11aff4c830eafc3484cd72561.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
49eb2b419a7fbc0c025450733e242f86ec67d7f11aff4c830eafc3484cd72561.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4bb1d789dfda1e41c8f39182a3f53a19e105cde455b57f94c5c65eb9ffd566b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
4c0305778b4b02327cc84ac03c05c82f6839ea6dcb28c73b0751b4c168601e7c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
56d014c086bdbb8e6727c4aa360408eb457604ca6d788375c3e76d1fc1282a70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
64572328af55ddb39cf319f821a90aece83e1a0289c4066f72b87935030d767c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
68546b0231d09cc911cb999b99aac50e0886e7fb2a15f9838196cd1b969eed3b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
756d67f0f1a9eb3ecd9811aa2645969a0399a6904fc24c012eb08d2a0496b50a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
88fc008066b2101015f65df21f2a0732a15470f31c4692048176dd67b4d25039.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
88fc008066b2101015f65df21f2a0732a15470f31c4692048176dd67b4d25039.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
8ab296834f82cfcc09d242ca9b14991f94e5b8578e693e18cddc6e18583575ad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
903d5eea2e039a18d476d0f8eed04db2ebab7584fcc8eda779901b4ecd592eff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a667459185406132f726b24ab0a1ee46efda6669c577f3f34cccd16abd51a708.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
b42e87afb8e78889d83796798a5b481717e3a8e055b712f3be843dc5251b5084.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
cdc820df4bc752f27ec02df80d490eb873cb293ebe295e0d73f95622ef6b0d04.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
d52db8688155f5960af607ea116cac7310719b971ef7efd19f34585b6431d286.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e17fa1b4c1940b188c7cdca6098ad239644d59ae3ac75405c11faf08a0699c2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f068aa20f8123496a540be006d669b95cd194e7c2d6d86bc3c0a956326dd01e6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
f3bbfb34efdda08027f33e680ee6274325d4986f57ea83d34517fef7abd65b1c.exe
Resource
win10v2004-20240426-en
General
-
Target
0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe
-
Size
621KB
-
MD5
71994583d724e9b766bfd6c77cb0b4ec
-
SHA1
590d62cc692718fc060033759f5baa542b29f78f
-
SHA256
0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6
-
SHA512
e5b2f636942ffc11ac2222247f6974dd1b4907d7e8c0c89b421b5ec00623fefa2b5769ee8ff5df135747100fdfe7ab77b17b3b637b60d177ed660cc4f38db2b8
-
SSDEEP
12288:tMrYy90Jk8gapGMsd3dp9vSEF6v3wGrcc6ZgdlTvVfo2fREdCaGj:tyx8gaY33j9v76v3wGrr6ZgdlTBFREYh
Malware Config
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/1772-20-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral2/memory/1772-21-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral2/memory/1772-22-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral2/memory/1772-24-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/4588-9-0x0000000002380000-0x00000000023A0000-memory.dmp net_reactor behavioral2/memory/4588-13-0x0000000004990000-0x00000000049AE000-memory.dmp net_reactor -
Executes dropped EXE 2 IoCs
pid Process 4588 1kp43Yd2.exe 4984 2Sx0417.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4984 set thread context of 1772 4984 2Sx0417.exe 95 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4588 1kp43Yd2.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4588 2136 0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe 91 PID 2136 wrote to memory of 4588 2136 0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe 91 PID 2136 wrote to memory of 4588 2136 0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe 91 PID 2136 wrote to memory of 4984 2136 0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe 92 PID 2136 wrote to memory of 4984 2136 0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe 92 PID 2136 wrote to memory of 4984 2136 0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe 92 PID 4984 wrote to memory of 2704 4984 2Sx0417.exe 94 PID 4984 wrote to memory of 2704 4984 2Sx0417.exe 94 PID 4984 wrote to memory of 2704 4984 2Sx0417.exe 94 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95 PID 4984 wrote to memory of 1772 4984 2Sx0417.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe"C:\Users\Admin\AppData\Local\Temp\0ebae60c4738b797211b088ef84ba987010e206b4ac1f1d015c690be92c7aea6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1kp43Yd2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1kp43Yd2.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2Sx0417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2Sx0417.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1772
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2808 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD57f726f7dac36a27880ea545866534dda
SHA1a644a86f8ffe8497101eb2c8ef69b859fb51119d
SHA2567d8062c6ae88e04ecadb6f8eb85e1d77caba2cb70fed241f04454fd5d70ced2a
SHA5128d8216a173bf1b498e5bf6d9292b05cd27b913c3203e296d55b169a1980bc38d8589bdb3e88a685a238183a60b8e86049cf280dd47143445c1ba5b6d287c2775
-
Filesize
1.1MB
MD56ef68ec5b2d91cbc9c66fa0553e527ec
SHA18d8ab02a5f2433cf12ba62336e4d774f2bbf21d2
SHA2568ffa8c6bcf0b38b229ac57e8a8eacfad2d27bd2b6ec971af827609bfb919495f
SHA5121a02ccdf3d1be279169bc25eb2a4452be337389b78050811ea4367ca624d5d169c7c7e157a73fe3be13378412e8d94606f41c157b5892cc76c4344ee85d204a6