Overview
overview
10Static
static
318b5f5ec44...05.exe
windows10-2004-x64
10246983943f...51.exe
windows10-2004-x64
10733ef926ae...74.exe
windows10-2004-x64
1081efe73b97...49.exe
windows10-2004-x64
1085d15c9234...a9.exe
windows10-2004-x64
10869bcbfd03...c1.exe
windows10-2004-x64
1088bcbe8e48...0e.exe
windows10-2004-x64
108e3b7e61aa...83.exe
windows10-2004-x64
1095ebfb1a5d...7b.exe
windows10-2004-x64
10a14a0df7d6...b5.exe
windows10-2004-x64
10a7de715d1e...f4.exe
windows10-2004-x64
10a95d0a23b0...b5.exe
windows10-2004-x64
10acced6c53e...9e.exe
windows10-2004-x64
10ad4ff817f4...f4.exe
windows10-2004-x64
7b5f2197dc6...dc.exe
windows10-2004-x64
10c354814644...fc.exe
windows10-2004-x64
10d12b0975bf...82.exe
windows10-2004-x64
10d49cc2c525...f0.exe
windows10-2004-x64
10e48626da66...e6.exe
windows10-2004-x64
10e622b46224...bc.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
18b5f5ec443576ad4102d53a0366fc22c8cffc5e42177408ed6e4752ad377905.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
246983943f6bf8c738f3eb566fd198a2b627f5e62bc85a048e9cb05fa064ab51.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
733ef926aecde5ac2059782a5f2fb64f8fbbf625f2beb3ca397e8b56c0b4a574.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
81efe73b978b0562c9e65634dc76439053942720aa56e6ff1e4cfc01f3ec0c49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
85d15c923467e5894a2f36bf8563a0591dc6653d4ebd713eac8de5f3a57655a9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
88bcbe8e48f13c79125efeaff65fe5dcb719586f4683dca74f0287cdab35e40e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8e3b7e61aa74a089a79cac60eb4ab68e048ad684cd4c79b7d000b22321106983.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
95ebfb1a5d55b902b4834a06e334e1b7810e32d19a0d5e6890b33312d33dac7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
a14a0df7d62e3ee59ef076859a5922aba2949e201ebcaa2313a20715aad1fab5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
a7de715d1ee0762a29e3132e9fda5b98002750ef8ee53571208fe8b92f6225f4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
a95d0a23b0c5bde5da2656477d19360bb7e1014fc2da653fed9ec6dd0b31cfb5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
acced6c53e1b934a83d5078e487974940fb30074e0dc4027f969dbab9ca9539e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ad4ff817f44ff7266fb94f8757fc6afe62664e7c937dabddb1878c1ca9407cf4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b5f2197dc65f7c8ffbd0e39caf14248edd08aa46f69db02db370ce1daa32ebdc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
c35481464455ec62b97d08f9bcb8ac75eadf87ffc4cfef30c3c3fd9edaa597fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d12b0975bf0eb912d5ace8ceb5f38f447f87b501a227b5fd3273e9392afb0c82.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
d49cc2c52587d7ccfff0f04de2d9313a7352fee098cd64deb7bb55ca2cecd7f0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
e48626da66ef50a0f8bd4d374f7aaa4931cc35197cb2826a4f29047dce4edfe6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
e622b4622421bb1baa18a66801c5d86fb7ae8872788326cfc9670abde556f2bc.exe
Resource
win10v2004-20240426-en
General
-
Target
869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe
-
Size
642KB
-
MD5
68ba92e8a25094909f917df7529250b9
-
SHA1
dce2e66744525105b2f3ae80eb1f3ab2c3133918
-
SHA256
869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1
-
SHA512
000be4531b85fe06922d7182a4ca22099a677ba19d49bf7b69a4ea7bcf993fa7c13659b03b397082bb374c10f6db578f4d3c998babdfbe152cc4f64750081655
-
SSDEEP
12288:+Mriy907x3OTU9T2AOonWUoeoKelFZM8sgbyvRDUz2uDuYQC9K:Qy8x+TUx4j3FAgby5Iz2I8
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral6/memory/1768-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral6/memory/1768-19-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral6/memory/1768-18-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 736 Ll7jj11.exe 4736 1Hl72Sm0.exe 3124 2DP8586.exe 5004 3Td34ob.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ll7jj11.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4736 set thread context of 2796 4736 1Hl72Sm0.exe 84 PID 3124 set thread context of 1768 3124 2DP8586.exe 87 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2184 sc.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Td34ob.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Td34ob.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Td34ob.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2796 AppLaunch.exe 2796 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4816 wrote to memory of 736 4816 869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe 82 PID 4816 wrote to memory of 736 4816 869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe 82 PID 4816 wrote to memory of 736 4816 869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe 82 PID 736 wrote to memory of 4736 736 Ll7jj11.exe 83 PID 736 wrote to memory of 4736 736 Ll7jj11.exe 83 PID 736 wrote to memory of 4736 736 Ll7jj11.exe 83 PID 4736 wrote to memory of 2796 4736 1Hl72Sm0.exe 84 PID 4736 wrote to memory of 2796 4736 1Hl72Sm0.exe 84 PID 4736 wrote to memory of 2796 4736 1Hl72Sm0.exe 84 PID 4736 wrote to memory of 2796 4736 1Hl72Sm0.exe 84 PID 4736 wrote to memory of 2796 4736 1Hl72Sm0.exe 84 PID 4736 wrote to memory of 2796 4736 1Hl72Sm0.exe 84 PID 4736 wrote to memory of 2796 4736 1Hl72Sm0.exe 84 PID 4736 wrote to memory of 2796 4736 1Hl72Sm0.exe 84 PID 736 wrote to memory of 3124 736 Ll7jj11.exe 85 PID 736 wrote to memory of 3124 736 Ll7jj11.exe 85 PID 736 wrote to memory of 3124 736 Ll7jj11.exe 85 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 3124 wrote to memory of 1768 3124 2DP8586.exe 87 PID 4816 wrote to memory of 5004 4816 869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe 88 PID 4816 wrote to memory of 5004 4816 869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe 88 PID 4816 wrote to memory of 5004 4816 869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe"C:\Users\Admin\AppData\Local\Temp\869bcbfd039d3500134922f4d0ada9e8c16892c8167d8dfe873bf3063d0ef1c1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ll7jj11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ll7jj11.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Hl72Sm0.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Hl72Sm0.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2DP8586.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2DP8586.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Td34ob.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Td34ob.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:5004
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2184
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ee0c3786564939ae78d1484fae50663d
SHA1e30f2d60fb1fb47cb4b3cf31af1b93c7b2f52070
SHA256e4a987cade8ce6ab0d7e0d18aa515342422fd5a4b451eba4ab70c3348c0f2101
SHA51251928a3521a305b6621765792bd5385dbacbc3667082a036733345ce4e28c3b84678b64f7dccd57fc1ff5da62f46d92bcbf4b098245daeef519231efa83e13d6
-
Filesize
518KB
MD52ea5add7241091421a42ded256b8bc40
SHA138249951f7d0eab56ee32c51add8bcfb064db014
SHA256f44880b747d796878efab66bb15c096e776f3d3f63bebc262f630f0637bd9b74
SHA5126c3398224497b93f87635420b8f539e81ea24b692dcaa587764b6e53b361cc96795e98cc88fdb4ff710455b263dc37d621b99528a1b272c76c0616e2c3e20934
-
Filesize
869KB
MD5ff960d9d6e13e1c269e222ebfd258654
SHA1e90dbc5f9fbdaa2d1113dac3be5bd41657824735
SHA25636a694b2da8180f1148c7acb9649b11f70dd2e0d7328f4bbf62010adb88b55ec
SHA5122b26a3064e295fa546ec0cab7ecea50b63ddd0bf56fa808633f8e499390f387d62e02a6334362ca67ee718f3ea8ac7227fdd34aa1deb71657ca373e63f09d293
-
Filesize
1.0MB
MD50c49f82a6e2a8192269a7432c9261d0d
SHA15d27c8ec6d31f7697ab604abf56ecacb0c7e5401
SHA256966462bfcb6b35408db1e5a3d555fc1111235a9c235dbaf3eba8f54a092dee35
SHA512b71e816da7e165c8a51f5217e308d871016f4f5410aa1487de6e1c87a00f6ad60ebffcef2ae7f4915bc89256c1db213bccd067aa339d9019b1ab037615bed68c