Overview
overview
10Static
static
304a0e65087...2d.exe
windows10-2004-x64
100b23052e1d...05.exe
windows10-2004-x64
101319d83702...15.exe
windows10-2004-x64
1015bb5ac797...dd.exe
windows10-2004-x64
1019eb5c3dd8...ec.exe
windows10-2004-x64
102864919e9f...b7.exe
windows10-2004-x64
102f05412e59...2c.exe
windows10-2004-x64
103fd9e44b8d...84.exe
windows10-2004-x64
104920924329...b6.exe
windows10-2004-x64
106d6ab7a20c...33.exe
windows10-2004-x64
106e839edc16...b0.exe
windows10-2004-x64
106ff00efb56...f0.exe
windows10-2004-x64
107018985aa0...8e.exe
windows10-2004-x64
107b28b5b2ff...4e.exe
windows10-2004-x64
1093bee57b71...41.exe
windows10-2004-x64
10a22d19b8f1...9a.exe
windows10-2004-x64
10af3432152c...8d.exe
windows10-2004-x64
10bf27d39d4b...d1.exe
windows10-2004-x64
10db87d25edb...b5.exe
windows10-2004-x64
10f935568ec0...6c.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
04a0e650872d7846563cdcc0dd200fe4ab443abf6a07ee52486d24d18d6aba2d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0b23052e1def21c0e818780565a7776ae96e61597a9cf4ab1fc690daa4a85105.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1319d8370208b00e5260cfc0b8f145575c62bd43ab6f76605a992afeb6737f15.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
15bb5ac797303fa462001ce5fd88a7bfc4702cd65f0a1768f9b994f6495a49dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19eb5c3dd82e78329d1d98ef6b119402fff11484aea9cfea0e3e1135eea669ec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2864919e9fd253aa62ab37d5b02410fa89dd3ead4618da0b908d3b41e73167b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2f05412e59a8bdd056c643ef429f71b1cc81960c29ecda2121c342b304349d2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3fd9e44b8df95e2fb188e6b032b029a961609f7baa7d332929166e71f86e8b84.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4920924329af964d29e90b0bd3763c20450919411ad6b6ddabfd88061a7555b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
6d6ab7a20c1331b0189166b1cb07916ad2565031332833b346f8e5728ba48833.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6e839edc16582f1c2d53d777f08720f69ec875a29be62c7adf21eaa0b7b302b0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
6ff00efb56e1358cc67995d20e4e1edfffeb0789812a5cd830e2f477e16f63f0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7018985aa093121c146c37bf15499c6914c370d8b1e61fe98047260a3f0f5d8e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7b28b5b2ffa7298e1bc65ee1f5e49125dd2ae16da86952d43e4d1ac1e04c6e4e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
93bee57b7167fba61070c22f0c719ebb27499c5ff106633260f340e4917cf741.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
a22d19b8f183bcd64a7c85a1e82f19e6db501a7e19b93ebc313864c2a0e6ce9a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
af3432152c514465fb36f13137bae3206443814e6398ebe72ca129d56edcd08d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
db87d25edb56c618d7d41f2f458fbc54cabc5289ab771f1eb34a0e08d92928b5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f935568ec008833a6b510aaa18da8f703b0263d31ec0ee4a4442facb817a946c.exe
Resource
win10v2004-20240226-en
General
-
Target
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe
-
Size
733KB
-
MD5
f6ff6d5bcfc6785ac6f50078974cab80
-
SHA1
40b4e177adf9c23cc7e08a67b78250874f78c501
-
SHA256
bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1
-
SHA512
86b9ab7ba445bd325e7ab0c5d40ea57799c8254dba0bacc1e11f4306a3fc4be7b0902138ad5c4d1819ba1197e11a0aee5429c734dca7b4600fe30ddda8dda6a1
-
SSDEEP
12288:AMr2y90cvDIUilEPl88a0nkI8BuKu2GRkAPUwVmBkBiq+4sltxxFi:myhsUilEPq8Fnkpu2GRkRrRqvslt4
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral18/memory/4708-54-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral18/memory/4708-57-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral18/memory/4708-55-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1HE24SB2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1HE24SB2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1HE24SB2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1HE24SB2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1HE24SB2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1HE24SB2.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 1480 VU8XV55.exe 1932 1HE24SB2.exe 2120 2nh0970.exe 3496 3uW43Fx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1HE24SB2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1HE24SB2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" VU8XV55.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2120 set thread context of 4708 2120 2nh0970.exe 96 PID 3496 set thread context of 4088 3496 3uW43Fx.exe 102 -
Program crash 2 IoCs
pid pid_target Process procid_target 4792 2120 WerFault.exe 92 3048 3496 WerFault.exe 100 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1932 1HE24SB2.exe 1932 1HE24SB2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1932 1HE24SB2.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3420 wrote to memory of 1480 3420 bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe 83 PID 3420 wrote to memory of 1480 3420 bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe 83 PID 3420 wrote to memory of 1480 3420 bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe 83 PID 1480 wrote to memory of 1932 1480 VU8XV55.exe 84 PID 1480 wrote to memory of 1932 1480 VU8XV55.exe 84 PID 1480 wrote to memory of 1932 1480 VU8XV55.exe 84 PID 1480 wrote to memory of 2120 1480 VU8XV55.exe 92 PID 1480 wrote to memory of 2120 1480 VU8XV55.exe 92 PID 1480 wrote to memory of 2120 1480 VU8XV55.exe 92 PID 2120 wrote to memory of 4280 2120 2nh0970.exe 94 PID 2120 wrote to memory of 4280 2120 2nh0970.exe 94 PID 2120 wrote to memory of 4280 2120 2nh0970.exe 94 PID 2120 wrote to memory of 2344 2120 2nh0970.exe 95 PID 2120 wrote to memory of 2344 2120 2nh0970.exe 95 PID 2120 wrote to memory of 2344 2120 2nh0970.exe 95 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 2120 wrote to memory of 4708 2120 2nh0970.exe 96 PID 3420 wrote to memory of 3496 3420 bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe 100 PID 3420 wrote to memory of 3496 3420 bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe 100 PID 3420 wrote to memory of 3496 3420 bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe 100 PID 3496 wrote to memory of 4088 3496 3uW43Fx.exe 102 PID 3496 wrote to memory of 4088 3496 3uW43Fx.exe 102 PID 3496 wrote to memory of 4088 3496 3uW43Fx.exe 102 PID 3496 wrote to memory of 4088 3496 3uW43Fx.exe 102 PID 3496 wrote to memory of 4088 3496 3uW43Fx.exe 102 PID 3496 wrote to memory of 4088 3496 3uW43Fx.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe"C:\Users\Admin\AppData\Local\Temp\bf27d39d4bcefd6acc1e63fd0bf1bee8152a76443458be36ca71657a91e2d4d1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VU8XV55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\VU8XV55.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1HE24SB2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1HE24SB2.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2nh0970.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2nh0970.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2344
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 6244⤵
- Program crash
PID:4792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3uW43Fx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3uW43Fx.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 1363⤵
- Program crash
PID:3048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2120 -ip 21201⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3496 -ip 34961⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD50bd32839b444684cfb65a34e4f31780b
SHA155a5b4bd45696e03d4a35c1d0a6260b3a46846b0
SHA25627b58702d8f19e28ab866afe7c633d75c93f4d0ac154d3803a6e3d8e8f32bfc3
SHA5126d9fe18e99c1a82c016e4450b2dfe19bb4e67d26bba2da6e8b560e71de4793e76f09599f39f54ab27a46898c7f7dda888be421bbcb5bb8b3f06566e944ccfc76
-
Filesize
485KB
MD50f205ca2cc22873955c23316cfb699ec
SHA1cb6eb8bb00190355d40ab1e8523f01625d99223a
SHA256072f1187c5b0ffe2ff3de81416fefc27c9a178d9ae310d8dda3afd2f3b4fb4a4
SHA512f55f904302b822d303c4a1a052979ce0a801d6ec606ba04931568674c54de4db2f6b10de832c552b33890da1b25b2ac7a141862169eed3fddd50bdfdea90d33b
-
Filesize
194KB
MD535d718538c3e1346cb4fcf54aaa0f141
SHA1234c0aa0465c27c190a83936e8e3aa3c4b991224
SHA25697e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36
SHA5124bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3
-
Filesize
432KB
MD58170d94baae55a3e44b95b13f236a055
SHA1b43a34a894ea751cd9a63c621786cbec7849e279
SHA256be82ae3d01c3f9a5e75c54a99d555a990e04257a9fea1998ad7c661cf1a07ad4
SHA512d7db6dc84fa4c6197756609403eb73568c3a6ac6ce9d4fd690d41d40e05c06b0d649caf2ec9881188b75d425c9edc8e917bea1b2e68b0f47502db01c794aa09a