Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2023, 03:45

General

  • Target

    f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe

  • Size

    1.5MB

  • MD5

    a69adf7bf8b0a3c328afcd0caec0891a

  • SHA1

    e95c22445a2ec8a228868a0a18ea8a25036642a0

  • SHA256

    f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6

  • SHA512

    30f640e6ac49d4af98a6a6179b829f2f1204a601814e0786205704f18d66b76395d650a01df9d2675b5ed4adf1c618058bc50a5e062f96e64e980e4661477146

  • SSDEEP

    24576:2yh1TH4pJvTWKw783mY0Q5VOnhJuLErqHBc722FWJ14+U265pdO7BCybi:FbDEpTWKwoJ5VOnhXRLFwDb

Malware Config

Signatures

  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe
    "C:\Users\Admin\AppData\Local\Temp\f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wx9To1FN.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wx9To1FN.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BG0iA5xn.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BG0iA5xn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1892
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gt1tO1kU.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gt1tO1kU.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oW1Si6gJ.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oW1Si6gJ.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2664
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2112
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2108
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 284
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wx9To1FN.exe

      Filesize

      1.3MB

      MD5

      f28bc9b1bdcc49f0c0cee638acc19175

      SHA1

      7a45d09b3dbbc67d9b7d0424c4d1483c26f4dc4d

      SHA256

      e1ef05af6b3b4e7f05186afbafcb52d2aa01eebb40c2f124c333c15cd31bc466

      SHA512

      ae15f8a6285eb4347bf2778ec19b9adcb134256d11f182710fb021504c841d24f1da852e219d1a84eaedae8d3d9a7f0f08a4f0de562c4a511c197fa18ce65115

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wx9To1FN.exe

      Filesize

      1.3MB

      MD5

      f28bc9b1bdcc49f0c0cee638acc19175

      SHA1

      7a45d09b3dbbc67d9b7d0424c4d1483c26f4dc4d

      SHA256

      e1ef05af6b3b4e7f05186afbafcb52d2aa01eebb40c2f124c333c15cd31bc466

      SHA512

      ae15f8a6285eb4347bf2778ec19b9adcb134256d11f182710fb021504c841d24f1da852e219d1a84eaedae8d3d9a7f0f08a4f0de562c4a511c197fa18ce65115

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BG0iA5xn.exe

      Filesize

      1.1MB

      MD5

      91656dc980607795ca3c59af8dd899e3

      SHA1

      e9234454b7c1d4d0e1fab883cdbcdb93ab6cb8a9

      SHA256

      b242807ada7f80afffc871d5651c1c26b319ec7dfed63c46bd949f869263ba4c

      SHA512

      15ff993ae3eae35359fa75781e6d92375f0fa01ef2cb0cf58335bf4c2bcca3bb765755f7efd15ce4df02b152fb99a5b77151447b812c1704b95aea05b6ee01f8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BG0iA5xn.exe

      Filesize

      1.1MB

      MD5

      91656dc980607795ca3c59af8dd899e3

      SHA1

      e9234454b7c1d4d0e1fab883cdbcdb93ab6cb8a9

      SHA256

      b242807ada7f80afffc871d5651c1c26b319ec7dfed63c46bd949f869263ba4c

      SHA512

      15ff993ae3eae35359fa75781e6d92375f0fa01ef2cb0cf58335bf4c2bcca3bb765755f7efd15ce4df02b152fb99a5b77151447b812c1704b95aea05b6ee01f8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gt1tO1kU.exe

      Filesize

      735KB

      MD5

      513bdeef34cbcdd2a2dffca2613004e3

      SHA1

      9243b1bbccf4e007017372dd229352859586fa25

      SHA256

      8a6712606c31aa2d536286cf3ef923c1a4eaf8b36df669fa6a5ec5be0b502e5b

      SHA512

      8a5f77891d723b6b63ecb9aafcb85a8e9a6589eefe29a5bef95ab7ffc48620ffdebd01bea6695458d1b5ba66a5395151cc7582dd6cb8c4babb36d1ec10826d68

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gt1tO1kU.exe

      Filesize

      735KB

      MD5

      513bdeef34cbcdd2a2dffca2613004e3

      SHA1

      9243b1bbccf4e007017372dd229352859586fa25

      SHA256

      8a6712606c31aa2d536286cf3ef923c1a4eaf8b36df669fa6a5ec5be0b502e5b

      SHA512

      8a5f77891d723b6b63ecb9aafcb85a8e9a6589eefe29a5bef95ab7ffc48620ffdebd01bea6695458d1b5ba66a5395151cc7582dd6cb8c4babb36d1ec10826d68

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oW1Si6gJ.exe

      Filesize

      562KB

      MD5

      9d85aef4e8e537d704685861d77632c5

      SHA1

      12dff3811d1c391126f9d4264d8a50c57aecc8b2

      SHA256

      e57dd1874fee3f21d203d85d5049c631e86aa5b96e795f4124b1f77d3c024284

      SHA512

      5465a52c53d038a15d4c968ed614316fb908fbfc6b8134e664bcacf172022b7e4a7343f8e1a9f0e1936df9a5ae29c6b34b943edea77b863bc6fcd83408a83e71

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oW1Si6gJ.exe

      Filesize

      562KB

      MD5

      9d85aef4e8e537d704685861d77632c5

      SHA1

      12dff3811d1c391126f9d4264d8a50c57aecc8b2

      SHA256

      e57dd1874fee3f21d203d85d5049c631e86aa5b96e795f4124b1f77d3c024284

      SHA512

      5465a52c53d038a15d4c968ed614316fb908fbfc6b8134e664bcacf172022b7e4a7343f8e1a9f0e1936df9a5ae29c6b34b943edea77b863bc6fcd83408a83e71

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe

      Filesize

      1.4MB

      MD5

      9b45c734f07328a3ac53e6551a95e81f

      SHA1

      6b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0

      SHA256

      3ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb

      SHA512

      817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe

      Filesize

      1.4MB

      MD5

      9b45c734f07328a3ac53e6551a95e81f

      SHA1

      6b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0

      SHA256

      3ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb

      SHA512

      817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Wx9To1FN.exe

      Filesize

      1.3MB

      MD5

      f28bc9b1bdcc49f0c0cee638acc19175

      SHA1

      7a45d09b3dbbc67d9b7d0424c4d1483c26f4dc4d

      SHA256

      e1ef05af6b3b4e7f05186afbafcb52d2aa01eebb40c2f124c333c15cd31bc466

      SHA512

      ae15f8a6285eb4347bf2778ec19b9adcb134256d11f182710fb021504c841d24f1da852e219d1a84eaedae8d3d9a7f0f08a4f0de562c4a511c197fa18ce65115

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Wx9To1FN.exe

      Filesize

      1.3MB

      MD5

      f28bc9b1bdcc49f0c0cee638acc19175

      SHA1

      7a45d09b3dbbc67d9b7d0424c4d1483c26f4dc4d

      SHA256

      e1ef05af6b3b4e7f05186afbafcb52d2aa01eebb40c2f124c333c15cd31bc466

      SHA512

      ae15f8a6285eb4347bf2778ec19b9adcb134256d11f182710fb021504c841d24f1da852e219d1a84eaedae8d3d9a7f0f08a4f0de562c4a511c197fa18ce65115

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\BG0iA5xn.exe

      Filesize

      1.1MB

      MD5

      91656dc980607795ca3c59af8dd899e3

      SHA1

      e9234454b7c1d4d0e1fab883cdbcdb93ab6cb8a9

      SHA256

      b242807ada7f80afffc871d5651c1c26b319ec7dfed63c46bd949f869263ba4c

      SHA512

      15ff993ae3eae35359fa75781e6d92375f0fa01ef2cb0cf58335bf4c2bcca3bb765755f7efd15ce4df02b152fb99a5b77151447b812c1704b95aea05b6ee01f8

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\BG0iA5xn.exe

      Filesize

      1.1MB

      MD5

      91656dc980607795ca3c59af8dd899e3

      SHA1

      e9234454b7c1d4d0e1fab883cdbcdb93ab6cb8a9

      SHA256

      b242807ada7f80afffc871d5651c1c26b319ec7dfed63c46bd949f869263ba4c

      SHA512

      15ff993ae3eae35359fa75781e6d92375f0fa01ef2cb0cf58335bf4c2bcca3bb765755f7efd15ce4df02b152fb99a5b77151447b812c1704b95aea05b6ee01f8

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\gt1tO1kU.exe

      Filesize

      735KB

      MD5

      513bdeef34cbcdd2a2dffca2613004e3

      SHA1

      9243b1bbccf4e007017372dd229352859586fa25

      SHA256

      8a6712606c31aa2d536286cf3ef923c1a4eaf8b36df669fa6a5ec5be0b502e5b

      SHA512

      8a5f77891d723b6b63ecb9aafcb85a8e9a6589eefe29a5bef95ab7ffc48620ffdebd01bea6695458d1b5ba66a5395151cc7582dd6cb8c4babb36d1ec10826d68

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\gt1tO1kU.exe

      Filesize

      735KB

      MD5

      513bdeef34cbcdd2a2dffca2613004e3

      SHA1

      9243b1bbccf4e007017372dd229352859586fa25

      SHA256

      8a6712606c31aa2d536286cf3ef923c1a4eaf8b36df669fa6a5ec5be0b502e5b

      SHA512

      8a5f77891d723b6b63ecb9aafcb85a8e9a6589eefe29a5bef95ab7ffc48620ffdebd01bea6695458d1b5ba66a5395151cc7582dd6cb8c4babb36d1ec10826d68

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\oW1Si6gJ.exe

      Filesize

      562KB

      MD5

      9d85aef4e8e537d704685861d77632c5

      SHA1

      12dff3811d1c391126f9d4264d8a50c57aecc8b2

      SHA256

      e57dd1874fee3f21d203d85d5049c631e86aa5b96e795f4124b1f77d3c024284

      SHA512

      5465a52c53d038a15d4c968ed614316fb908fbfc6b8134e664bcacf172022b7e4a7343f8e1a9f0e1936df9a5ae29c6b34b943edea77b863bc6fcd83408a83e71

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\oW1Si6gJ.exe

      Filesize

      562KB

      MD5

      9d85aef4e8e537d704685861d77632c5

      SHA1

      12dff3811d1c391126f9d4264d8a50c57aecc8b2

      SHA256

      e57dd1874fee3f21d203d85d5049c631e86aa5b96e795f4124b1f77d3c024284

      SHA512

      5465a52c53d038a15d4c968ed614316fb908fbfc6b8134e664bcacf172022b7e4a7343f8e1a9f0e1936df9a5ae29c6b34b943edea77b863bc6fcd83408a83e71

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe

      Filesize

      1.4MB

      MD5

      9b45c734f07328a3ac53e6551a95e81f

      SHA1

      6b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0

      SHA256

      3ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb

      SHA512

      817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe

      Filesize

      1.4MB

      MD5

      9b45c734f07328a3ac53e6551a95e81f

      SHA1

      6b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0

      SHA256

      3ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb

      SHA512

      817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe

      Filesize

      1.4MB

      MD5

      9b45c734f07328a3ac53e6551a95e81f

      SHA1

      6b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0

      SHA256

      3ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb

      SHA512

      817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe

      Filesize

      1.4MB

      MD5

      9b45c734f07328a3ac53e6551a95e81f

      SHA1

      6b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0

      SHA256

      3ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb

      SHA512

      817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe

      Filesize

      1.4MB

      MD5

      9b45c734f07328a3ac53e6551a95e81f

      SHA1

      6b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0

      SHA256

      3ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb

      SHA512

      817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe

      Filesize

      1.4MB

      MD5

      9b45c734f07328a3ac53e6551a95e81f

      SHA1

      6b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0

      SHA256

      3ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb

      SHA512

      817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6

    • memory/2108-56-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-57-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-58-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2108-59-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-61-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-63-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-64-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-50-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-55-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-54-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-52-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2108-69-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB