Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2023 21:56

General

  • Target

    file.exe

  • Size

    1.1MB

  • MD5

    ffeb028ff5c3a4208e380a132477d94c

  • SHA1

    939ca0552e509f19e013208a8b497eff56d17e15

  • SHA256

    f36250adbce70d18242037c3b5f728e6aa62e63d36d9ccb15e82743f8cf0bd82

  • SHA512

    c48020a4648fb25c089bed4dc6f0b5ca3f385c97ea96e5637fa787c41485bc58e7b6359d1e4a37f6a09275bff56ab4fa1082beea689ffa0c9e2379c664735cd9

  • SSDEEP

    24576:tyYvY5s+J79BcJG7kcK5KidjX1SvUa4kJV22b8M6yM0:IYOs6CJG7vKYidjXGUa4ir8Mh

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2584
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2492
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 268
                7⤵
                • Program crash
                PID:2916
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe

    Filesize

    990KB

    MD5

    3b1066a48906ac881fe4dcf95691828e

    SHA1

    97ceaf071b5ac2623c3100168b72341f1aebffd3

    SHA256

    cd18a784fe1bcb7e0bb5b4f53165f73e1e6f5ee7dbebd62ba9408b2836f583bd

    SHA512

    7aeb14045cd7ab1c0f80139383dc4cc41b0d834ae0683631cef3d4f500913e6077721a9f738aad9d5f106dd679927aac8a33dd8b75baf95e6ea2a6ec15c144a3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe

    Filesize

    990KB

    MD5

    3b1066a48906ac881fe4dcf95691828e

    SHA1

    97ceaf071b5ac2623c3100168b72341f1aebffd3

    SHA256

    cd18a784fe1bcb7e0bb5b4f53165f73e1e6f5ee7dbebd62ba9408b2836f583bd

    SHA512

    7aeb14045cd7ab1c0f80139383dc4cc41b0d834ae0683631cef3d4f500913e6077721a9f738aad9d5f106dd679927aac8a33dd8b75baf95e6ea2a6ec15c144a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe

    Filesize

    697KB

    MD5

    3fb83f23a9c3302e5d518f6774ef394d

    SHA1

    c3961dc63eac3ae39bd369ceee36017d88647754

    SHA256

    54b0f000bd6c6a93d0e7563e6afd890fe163e2d64eae217c2da377c424d74447

    SHA512

    96a005657e018f374b802efad8d0763aee176dbdf2de9d964d6d6d718d37827c27e6c041cf1ba7ab6f78b140d666263a3e09f5115d0372605a1e1b99f6016bf3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe

    Filesize

    697KB

    MD5

    3fb83f23a9c3302e5d518f6774ef394d

    SHA1

    c3961dc63eac3ae39bd369ceee36017d88647754

    SHA256

    54b0f000bd6c6a93d0e7563e6afd890fe163e2d64eae217c2da377c424d74447

    SHA512

    96a005657e018f374b802efad8d0763aee176dbdf2de9d964d6d6d718d37827c27e6c041cf1ba7ab6f78b140d666263a3e09f5115d0372605a1e1b99f6016bf3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe

    Filesize

    453KB

    MD5

    d1275f10d4ab5ff6d8f7003168c0267e

    SHA1

    f98a24d748a84c52c5b9780319fcbb788e3820bb

    SHA256

    554acf3d96716b96b07a88177a74828b4ef695656bd7edc549b6793a923a4634

    SHA512

    4dabf1b9358927d458562d5cf3464ba703ad254eaf3f20de39bf54417dda923540df1210d412c43e103d850065eb290759cc87273f3a3cd0c7b8a68fd75f5ff3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe

    Filesize

    453KB

    MD5

    d1275f10d4ab5ff6d8f7003168c0267e

    SHA1

    f98a24d748a84c52c5b9780319fcbb788e3820bb

    SHA256

    554acf3d96716b96b07a88177a74828b4ef695656bd7edc549b6793a923a4634

    SHA512

    4dabf1b9358927d458562d5cf3464ba703ad254eaf3f20de39bf54417dda923540df1210d412c43e103d850065eb290759cc87273f3a3cd0c7b8a68fd75f5ff3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe

    Filesize

    990KB

    MD5

    3b1066a48906ac881fe4dcf95691828e

    SHA1

    97ceaf071b5ac2623c3100168b72341f1aebffd3

    SHA256

    cd18a784fe1bcb7e0bb5b4f53165f73e1e6f5ee7dbebd62ba9408b2836f583bd

    SHA512

    7aeb14045cd7ab1c0f80139383dc4cc41b0d834ae0683631cef3d4f500913e6077721a9f738aad9d5f106dd679927aac8a33dd8b75baf95e6ea2a6ec15c144a3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe

    Filesize

    990KB

    MD5

    3b1066a48906ac881fe4dcf95691828e

    SHA1

    97ceaf071b5ac2623c3100168b72341f1aebffd3

    SHA256

    cd18a784fe1bcb7e0bb5b4f53165f73e1e6f5ee7dbebd62ba9408b2836f583bd

    SHA512

    7aeb14045cd7ab1c0f80139383dc4cc41b0d834ae0683631cef3d4f500913e6077721a9f738aad9d5f106dd679927aac8a33dd8b75baf95e6ea2a6ec15c144a3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe

    Filesize

    697KB

    MD5

    3fb83f23a9c3302e5d518f6774ef394d

    SHA1

    c3961dc63eac3ae39bd369ceee36017d88647754

    SHA256

    54b0f000bd6c6a93d0e7563e6afd890fe163e2d64eae217c2da377c424d74447

    SHA512

    96a005657e018f374b802efad8d0763aee176dbdf2de9d964d6d6d718d37827c27e6c041cf1ba7ab6f78b140d666263a3e09f5115d0372605a1e1b99f6016bf3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe

    Filesize

    697KB

    MD5

    3fb83f23a9c3302e5d518f6774ef394d

    SHA1

    c3961dc63eac3ae39bd369ceee36017d88647754

    SHA256

    54b0f000bd6c6a93d0e7563e6afd890fe163e2d64eae217c2da377c424d74447

    SHA512

    96a005657e018f374b802efad8d0763aee176dbdf2de9d964d6d6d718d37827c27e6c041cf1ba7ab6f78b140d666263a3e09f5115d0372605a1e1b99f6016bf3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe

    Filesize

    453KB

    MD5

    d1275f10d4ab5ff6d8f7003168c0267e

    SHA1

    f98a24d748a84c52c5b9780319fcbb788e3820bb

    SHA256

    554acf3d96716b96b07a88177a74828b4ef695656bd7edc549b6793a923a4634

    SHA512

    4dabf1b9358927d458562d5cf3464ba703ad254eaf3f20de39bf54417dda923540df1210d412c43e103d850065eb290759cc87273f3a3cd0c7b8a68fd75f5ff3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe

    Filesize

    453KB

    MD5

    d1275f10d4ab5ff6d8f7003168c0267e

    SHA1

    f98a24d748a84c52c5b9780319fcbb788e3820bb

    SHA256

    554acf3d96716b96b07a88177a74828b4ef695656bd7edc549b6793a923a4634

    SHA512

    4dabf1b9358927d458562d5cf3464ba703ad254eaf3f20de39bf54417dda923540df1210d412c43e103d850065eb290759cc87273f3a3cd0c7b8a68fd75f5ff3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

    Filesize

    378KB

    MD5

    f95674c8a4c8c59349affa34ed5c1771

    SHA1

    3debf69e66c77e3cb51f0d59d14ae72f7912413d

    SHA256

    e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

    SHA512

    89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

  • memory/2492-79-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-80-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-93-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-91-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-89-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-88-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2492-86-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-84-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-82-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-81-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2660-63-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-51-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-49-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-45-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-65-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-69-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-67-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-61-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-47-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-55-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-53-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-57-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-59-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-43-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-42-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/2660-41-0x0000000000770000-0x000000000078C000-memory.dmp

    Filesize

    112KB

  • memory/2660-40-0x0000000000390000-0x00000000003AE000-memory.dmp

    Filesize

    120KB