Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
Cu8lr9EP.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Cu8lr9EP.exe
Resource
win10-20230915-en
General
-
Target
Cu8lr9EP.exe
-
Size
1.5MB
-
MD5
a40b80b9f9fe39308c0f10b152d4a715
-
SHA1
04437d394376e70d5382e5d2e1e6e83b189ba21e
-
SHA256
05e973761e44463f832a1d02a7ef7615686bfee5d9cf3d585c1c8f51b9d8a2d4
-
SHA512
f12605a016ff14981bad6af43909aed27a9487f0a5841e63fddaa33f4b4dfb6d50b71bbd47132e7c84c7f62562d4ac4f5544bbf5ca6a027b142b5cadec793f86
-
SSDEEP
24576:NyK+MXsdOLiQO3B/X8kt7YOzz4dBLcKPggKF83zfpJ5X2CBd8rA:oK+MXsdOcR/RSw4o23zRYr
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2672-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2576 On6gf7sK.exe 2304 pM7ZO9FY.exe 2640 cp6MC2WP.exe 2644 1Vl72wS3.exe -
Loads dropped DLL 13 IoCs
pid Process 2244 Cu8lr9EP.exe 2576 On6gf7sK.exe 2576 On6gf7sK.exe 2304 pM7ZO9FY.exe 2304 pM7ZO9FY.exe 2640 cp6MC2WP.exe 2640 cp6MC2WP.exe 2640 cp6MC2WP.exe 2644 1Vl72wS3.exe 2908 WerFault.exe 2908 WerFault.exe 2908 WerFault.exe 2908 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Cu8lr9EP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" On6gf7sK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pM7ZO9FY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" cp6MC2WP.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 2672 2644 1Vl72wS3.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2908 2644 WerFault.exe 31 2096 2672 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2576 2244 Cu8lr9EP.exe 28 PID 2244 wrote to memory of 2576 2244 Cu8lr9EP.exe 28 PID 2244 wrote to memory of 2576 2244 Cu8lr9EP.exe 28 PID 2244 wrote to memory of 2576 2244 Cu8lr9EP.exe 28 PID 2244 wrote to memory of 2576 2244 Cu8lr9EP.exe 28 PID 2244 wrote to memory of 2576 2244 Cu8lr9EP.exe 28 PID 2244 wrote to memory of 2576 2244 Cu8lr9EP.exe 28 PID 2576 wrote to memory of 2304 2576 On6gf7sK.exe 29 PID 2576 wrote to memory of 2304 2576 On6gf7sK.exe 29 PID 2576 wrote to memory of 2304 2576 On6gf7sK.exe 29 PID 2576 wrote to memory of 2304 2576 On6gf7sK.exe 29 PID 2576 wrote to memory of 2304 2576 On6gf7sK.exe 29 PID 2576 wrote to memory of 2304 2576 On6gf7sK.exe 29 PID 2576 wrote to memory of 2304 2576 On6gf7sK.exe 29 PID 2304 wrote to memory of 2640 2304 pM7ZO9FY.exe 30 PID 2304 wrote to memory of 2640 2304 pM7ZO9FY.exe 30 PID 2304 wrote to memory of 2640 2304 pM7ZO9FY.exe 30 PID 2304 wrote to memory of 2640 2304 pM7ZO9FY.exe 30 PID 2304 wrote to memory of 2640 2304 pM7ZO9FY.exe 30 PID 2304 wrote to memory of 2640 2304 pM7ZO9FY.exe 30 PID 2304 wrote to memory of 2640 2304 pM7ZO9FY.exe 30 PID 2640 wrote to memory of 2644 2640 cp6MC2WP.exe 31 PID 2640 wrote to memory of 2644 2640 cp6MC2WP.exe 31 PID 2640 wrote to memory of 2644 2640 cp6MC2WP.exe 31 PID 2640 wrote to memory of 2644 2640 cp6MC2WP.exe 31 PID 2640 wrote to memory of 2644 2640 cp6MC2WP.exe 31 PID 2640 wrote to memory of 2644 2640 cp6MC2WP.exe 31 PID 2640 wrote to memory of 2644 2640 cp6MC2WP.exe 31 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2672 2644 1Vl72wS3.exe 32 PID 2644 wrote to memory of 2908 2644 1Vl72wS3.exe 33 PID 2644 wrote to memory of 2908 2644 1Vl72wS3.exe 33 PID 2644 wrote to memory of 2908 2644 1Vl72wS3.exe 33 PID 2644 wrote to memory of 2908 2644 1Vl72wS3.exe 33 PID 2644 wrote to memory of 2908 2644 1Vl72wS3.exe 33 PID 2644 wrote to memory of 2908 2644 1Vl72wS3.exe 33 PID 2644 wrote to memory of 2908 2644 1Vl72wS3.exe 33 PID 2672 wrote to memory of 2096 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2096 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2096 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2096 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2096 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2096 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2096 2672 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cu8lr9EP.exe"C:\Users\Admin\AppData\Local\Temp\Cu8lr9EP.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\On6gf7sK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\On6gf7sK.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pM7ZO9FY.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pM7ZO9FY.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cp6MC2WP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cp6MC2WP.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 2687⤵
- Program crash
PID:2096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2908
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53d50793e58f89962ddab66df07982fb0
SHA1cef09074293ea5a1f28ab511f4c2ad7298209790
SHA256b8f49f1427838335010672cc559f6445b71118af395e9656f14660e62e19eb05
SHA5122b300e35011372657f1405bf669869597641d4411e0562088b51042658449ef14ed16beeef47a34b47fdfad875dedbde182e4883baf360c2bbfb13d65c7415cb
-
Filesize
1.3MB
MD53d50793e58f89962ddab66df07982fb0
SHA1cef09074293ea5a1f28ab511f4c2ad7298209790
SHA256b8f49f1427838335010672cc559f6445b71118af395e9656f14660e62e19eb05
SHA5122b300e35011372657f1405bf669869597641d4411e0562088b51042658449ef14ed16beeef47a34b47fdfad875dedbde182e4883baf360c2bbfb13d65c7415cb
-
Filesize
821KB
MD529c245665d7ec2a067b0efba9761203a
SHA121bfecc123a349c6447b2bbaf54f2921015957b2
SHA2562c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e
SHA512e57f8ba651b21143633b3e5390ef585ba8a91ea58913a426de90c34005a9c2970177232c8d95855f362b894defc774f7c488bff4338b9e44c9187fc0a0e9ea39
-
Filesize
821KB
MD529c245665d7ec2a067b0efba9761203a
SHA121bfecc123a349c6447b2bbaf54f2921015957b2
SHA2562c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e
SHA512e57f8ba651b21143633b3e5390ef585ba8a91ea58913a426de90c34005a9c2970177232c8d95855f362b894defc774f7c488bff4338b9e44c9187fc0a0e9ea39
-
Filesize
649KB
MD52c42a560131ee6b2322e729a2ff216b3
SHA11824ca61a858fd87d69d0c32e47c92bea4145943
SHA256b00259386069b7e0a13de23ad68449ae3d36e1174ed36221a96ab8f3af60aba3
SHA512f6ad6d2390bc63bff72bf0fe6df5fe3efff468900b36755275585aa11ca89c0d174736ebab1b5bce0e75015f91cba5f6264ab16c77888993eafc250584e70d66
-
Filesize
649KB
MD52c42a560131ee6b2322e729a2ff216b3
SHA11824ca61a858fd87d69d0c32e47c92bea4145943
SHA256b00259386069b7e0a13de23ad68449ae3d36e1174ed36221a96ab8f3af60aba3
SHA512f6ad6d2390bc63bff72bf0fe6df5fe3efff468900b36755275585aa11ca89c0d174736ebab1b5bce0e75015f91cba5f6264ab16c77888993eafc250584e70d66
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
Filesize
1.3MB
MD53d50793e58f89962ddab66df07982fb0
SHA1cef09074293ea5a1f28ab511f4c2ad7298209790
SHA256b8f49f1427838335010672cc559f6445b71118af395e9656f14660e62e19eb05
SHA5122b300e35011372657f1405bf669869597641d4411e0562088b51042658449ef14ed16beeef47a34b47fdfad875dedbde182e4883baf360c2bbfb13d65c7415cb
-
Filesize
1.3MB
MD53d50793e58f89962ddab66df07982fb0
SHA1cef09074293ea5a1f28ab511f4c2ad7298209790
SHA256b8f49f1427838335010672cc559f6445b71118af395e9656f14660e62e19eb05
SHA5122b300e35011372657f1405bf669869597641d4411e0562088b51042658449ef14ed16beeef47a34b47fdfad875dedbde182e4883baf360c2bbfb13d65c7415cb
-
Filesize
821KB
MD529c245665d7ec2a067b0efba9761203a
SHA121bfecc123a349c6447b2bbaf54f2921015957b2
SHA2562c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e
SHA512e57f8ba651b21143633b3e5390ef585ba8a91ea58913a426de90c34005a9c2970177232c8d95855f362b894defc774f7c488bff4338b9e44c9187fc0a0e9ea39
-
Filesize
821KB
MD529c245665d7ec2a067b0efba9761203a
SHA121bfecc123a349c6447b2bbaf54f2921015957b2
SHA2562c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e
SHA512e57f8ba651b21143633b3e5390ef585ba8a91ea58913a426de90c34005a9c2970177232c8d95855f362b894defc774f7c488bff4338b9e44c9187fc0a0e9ea39
-
Filesize
649KB
MD52c42a560131ee6b2322e729a2ff216b3
SHA11824ca61a858fd87d69d0c32e47c92bea4145943
SHA256b00259386069b7e0a13de23ad68449ae3d36e1174ed36221a96ab8f3af60aba3
SHA512f6ad6d2390bc63bff72bf0fe6df5fe3efff468900b36755275585aa11ca89c0d174736ebab1b5bce0e75015f91cba5f6264ab16c77888993eafc250584e70d66
-
Filesize
649KB
MD52c42a560131ee6b2322e729a2ff216b3
SHA11824ca61a858fd87d69d0c32e47c92bea4145943
SHA256b00259386069b7e0a13de23ad68449ae3d36e1174ed36221a96ab8f3af60aba3
SHA512f6ad6d2390bc63bff72bf0fe6df5fe3efff468900b36755275585aa11ca89c0d174736ebab1b5bce0e75015f91cba5f6264ab16c77888993eafc250584e70d66
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783
-
Filesize
1.7MB
MD5144dc3c0a5275a93ff86f00b5c61b9ec
SHA1784168ab3c4711737656ca13dc4cb59ca267fa45
SHA256179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787
SHA5129af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783