Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2023, 04:33

General

  • Target

    Cu8lr9EP.exe

  • Size

    1.5MB

  • MD5

    a40b80b9f9fe39308c0f10b152d4a715

  • SHA1

    04437d394376e70d5382e5d2e1e6e83b189ba21e

  • SHA256

    05e973761e44463f832a1d02a7ef7615686bfee5d9cf3d585c1c8f51b9d8a2d4

  • SHA512

    f12605a016ff14981bad6af43909aed27a9487f0a5841e63fddaa33f4b4dfb6d50b71bbd47132e7c84c7f62562d4ac4f5544bbf5ca6a027b142b5cadec793f86

  • SSDEEP

    24576:NyK+MXsdOLiQO3B/X8kt7YOzz4dBLcKPggKF83zfpJ5X2CBd8rA:oK+MXsdOcR/RSw4o23zRYr

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cu8lr9EP.exe
    "C:\Users\Admin\AppData\Local\Temp\Cu8lr9EP.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\On6gf7sK.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\On6gf7sK.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pM7ZO9FY.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pM7ZO9FY.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cp6MC2WP.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cp6MC2WP.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 268
                7⤵
                • Program crash
                PID:2096
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2908

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\On6gf7sK.exe

          Filesize

          1.3MB

          MD5

          3d50793e58f89962ddab66df07982fb0

          SHA1

          cef09074293ea5a1f28ab511f4c2ad7298209790

          SHA256

          b8f49f1427838335010672cc559f6445b71118af395e9656f14660e62e19eb05

          SHA512

          2b300e35011372657f1405bf669869597641d4411e0562088b51042658449ef14ed16beeef47a34b47fdfad875dedbde182e4883baf360c2bbfb13d65c7415cb

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\On6gf7sK.exe

          Filesize

          1.3MB

          MD5

          3d50793e58f89962ddab66df07982fb0

          SHA1

          cef09074293ea5a1f28ab511f4c2ad7298209790

          SHA256

          b8f49f1427838335010672cc559f6445b71118af395e9656f14660e62e19eb05

          SHA512

          2b300e35011372657f1405bf669869597641d4411e0562088b51042658449ef14ed16beeef47a34b47fdfad875dedbde182e4883baf360c2bbfb13d65c7415cb

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pM7ZO9FY.exe

          Filesize

          821KB

          MD5

          29c245665d7ec2a067b0efba9761203a

          SHA1

          21bfecc123a349c6447b2bbaf54f2921015957b2

          SHA256

          2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e

          SHA512

          e57f8ba651b21143633b3e5390ef585ba8a91ea58913a426de90c34005a9c2970177232c8d95855f362b894defc774f7c488bff4338b9e44c9187fc0a0e9ea39

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pM7ZO9FY.exe

          Filesize

          821KB

          MD5

          29c245665d7ec2a067b0efba9761203a

          SHA1

          21bfecc123a349c6447b2bbaf54f2921015957b2

          SHA256

          2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e

          SHA512

          e57f8ba651b21143633b3e5390ef585ba8a91ea58913a426de90c34005a9c2970177232c8d95855f362b894defc774f7c488bff4338b9e44c9187fc0a0e9ea39

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cp6MC2WP.exe

          Filesize

          649KB

          MD5

          2c42a560131ee6b2322e729a2ff216b3

          SHA1

          1824ca61a858fd87d69d0c32e47c92bea4145943

          SHA256

          b00259386069b7e0a13de23ad68449ae3d36e1174ed36221a96ab8f3af60aba3

          SHA512

          f6ad6d2390bc63bff72bf0fe6df5fe3efff468900b36755275585aa11ca89c0d174736ebab1b5bce0e75015f91cba5f6264ab16c77888993eafc250584e70d66

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cp6MC2WP.exe

          Filesize

          649KB

          MD5

          2c42a560131ee6b2322e729a2ff216b3

          SHA1

          1824ca61a858fd87d69d0c32e47c92bea4145943

          SHA256

          b00259386069b7e0a13de23ad68449ae3d36e1174ed36221a96ab8f3af60aba3

          SHA512

          f6ad6d2390bc63bff72bf0fe6df5fe3efff468900b36755275585aa11ca89c0d174736ebab1b5bce0e75015f91cba5f6264ab16c77888993eafc250584e70d66

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\On6gf7sK.exe

          Filesize

          1.3MB

          MD5

          3d50793e58f89962ddab66df07982fb0

          SHA1

          cef09074293ea5a1f28ab511f4c2ad7298209790

          SHA256

          b8f49f1427838335010672cc559f6445b71118af395e9656f14660e62e19eb05

          SHA512

          2b300e35011372657f1405bf669869597641d4411e0562088b51042658449ef14ed16beeef47a34b47fdfad875dedbde182e4883baf360c2bbfb13d65c7415cb

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\On6gf7sK.exe

          Filesize

          1.3MB

          MD5

          3d50793e58f89962ddab66df07982fb0

          SHA1

          cef09074293ea5a1f28ab511f4c2ad7298209790

          SHA256

          b8f49f1427838335010672cc559f6445b71118af395e9656f14660e62e19eb05

          SHA512

          2b300e35011372657f1405bf669869597641d4411e0562088b51042658449ef14ed16beeef47a34b47fdfad875dedbde182e4883baf360c2bbfb13d65c7415cb

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pM7ZO9FY.exe

          Filesize

          821KB

          MD5

          29c245665d7ec2a067b0efba9761203a

          SHA1

          21bfecc123a349c6447b2bbaf54f2921015957b2

          SHA256

          2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e

          SHA512

          e57f8ba651b21143633b3e5390ef585ba8a91ea58913a426de90c34005a9c2970177232c8d95855f362b894defc774f7c488bff4338b9e44c9187fc0a0e9ea39

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pM7ZO9FY.exe

          Filesize

          821KB

          MD5

          29c245665d7ec2a067b0efba9761203a

          SHA1

          21bfecc123a349c6447b2bbaf54f2921015957b2

          SHA256

          2c58ee580588f3af770bfbe1f4b90e3f3abc1db0635b5db9df6dc396c7e7666e

          SHA512

          e57f8ba651b21143633b3e5390ef585ba8a91ea58913a426de90c34005a9c2970177232c8d95855f362b894defc774f7c488bff4338b9e44c9187fc0a0e9ea39

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\cp6MC2WP.exe

          Filesize

          649KB

          MD5

          2c42a560131ee6b2322e729a2ff216b3

          SHA1

          1824ca61a858fd87d69d0c32e47c92bea4145943

          SHA256

          b00259386069b7e0a13de23ad68449ae3d36e1174ed36221a96ab8f3af60aba3

          SHA512

          f6ad6d2390bc63bff72bf0fe6df5fe3efff468900b36755275585aa11ca89c0d174736ebab1b5bce0e75015f91cba5f6264ab16c77888993eafc250584e70d66

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\cp6MC2WP.exe

          Filesize

          649KB

          MD5

          2c42a560131ee6b2322e729a2ff216b3

          SHA1

          1824ca61a858fd87d69d0c32e47c92bea4145943

          SHA256

          b00259386069b7e0a13de23ad68449ae3d36e1174ed36221a96ab8f3af60aba3

          SHA512

          f6ad6d2390bc63bff72bf0fe6df5fe3efff468900b36755275585aa11ca89c0d174736ebab1b5bce0e75015f91cba5f6264ab16c77888993eafc250584e70d66

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Vl72wS3.exe

          Filesize

          1.7MB

          MD5

          144dc3c0a5275a93ff86f00b5c61b9ec

          SHA1

          784168ab3c4711737656ca13dc4cb59ca267fa45

          SHA256

          179649325e561f83a53c5cba99cd8f1f589064c8d0f2029fb8e06f61ae986787

          SHA512

          9af6a9870077621eb046d6fed0fac88eba35edd4cd5e60f49c46018ab633d5cc77ddb9a93886178544198099a4e3b20726a32729ec9d1cf89524b4a579afb783

        • memory/2672-51-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2672-50-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2672-43-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2672-52-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2672-54-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2672-56-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2672-48-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2672-46-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2672-45-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2672-44-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB