Analysis
-
max time kernel
107s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
06/10/2023, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
cb4a5a54c98e2797e55f739bcea590d4ddbe247690eaba064ec4f38fa9e06e9c.exe
Resource
win10-20230915-en
General
-
Target
cb4a5a54c98e2797e55f739bcea590d4ddbe247690eaba064ec4f38fa9e06e9c.exe
-
Size
1.2MB
-
MD5
2642fefc48b0172a5298b347d2198e6f
-
SHA1
7abdbfaebfceecdc06bb6ad34961084d81dc7f10
-
SHA256
cb4a5a54c98e2797e55f739bcea590d4ddbe247690eaba064ec4f38fa9e06e9c
-
SHA512
3027e0dfa0a6534638862f53216784f80a497522ab9deb6f0c7efb02f8f03b73976e0023711ed61b555a8b52faf5fd259f724c55567810f342ace84d729203e1
-
SSDEEP
24576:vyERi4YBavqCwG7aJfvOKGyGOZY02LvWfAokcmTahN5UnWTFH:6EPUavvwGCzGPF02nckahNQWT
Malware Config
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/2488-35-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2488-38-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2488-39-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2488-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 5 IoCs
pid Process 3604 aJ7NF7ru.exe 4416 By6aT2VU.exe 3508 xQ7Ew6yI.exe 232 zy8Jo4qv.exe 2980 1TL52Wd3.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" By6aT2VU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" xQ7Ew6yI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" zy8Jo4qv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb4a5a54c98e2797e55f739bcea590d4ddbe247690eaba064ec4f38fa9e06e9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" aJ7NF7ru.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2980 set thread context of 2488 2980 1TL52Wd3.exe 77 -
Program crash 2 IoCs
pid pid_target Process procid_target 244 2980 WerFault.exe 74 208 2488 WerFault.exe 77 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3604 4820 cb4a5a54c98e2797e55f739bcea590d4ddbe247690eaba064ec4f38fa9e06e9c.exe 70 PID 4820 wrote to memory of 3604 4820 cb4a5a54c98e2797e55f739bcea590d4ddbe247690eaba064ec4f38fa9e06e9c.exe 70 PID 4820 wrote to memory of 3604 4820 cb4a5a54c98e2797e55f739bcea590d4ddbe247690eaba064ec4f38fa9e06e9c.exe 70 PID 3604 wrote to memory of 4416 3604 aJ7NF7ru.exe 71 PID 3604 wrote to memory of 4416 3604 aJ7NF7ru.exe 71 PID 3604 wrote to memory of 4416 3604 aJ7NF7ru.exe 71 PID 4416 wrote to memory of 3508 4416 By6aT2VU.exe 72 PID 4416 wrote to memory of 3508 4416 By6aT2VU.exe 72 PID 4416 wrote to memory of 3508 4416 By6aT2VU.exe 72 PID 3508 wrote to memory of 232 3508 xQ7Ew6yI.exe 73 PID 3508 wrote to memory of 232 3508 xQ7Ew6yI.exe 73 PID 3508 wrote to memory of 232 3508 xQ7Ew6yI.exe 73 PID 232 wrote to memory of 2980 232 zy8Jo4qv.exe 74 PID 232 wrote to memory of 2980 232 zy8Jo4qv.exe 74 PID 232 wrote to memory of 2980 232 zy8Jo4qv.exe 74 PID 2980 wrote to memory of 4912 2980 1TL52Wd3.exe 76 PID 2980 wrote to memory of 4912 2980 1TL52Wd3.exe 76 PID 2980 wrote to memory of 4912 2980 1TL52Wd3.exe 76 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77 PID 2980 wrote to memory of 2488 2980 1TL52Wd3.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb4a5a54c98e2797e55f739bcea590d4ddbe247690eaba064ec4f38fa9e06e9c.exe"C:\Users\Admin\AppData\Local\Temp\cb4a5a54c98e2797e55f739bcea590d4ddbe247690eaba064ec4f38fa9e06e9c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aJ7NF7ru.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aJ7NF7ru.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\By6aT2VU.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\By6aT2VU.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xQ7Ew6yI.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xQ7Ew6yI.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zy8Jo4qv.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zy8Jo4qv.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1TL52Wd3.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1TL52Wd3.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 2008⤵
- Program crash
PID:208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 5967⤵
- Program crash
PID:244
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD56d5e6e51d5e2b11332bce027bcc89200
SHA155b8455e2e2b461c37bd7e760108c1911dd8e8ae
SHA25660caf06b295869c0120e47fca1f6706ef78deb5e9969eb6e3ef4db52724f097c
SHA51255e01cc49b7e3501b77f85022335842abdcf8cc74326adec897604a3da1b6b311fbc0fe9740e4ad458c1595b63f07993af19ee7998638eea35c057b905be79a4
-
Filesize
1.0MB
MD56d5e6e51d5e2b11332bce027bcc89200
SHA155b8455e2e2b461c37bd7e760108c1911dd8e8ae
SHA25660caf06b295869c0120e47fca1f6706ef78deb5e9969eb6e3ef4db52724f097c
SHA51255e01cc49b7e3501b77f85022335842abdcf8cc74326adec897604a3da1b6b311fbc0fe9740e4ad458c1595b63f07993af19ee7998638eea35c057b905be79a4
-
Filesize
884KB
MD5db479b2d2aa54b899435d96e6db02f25
SHA15ba1ca3905b544dc2297e705a55e6349abf36552
SHA25659889d0962f263120b2fd4942f0049ab94cb716187af2eb6e54aae20f83a7bf1
SHA5125d0db93d1238d168620778e6b7bcd63316933f5a334c59da9bb979486a7f1023221d140a32fc89bb1aa1d67b480da0ac8f5c4e769ed547440ec04b2cd18647fd
-
Filesize
884KB
MD5db479b2d2aa54b899435d96e6db02f25
SHA15ba1ca3905b544dc2297e705a55e6349abf36552
SHA25659889d0962f263120b2fd4942f0049ab94cb716187af2eb6e54aae20f83a7bf1
SHA5125d0db93d1238d168620778e6b7bcd63316933f5a334c59da9bb979486a7f1023221d140a32fc89bb1aa1d67b480da0ac8f5c4e769ed547440ec04b2cd18647fd
-
Filesize
590KB
MD5adc522edb12c5a240e65ba7c2d03e09a
SHA18f39412d6b45da532193a08b3f28dcb9c32b9047
SHA256d107f3b3f8fc1caf9e3fb7313aff723b03b6591a3efed8502db42654bba0a506
SHA5122c29dcf72ca52d9458ed1d512563a8c0b2099ea61d2642c2634c059df37aa68fe1e8ff4e5105d0a0183dcbaf229be5249ceed07c472b72ecbddabf9e0b372b29
-
Filesize
590KB
MD5adc522edb12c5a240e65ba7c2d03e09a
SHA18f39412d6b45da532193a08b3f28dcb9c32b9047
SHA256d107f3b3f8fc1caf9e3fb7313aff723b03b6591a3efed8502db42654bba0a506
SHA5122c29dcf72ca52d9458ed1d512563a8c0b2099ea61d2642c2634c059df37aa68fe1e8ff4e5105d0a0183dcbaf229be5249ceed07c472b72ecbddabf9e0b372b29
-
Filesize
417KB
MD59b7369e025b67bd1cbb73de74b5ef95e
SHA1e8cdbddf887cfc45f823a179b62ecd62e58ffbcd
SHA2564eebe7f7142f78c017c88b146561de34ba6d20d9a08089ed944b937405c47d3e
SHA512579d0589f7ff18691ffa295386e6c98c9674dc81287da2391ab27cd202929d88c294aa71aaccb8a8cb953f083f22796176b04ba3cec114d4b999c16407866bbf
-
Filesize
417KB
MD59b7369e025b67bd1cbb73de74b5ef95e
SHA1e8cdbddf887cfc45f823a179b62ecd62e58ffbcd
SHA2564eebe7f7142f78c017c88b146561de34ba6d20d9a08089ed944b937405c47d3e
SHA512579d0589f7ff18691ffa295386e6c98c9674dc81287da2391ab27cd202929d88c294aa71aaccb8a8cb953f083f22796176b04ba3cec114d4b999c16407866bbf
-
Filesize
378KB
MD5c108bb41522629415c858f5f93d7649d
SHA1f1f6ab083fec50434c820057208a331f858cfb72
SHA256c8ea06545eb28cf446dd8287c5b1e3a7d677ea5749aa2dcc37a85a776879bd32
SHA512c86cae7de34e9262436e6bb020903bb2bbf67434a36c8e5a17803d4b2785521c2eafb243b631d700eb13c58ea2883cfa0ee71418d91c2a6a0639ee69abba547b
-
Filesize
378KB
MD5c108bb41522629415c858f5f93d7649d
SHA1f1f6ab083fec50434c820057208a331f858cfb72
SHA256c8ea06545eb28cf446dd8287c5b1e3a7d677ea5749aa2dcc37a85a776879bd32
SHA512c86cae7de34e9262436e6bb020903bb2bbf67434a36c8e5a17803d4b2785521c2eafb243b631d700eb13c58ea2883cfa0ee71418d91c2a6a0639ee69abba547b