Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 08:33

General

  • Target

    913aec7dc792e606551464e3203a1545bed4f032de9dfced990183fa65c53360.exe

  • Size

    1.1MB

  • MD5

    97db5929795af713a29da7ee311097b6

  • SHA1

    4edbba98c44d3e0871144507e076afca15bb34d2

  • SHA256

    913aec7dc792e606551464e3203a1545bed4f032de9dfced990183fa65c53360

  • SHA512

    dfaceddde78a58b7a5957961496c2e5b81106ed0b1d2dbd439548ba90f21515e43a9dc69bb5aa0e5b33199c92d1ef9aff34b099641fd2ca4cb382e6546b6ecbf

  • SSDEEP

    24576:lyLFc4gILHSFdApaMPP+3jauS/PHOb7LnssG3Ge1:ALMLdM+zauSHYst

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\913aec7dc792e606551464e3203a1545bed4f032de9dfced990183fa65c53360.exe
    "C:\Users\Admin\AppData\Local\Temp\913aec7dc792e606551464e3203a1545bed4f032de9dfced990183fa65c53360.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xm8nn94.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xm8nn94.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN9yW71.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN9yW71.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2148
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rs1OO36.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rs1OO36.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xr29Lp5.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xr29Lp5.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2528
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2460
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 268
                7⤵
                • Program crash
                PID:2920
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2808

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xm8nn94.exe
    Filesize

    990KB

    MD5

    ad691ad7425eb9ddd93f2ec0a27fcb89

    SHA1

    36a9a7324a3fb6cb5fb85e2b39b87f4fbb553843

    SHA256

    48868889675750f3313858a20c7f6c0d6e15e8f072c58ece647c458a01891c18

    SHA512

    97ef58803109c1a9c6d0e68bf10933cc27621a4a36aca5723595a4ecd2bc2eda2d1748b9038028a2112fb5cc482ac6d35aef3e1b845d1f5896fce4d4ac42f145

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Xm8nn94.exe
    Filesize

    990KB

    MD5

    ad691ad7425eb9ddd93f2ec0a27fcb89

    SHA1

    36a9a7324a3fb6cb5fb85e2b39b87f4fbb553843

    SHA256

    48868889675750f3313858a20c7f6c0d6e15e8f072c58ece647c458a01891c18

    SHA512

    97ef58803109c1a9c6d0e68bf10933cc27621a4a36aca5723595a4ecd2bc2eda2d1748b9038028a2112fb5cc482ac6d35aef3e1b845d1f5896fce4d4ac42f145

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN9yW71.exe
    Filesize

    696KB

    MD5

    b616a3fb6d48235e8b38802b7c873f99

    SHA1

    23c7991417def6308aabcba5f1fd3dff5ec73d68

    SHA256

    8cf4b1d80b4034b59767299a7669dd039cf9c80ed3f9a72be5c09a897dc85763

    SHA512

    452c508ddaeeda7bec66522cf0c8d52790c9fbd719148245c8e0991d6e87b32a7f956c86a985bcc510298f181e17db1ca9ca76652bcc68e55c290f0399a29bb9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN9yW71.exe
    Filesize

    696KB

    MD5

    b616a3fb6d48235e8b38802b7c873f99

    SHA1

    23c7991417def6308aabcba5f1fd3dff5ec73d68

    SHA256

    8cf4b1d80b4034b59767299a7669dd039cf9c80ed3f9a72be5c09a897dc85763

    SHA512

    452c508ddaeeda7bec66522cf0c8d52790c9fbd719148245c8e0991d6e87b32a7f956c86a985bcc510298f181e17db1ca9ca76652bcc68e55c290f0399a29bb9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rs1OO36.exe
    Filesize

    452KB

    MD5

    39526e106dbda09d8e555a0ff20f30d0

    SHA1

    a91b8cf366ff6fb255556160147aca84a2531ec8

    SHA256

    5d2993b3c14eb3f833d52e4874f37ee17b3eeb5d75594bb31700eeb723ec95f9

    SHA512

    ecabf935ad68fa4ff5a0791092d34f356850dec9c893f3f22c0c443353cec50aecf12a9957f4951d3f32c5362541a4a1dd87c90c6d81573cd9ab6baf84d9aca1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rs1OO36.exe
    Filesize

    452KB

    MD5

    39526e106dbda09d8e555a0ff20f30d0

    SHA1

    a91b8cf366ff6fb255556160147aca84a2531ec8

    SHA256

    5d2993b3c14eb3f833d52e4874f37ee17b3eeb5d75594bb31700eeb723ec95f9

    SHA512

    ecabf935ad68fa4ff5a0791092d34f356850dec9c893f3f22c0c443353cec50aecf12a9957f4951d3f32c5362541a4a1dd87c90c6d81573cd9ab6baf84d9aca1

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xr29Lp5.exe
    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xr29Lp5.exe
    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Xm8nn94.exe
    Filesize

    990KB

    MD5

    ad691ad7425eb9ddd93f2ec0a27fcb89

    SHA1

    36a9a7324a3fb6cb5fb85e2b39b87f4fbb553843

    SHA256

    48868889675750f3313858a20c7f6c0d6e15e8f072c58ece647c458a01891c18

    SHA512

    97ef58803109c1a9c6d0e68bf10933cc27621a4a36aca5723595a4ecd2bc2eda2d1748b9038028a2112fb5cc482ac6d35aef3e1b845d1f5896fce4d4ac42f145

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Xm8nn94.exe
    Filesize

    990KB

    MD5

    ad691ad7425eb9ddd93f2ec0a27fcb89

    SHA1

    36a9a7324a3fb6cb5fb85e2b39b87f4fbb553843

    SHA256

    48868889675750f3313858a20c7f6c0d6e15e8f072c58ece647c458a01891c18

    SHA512

    97ef58803109c1a9c6d0e68bf10933cc27621a4a36aca5723595a4ecd2bc2eda2d1748b9038028a2112fb5cc482ac6d35aef3e1b845d1f5896fce4d4ac42f145

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\aN9yW71.exe
    Filesize

    696KB

    MD5

    b616a3fb6d48235e8b38802b7c873f99

    SHA1

    23c7991417def6308aabcba5f1fd3dff5ec73d68

    SHA256

    8cf4b1d80b4034b59767299a7669dd039cf9c80ed3f9a72be5c09a897dc85763

    SHA512

    452c508ddaeeda7bec66522cf0c8d52790c9fbd719148245c8e0991d6e87b32a7f956c86a985bcc510298f181e17db1ca9ca76652bcc68e55c290f0399a29bb9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\aN9yW71.exe
    Filesize

    696KB

    MD5

    b616a3fb6d48235e8b38802b7c873f99

    SHA1

    23c7991417def6308aabcba5f1fd3dff5ec73d68

    SHA256

    8cf4b1d80b4034b59767299a7669dd039cf9c80ed3f9a72be5c09a897dc85763

    SHA512

    452c508ddaeeda7bec66522cf0c8d52790c9fbd719148245c8e0991d6e87b32a7f956c86a985bcc510298f181e17db1ca9ca76652bcc68e55c290f0399a29bb9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\rs1OO36.exe
    Filesize

    452KB

    MD5

    39526e106dbda09d8e555a0ff20f30d0

    SHA1

    a91b8cf366ff6fb255556160147aca84a2531ec8

    SHA256

    5d2993b3c14eb3f833d52e4874f37ee17b3eeb5d75594bb31700eeb723ec95f9

    SHA512

    ecabf935ad68fa4ff5a0791092d34f356850dec9c893f3f22c0c443353cec50aecf12a9957f4951d3f32c5362541a4a1dd87c90c6d81573cd9ab6baf84d9aca1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\rs1OO36.exe
    Filesize

    452KB

    MD5

    39526e106dbda09d8e555a0ff20f30d0

    SHA1

    a91b8cf366ff6fb255556160147aca84a2531ec8

    SHA256

    5d2993b3c14eb3f833d52e4874f37ee17b3eeb5d75594bb31700eeb723ec95f9

    SHA512

    ecabf935ad68fa4ff5a0791092d34f356850dec9c893f3f22c0c443353cec50aecf12a9957f4951d3f32c5362541a4a1dd87c90c6d81573cd9ab6baf84d9aca1

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1xr29Lp5.exe
    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1xr29Lp5.exe
    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ti1092.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • memory/2460-79-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2460-80-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2460-90-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2460-88-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2460-86-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2460-84-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2460-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2460-83-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2460-82-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2460-81-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2660-57-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-65-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-47-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-45-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-51-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-53-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-55-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-59-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-63-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-49-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-67-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-69-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-61-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-43-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-42-0x0000000000480000-0x0000000000496000-memory.dmp
    Filesize

    88KB

  • memory/2660-41-0x0000000000480000-0x000000000049C000-memory.dmp
    Filesize

    112KB

  • memory/2660-40-0x00000000003D0000-0x00000000003EE000-memory.dmp
    Filesize

    120KB