Analysis

  • max time kernel
    117s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:32

General

  • Target

    3376322cfedda694dd91728d92044ba1ea6dd088c659990d2f7eb621389ef32b.exe

  • Size

    994KB

  • MD5

    5b9f2eb3442a28cf46eca244771523ae

  • SHA1

    ce4e50cfe3f2eafe2be2ec3c2e4cf418690a2a8f

  • SHA256

    3376322cfedda694dd91728d92044ba1ea6dd088c659990d2f7eb621389ef32b

  • SHA512

    a788db3143e7bd9d54ecb25cf6038ff30ba78d783e362f184c98b8fb331f012c34554d3ef470909df04b8716a8ee56f708fdf88d28e0eb4afa1bef11c38c7478

  • SSDEEP

    24576:vyASz4wcIJd0tcPtoXP2qy6dBzDblmAo75AXIw0sn:6Xc8Jd0SPtAPhtmTpZ

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3376322cfedda694dd91728d92044ba1ea6dd088c659990d2f7eb621389ef32b.exe
    "C:\Users\Admin\AppData\Local\Temp\3376322cfedda694dd91728d92044ba1ea6dd088c659990d2f7eb621389ef32b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5204132.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5204132.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7700613.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7700613.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2232
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1070517.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1070517.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2345385.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2345385.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4735683.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4735683.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2968
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2532
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2544
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 268
                  8⤵
                  • Program crash
                  PID:2472
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5204132.exe
    Filesize

    892KB

    MD5

    22f6db1b4aad47ab4da9ba2e36c5d1c8

    SHA1

    126209f6155eaea2c1db8ffc7d3aefb3397575f0

    SHA256

    120c4cd24f21b90709afe62e214433429405125162d41f1734e7d6b12c1b5deb

    SHA512

    4a3cb8b5d91b5891102199faf964f3a82939a4424ec4a621e1184095e6fc22dff662be7d7aea8f3f7ead1ad63da233efd5869bc12397613df3f96fa928f7a9a2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5204132.exe
    Filesize

    892KB

    MD5

    22f6db1b4aad47ab4da9ba2e36c5d1c8

    SHA1

    126209f6155eaea2c1db8ffc7d3aefb3397575f0

    SHA256

    120c4cd24f21b90709afe62e214433429405125162d41f1734e7d6b12c1b5deb

    SHA512

    4a3cb8b5d91b5891102199faf964f3a82939a4424ec4a621e1184095e6fc22dff662be7d7aea8f3f7ead1ad63da233efd5869bc12397613df3f96fa928f7a9a2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7700613.exe
    Filesize

    709KB

    MD5

    e18f7d3cc38e426425e232144c9f1d9e

    SHA1

    c698ac6ffd857634c42d52cca838488628a350c3

    SHA256

    8732a3667c61716f0b163886a37b528cb9ed2150ae0e8d8edcfaed54883cc069

    SHA512

    fd1b885103e930436dd0f0664452d11d9b6bcf8b7f69566b7f73b5f53abdb5965db85493b89b2bb0b3cd2d0efc15f155de188ec89e0b0ba047af6dce52d5c6c7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7700613.exe
    Filesize

    709KB

    MD5

    e18f7d3cc38e426425e232144c9f1d9e

    SHA1

    c698ac6ffd857634c42d52cca838488628a350c3

    SHA256

    8732a3667c61716f0b163886a37b528cb9ed2150ae0e8d8edcfaed54883cc069

    SHA512

    fd1b885103e930436dd0f0664452d11d9b6bcf8b7f69566b7f73b5f53abdb5965db85493b89b2bb0b3cd2d0efc15f155de188ec89e0b0ba047af6dce52d5c6c7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1070517.exe
    Filesize

    527KB

    MD5

    b4f746dc85238c2f5fc3eb143826d36d

    SHA1

    c096c5bf2f90a9e50e64c89a4926679f4caac7ce

    SHA256

    2e77a90f87d75a5fb04c3b0229954e8ea7d780abc889302a9db545972d444791

    SHA512

    ce55507ac73a1c04e6856d25139631d7e87bb944b4ee35517daeabf5730b03de774c76b2a9e416f80d03a3c4f2489d5e4c9c69943b5c898b66971e5539286dee

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1070517.exe
    Filesize

    527KB

    MD5

    b4f746dc85238c2f5fc3eb143826d36d

    SHA1

    c096c5bf2f90a9e50e64c89a4926679f4caac7ce

    SHA256

    2e77a90f87d75a5fb04c3b0229954e8ea7d780abc889302a9db545972d444791

    SHA512

    ce55507ac73a1c04e6856d25139631d7e87bb944b4ee35517daeabf5730b03de774c76b2a9e416f80d03a3c4f2489d5e4c9c69943b5c898b66971e5539286dee

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2345385.exe
    Filesize

    296KB

    MD5

    80dd8cdb05c18d6fa526cf663182aeaf

    SHA1

    3947197f3890ed06ffe62f0aee93c2519f7cbe49

    SHA256

    880a0f9e8b37c5821410bf4c3870907079348726a3046dc6c2f4ccabb2f400bd

    SHA512

    c0327dfe0abeea8772366a85895e7f76ccc548990c730d199117217f9de2f69d509d22373245d8c9df2b76659a259dfe47097ed84f6967f96579e3ec4e358df2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2345385.exe
    Filesize

    296KB

    MD5

    80dd8cdb05c18d6fa526cf663182aeaf

    SHA1

    3947197f3890ed06ffe62f0aee93c2519f7cbe49

    SHA256

    880a0f9e8b37c5821410bf4c3870907079348726a3046dc6c2f4ccabb2f400bd

    SHA512

    c0327dfe0abeea8772366a85895e7f76ccc548990c730d199117217f9de2f69d509d22373245d8c9df2b76659a259dfe47097ed84f6967f96579e3ec4e358df2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4735683.exe
    Filesize

    11KB

    MD5

    87bca1502cbbf4ea0298eca7ddbc53a2

    SHA1

    c4da14d33fc2e227ae1e2a5169aeb0efd74dab96

    SHA256

    2bbaf77f750776e75f15e4a6ccf6d9498248aaece5a476115536e668b4feef31

    SHA512

    f290eb79d3ec7218504378f9f5b0fa596ceab95b0ef404825875caf56bd090ad0957655945a715fa017d2c57aa90b8b994930c445953cce00b529de797afa9de

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4735683.exe
    Filesize

    11KB

    MD5

    87bca1502cbbf4ea0298eca7ddbc53a2

    SHA1

    c4da14d33fc2e227ae1e2a5169aeb0efd74dab96

    SHA256

    2bbaf77f750776e75f15e4a6ccf6d9498248aaece5a476115536e668b4feef31

    SHA512

    f290eb79d3ec7218504378f9f5b0fa596ceab95b0ef404825875caf56bd090ad0957655945a715fa017d2c57aa90b8b994930c445953cce00b529de797afa9de

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5204132.exe
    Filesize

    892KB

    MD5

    22f6db1b4aad47ab4da9ba2e36c5d1c8

    SHA1

    126209f6155eaea2c1db8ffc7d3aefb3397575f0

    SHA256

    120c4cd24f21b90709afe62e214433429405125162d41f1734e7d6b12c1b5deb

    SHA512

    4a3cb8b5d91b5891102199faf964f3a82939a4424ec4a621e1184095e6fc22dff662be7d7aea8f3f7ead1ad63da233efd5869bc12397613df3f96fa928f7a9a2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z5204132.exe
    Filesize

    892KB

    MD5

    22f6db1b4aad47ab4da9ba2e36c5d1c8

    SHA1

    126209f6155eaea2c1db8ffc7d3aefb3397575f0

    SHA256

    120c4cd24f21b90709afe62e214433429405125162d41f1734e7d6b12c1b5deb

    SHA512

    4a3cb8b5d91b5891102199faf964f3a82939a4424ec4a621e1184095e6fc22dff662be7d7aea8f3f7ead1ad63da233efd5869bc12397613df3f96fa928f7a9a2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7700613.exe
    Filesize

    709KB

    MD5

    e18f7d3cc38e426425e232144c9f1d9e

    SHA1

    c698ac6ffd857634c42d52cca838488628a350c3

    SHA256

    8732a3667c61716f0b163886a37b528cb9ed2150ae0e8d8edcfaed54883cc069

    SHA512

    fd1b885103e930436dd0f0664452d11d9b6bcf8b7f69566b7f73b5f53abdb5965db85493b89b2bb0b3cd2d0efc15f155de188ec89e0b0ba047af6dce52d5c6c7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7700613.exe
    Filesize

    709KB

    MD5

    e18f7d3cc38e426425e232144c9f1d9e

    SHA1

    c698ac6ffd857634c42d52cca838488628a350c3

    SHA256

    8732a3667c61716f0b163886a37b528cb9ed2150ae0e8d8edcfaed54883cc069

    SHA512

    fd1b885103e930436dd0f0664452d11d9b6bcf8b7f69566b7f73b5f53abdb5965db85493b89b2bb0b3cd2d0efc15f155de188ec89e0b0ba047af6dce52d5c6c7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1070517.exe
    Filesize

    527KB

    MD5

    b4f746dc85238c2f5fc3eb143826d36d

    SHA1

    c096c5bf2f90a9e50e64c89a4926679f4caac7ce

    SHA256

    2e77a90f87d75a5fb04c3b0229954e8ea7d780abc889302a9db545972d444791

    SHA512

    ce55507ac73a1c04e6856d25139631d7e87bb944b4ee35517daeabf5730b03de774c76b2a9e416f80d03a3c4f2489d5e4c9c69943b5c898b66971e5539286dee

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1070517.exe
    Filesize

    527KB

    MD5

    b4f746dc85238c2f5fc3eb143826d36d

    SHA1

    c096c5bf2f90a9e50e64c89a4926679f4caac7ce

    SHA256

    2e77a90f87d75a5fb04c3b0229954e8ea7d780abc889302a9db545972d444791

    SHA512

    ce55507ac73a1c04e6856d25139631d7e87bb944b4ee35517daeabf5730b03de774c76b2a9e416f80d03a3c4f2489d5e4c9c69943b5c898b66971e5539286dee

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2345385.exe
    Filesize

    296KB

    MD5

    80dd8cdb05c18d6fa526cf663182aeaf

    SHA1

    3947197f3890ed06ffe62f0aee93c2519f7cbe49

    SHA256

    880a0f9e8b37c5821410bf4c3870907079348726a3046dc6c2f4ccabb2f400bd

    SHA512

    c0327dfe0abeea8772366a85895e7f76ccc548990c730d199117217f9de2f69d509d22373245d8c9df2b76659a259dfe47097ed84f6967f96579e3ec4e358df2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2345385.exe
    Filesize

    296KB

    MD5

    80dd8cdb05c18d6fa526cf663182aeaf

    SHA1

    3947197f3890ed06ffe62f0aee93c2519f7cbe49

    SHA256

    880a0f9e8b37c5821410bf4c3870907079348726a3046dc6c2f4ccabb2f400bd

    SHA512

    c0327dfe0abeea8772366a85895e7f76ccc548990c730d199117217f9de2f69d509d22373245d8c9df2b76659a259dfe47097ed84f6967f96579e3ec4e358df2

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4735683.exe
    Filesize

    11KB

    MD5

    87bca1502cbbf4ea0298eca7ddbc53a2

    SHA1

    c4da14d33fc2e227ae1e2a5169aeb0efd74dab96

    SHA256

    2bbaf77f750776e75f15e4a6ccf6d9498248aaece5a476115536e668b4feef31

    SHA512

    f290eb79d3ec7218504378f9f5b0fa596ceab95b0ef404825875caf56bd090ad0957655945a715fa017d2c57aa90b8b994930c445953cce00b529de797afa9de

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9824264.exe
    Filesize

    276KB

    MD5

    e9c65307dba7d87b7ac8e49ea5ba6758

    SHA1

    984039a9ca9eed0182af4289dc678766e379effe

    SHA256

    8b3430bd17a680aeac9356bb85789ea2f54ab426a252a710671137f352587ea8

    SHA512

    5cbee97f93dde5712802dead624444dfb21cc37704356432e2115e422bd5fdd10544290b3ff5a50e4503df8ce2046141afeb1926233694c02621a24668854b78

  • memory/2544-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2544-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2544-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2544-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2544-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2544-67-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2544-68-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2544-69-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2544-71-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2544-73-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2968-51-0x000007FEF5750000-0x000007FEF613C000-memory.dmp
    Filesize

    9.9MB

  • memory/2968-50-0x000007FEF5750000-0x000007FEF613C000-memory.dmp
    Filesize

    9.9MB

  • memory/2968-49-0x000007FEF5750000-0x000007FEF613C000-memory.dmp
    Filesize

    9.9MB

  • memory/2968-48-0x0000000000220000-0x000000000022A000-memory.dmp
    Filesize

    40KB