Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 21:47
Static task
static1
Behavioral task
behavioral1
Sample
926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe
Resource
win10v2004-20230915-en
General
-
Target
926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe
-
Size
851KB
-
MD5
9dbcef9cf528357b319703d966bb5bf5
-
SHA1
f034496c250ef9e3a4ba819c725250b0eb0b213b
-
SHA256
926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a
-
SHA512
002e925c0bdf6d0f8817b7d28c20e6d0f9080273c5c85b5ccf7cf2bd7aec4b979648cbefec07ba070337744b6ec511a9bed7b89933031672689c1d1e6172688e
-
SSDEEP
12288:tMrBy90WvqMN3s1jCSO+/JT+ZOrOsb/zaHSL/3RpSXjVvdqxycjW0g9OV4UWuK8:kym6SjY+Bkux7z3j3TS3Cy2g+fWT8
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 9 IoCs
resource yara_rule behavioral1/memory/2704-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-57-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-61-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-62-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 364 x4645563.exe 2544 x1122828.exe 2868 x4805303.exe 2680 g1077811.exe -
Loads dropped DLL 13 IoCs
pid Process 2144 926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe 364 x4645563.exe 364 x4645563.exe 2544 x1122828.exe 2544 x1122828.exe 2868 x4805303.exe 2868 x4805303.exe 2868 x4805303.exe 2680 g1077811.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4805303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4645563.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1122828.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2680 set thread context of 2704 2680 g1077811.exe 36 -
Program crash 1 IoCs
pid pid_target Process procid_target 2780 2680 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2144 wrote to memory of 364 2144 926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe 30 PID 2144 wrote to memory of 364 2144 926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe 30 PID 2144 wrote to memory of 364 2144 926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe 30 PID 2144 wrote to memory of 364 2144 926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe 30 PID 2144 wrote to memory of 364 2144 926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe 30 PID 2144 wrote to memory of 364 2144 926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe 30 PID 2144 wrote to memory of 364 2144 926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe 30 PID 364 wrote to memory of 2544 364 x4645563.exe 31 PID 364 wrote to memory of 2544 364 x4645563.exe 31 PID 364 wrote to memory of 2544 364 x4645563.exe 31 PID 364 wrote to memory of 2544 364 x4645563.exe 31 PID 364 wrote to memory of 2544 364 x4645563.exe 31 PID 364 wrote to memory of 2544 364 x4645563.exe 31 PID 364 wrote to memory of 2544 364 x4645563.exe 31 PID 2544 wrote to memory of 2868 2544 x1122828.exe 32 PID 2544 wrote to memory of 2868 2544 x1122828.exe 32 PID 2544 wrote to memory of 2868 2544 x1122828.exe 32 PID 2544 wrote to memory of 2868 2544 x1122828.exe 32 PID 2544 wrote to memory of 2868 2544 x1122828.exe 32 PID 2544 wrote to memory of 2868 2544 x1122828.exe 32 PID 2544 wrote to memory of 2868 2544 x1122828.exe 32 PID 2868 wrote to memory of 2680 2868 x4805303.exe 33 PID 2868 wrote to memory of 2680 2868 x4805303.exe 33 PID 2868 wrote to memory of 2680 2868 x4805303.exe 33 PID 2868 wrote to memory of 2680 2868 x4805303.exe 33 PID 2868 wrote to memory of 2680 2868 x4805303.exe 33 PID 2868 wrote to memory of 2680 2868 x4805303.exe 33 PID 2868 wrote to memory of 2680 2868 x4805303.exe 33 PID 2680 wrote to memory of 2180 2680 g1077811.exe 35 PID 2680 wrote to memory of 2180 2680 g1077811.exe 35 PID 2680 wrote to memory of 2180 2680 g1077811.exe 35 PID 2680 wrote to memory of 2180 2680 g1077811.exe 35 PID 2680 wrote to memory of 2180 2680 g1077811.exe 35 PID 2680 wrote to memory of 2180 2680 g1077811.exe 35 PID 2680 wrote to memory of 2180 2680 g1077811.exe 35 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2704 2680 g1077811.exe 36 PID 2680 wrote to memory of 2780 2680 g1077811.exe 37 PID 2680 wrote to memory of 2780 2680 g1077811.exe 37 PID 2680 wrote to memory of 2780 2680 g1077811.exe 37 PID 2680 wrote to memory of 2780 2680 g1077811.exe 37 PID 2680 wrote to memory of 2780 2680 g1077811.exe 37 PID 2680 wrote to memory of 2780 2680 g1077811.exe 37 PID 2680 wrote to memory of 2780 2680 g1077811.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe"C:\Users\Admin\AppData\Local\Temp\926e1544f880ad87d377422e95ab3e5df6088ba2bc98f311f8c985fab5da600a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4645563.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4645563.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1122828.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1122828.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4805303.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4805303.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1077811.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1077811.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:2780
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5a97d9ffbe8bd805d5c4b1b72b938e8b7
SHA1ca102cd82505cf90cf10de08df332dc57462aa09
SHA25604c34323973598289e338be8a3cee08a454b1012626268c5f6919e34c3463a1b
SHA51225f8a71e80006c558619165b3ee0c5fac56df234f5f9012d41b5551f30036dc101282a5d86694f9b6f0c98ee725459b6e32ecf767b6cd7a2c60afb1f521fbf66
-
Filesize
750KB
MD5a97d9ffbe8bd805d5c4b1b72b938e8b7
SHA1ca102cd82505cf90cf10de08df332dc57462aa09
SHA25604c34323973598289e338be8a3cee08a454b1012626268c5f6919e34c3463a1b
SHA51225f8a71e80006c558619165b3ee0c5fac56df234f5f9012d41b5551f30036dc101282a5d86694f9b6f0c98ee725459b6e32ecf767b6cd7a2c60afb1f521fbf66
-
Filesize
518KB
MD5caf1263a0160ddc9f025cc4e76bb6b6b
SHA11c5ebb516257fc418e97d0c641b28871ca3be551
SHA2568beb2574dab826ef841006a86f6306dc0e2ca78f0b1b20ff55dfb4ea77c50c81
SHA5120bd1d31d6b1fb048c2abe87c6a68acae1823a8a18364f504a14a2f3529b79c124d6e73cf684c4d8437f5814a8144804ffb393711e3e84bb882f63738f7b1af4f
-
Filesize
518KB
MD5caf1263a0160ddc9f025cc4e76bb6b6b
SHA11c5ebb516257fc418e97d0c641b28871ca3be551
SHA2568beb2574dab826ef841006a86f6306dc0e2ca78f0b1b20ff55dfb4ea77c50c81
SHA5120bd1d31d6b1fb048c2abe87c6a68acae1823a8a18364f504a14a2f3529b79c124d6e73cf684c4d8437f5814a8144804ffb393711e3e84bb882f63738f7b1af4f
-
Filesize
352KB
MD5c85c50651621922adec0c8fe0cc5880a
SHA12af68b699df837fbb8e331ea239f97a9e6b6944b
SHA25698e6a892388b976efe80692f123e222074171963a2a3420ac38c3fe04fc87a1f
SHA512d49214749b737f25dd8b751f3a62c272fe36a5e1d6e925b619a5013ce7a89cb50fbc844d3d33d23f8522dcdff8cd907eb919a152feda209bd0550b02564d9f52
-
Filesize
352KB
MD5c85c50651621922adec0c8fe0cc5880a
SHA12af68b699df837fbb8e331ea239f97a9e6b6944b
SHA25698e6a892388b976efe80692f123e222074171963a2a3420ac38c3fe04fc87a1f
SHA512d49214749b737f25dd8b751f3a62c272fe36a5e1d6e925b619a5013ce7a89cb50fbc844d3d33d23f8522dcdff8cd907eb919a152feda209bd0550b02564d9f52
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4
-
Filesize
750KB
MD5a97d9ffbe8bd805d5c4b1b72b938e8b7
SHA1ca102cd82505cf90cf10de08df332dc57462aa09
SHA25604c34323973598289e338be8a3cee08a454b1012626268c5f6919e34c3463a1b
SHA51225f8a71e80006c558619165b3ee0c5fac56df234f5f9012d41b5551f30036dc101282a5d86694f9b6f0c98ee725459b6e32ecf767b6cd7a2c60afb1f521fbf66
-
Filesize
750KB
MD5a97d9ffbe8bd805d5c4b1b72b938e8b7
SHA1ca102cd82505cf90cf10de08df332dc57462aa09
SHA25604c34323973598289e338be8a3cee08a454b1012626268c5f6919e34c3463a1b
SHA51225f8a71e80006c558619165b3ee0c5fac56df234f5f9012d41b5551f30036dc101282a5d86694f9b6f0c98ee725459b6e32ecf767b6cd7a2c60afb1f521fbf66
-
Filesize
518KB
MD5caf1263a0160ddc9f025cc4e76bb6b6b
SHA11c5ebb516257fc418e97d0c641b28871ca3be551
SHA2568beb2574dab826ef841006a86f6306dc0e2ca78f0b1b20ff55dfb4ea77c50c81
SHA5120bd1d31d6b1fb048c2abe87c6a68acae1823a8a18364f504a14a2f3529b79c124d6e73cf684c4d8437f5814a8144804ffb393711e3e84bb882f63738f7b1af4f
-
Filesize
518KB
MD5caf1263a0160ddc9f025cc4e76bb6b6b
SHA11c5ebb516257fc418e97d0c641b28871ca3be551
SHA2568beb2574dab826ef841006a86f6306dc0e2ca78f0b1b20ff55dfb4ea77c50c81
SHA5120bd1d31d6b1fb048c2abe87c6a68acae1823a8a18364f504a14a2f3529b79c124d6e73cf684c4d8437f5814a8144804ffb393711e3e84bb882f63738f7b1af4f
-
Filesize
352KB
MD5c85c50651621922adec0c8fe0cc5880a
SHA12af68b699df837fbb8e331ea239f97a9e6b6944b
SHA25698e6a892388b976efe80692f123e222074171963a2a3420ac38c3fe04fc87a1f
SHA512d49214749b737f25dd8b751f3a62c272fe36a5e1d6e925b619a5013ce7a89cb50fbc844d3d33d23f8522dcdff8cd907eb919a152feda209bd0550b02564d9f52
-
Filesize
352KB
MD5c85c50651621922adec0c8fe0cc5880a
SHA12af68b699df837fbb8e331ea239f97a9e6b6944b
SHA25698e6a892388b976efe80692f123e222074171963a2a3420ac38c3fe04fc87a1f
SHA512d49214749b737f25dd8b751f3a62c272fe36a5e1d6e925b619a5013ce7a89cb50fbc844d3d33d23f8522dcdff8cd907eb919a152feda209bd0550b02564d9f52
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4
-
Filesize
280KB
MD507693f0717cb9bb086b667be73e70d5b
SHA1dcae8c0372083bf335e77811127841d39fb8f730
SHA256467a0f07ef769aa31a7e7c119ec9f9b062d8d2306e823d24b4621e8c7d8e8b86
SHA512629f59ce72bfd4e31f813e9685377e20a46101483a0e8c3c3ac0d1c71a747d0f58b424701269935428ef2e33341b6e63b07909eb893323c6f50e33b7c928ceb4