Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe
Resource
win10v2004-20230915-en
General
-
Target
d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe
-
Size
929KB
-
MD5
322d54f130984ebd42d58b50989042be
-
SHA1
6ecf4dea87e49e629285124a51bd3fa36ac6541c
-
SHA256
d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c
-
SHA512
c81e1e581586fe3e037dff3b748371294cc56b559ca88ab65afc21e9f209381042565756c77efc62c17b0e21461afc328ad8729aab1b9cce1dcb5c5698747eeb
-
SSDEEP
12288:aMrKy900Fl3QTY/eagDILhz7s8I60T+CgarW4WkFOzXRz1DVOtesHAWGfxCUETC8:UyPPaiesFIggHVUXRNVOtesgLpCARy
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 8 IoCs
resource yara_rule behavioral1/memory/2992-51-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2992-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2992-53-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2992-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2992-58-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2992-60-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2992-61-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2992-65-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2604 x2322352.exe 1392 x2281247.exe 2168 x7891445.exe 2664 g4492398.exe -
Loads dropped DLL 13 IoCs
pid Process 320 d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe 2604 x2322352.exe 2604 x2322352.exe 1392 x2281247.exe 1392 x2281247.exe 2168 x7891445.exe 2168 x7891445.exe 2168 x7891445.exe 2664 g4492398.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2322352.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2281247.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7891445.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2664 set thread context of 2992 2664 g4492398.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2468 2664 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 320 wrote to memory of 2604 320 d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe 28 PID 320 wrote to memory of 2604 320 d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe 28 PID 320 wrote to memory of 2604 320 d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe 28 PID 320 wrote to memory of 2604 320 d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe 28 PID 320 wrote to memory of 2604 320 d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe 28 PID 320 wrote to memory of 2604 320 d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe 28 PID 320 wrote to memory of 2604 320 d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe 28 PID 2604 wrote to memory of 1392 2604 x2322352.exe 29 PID 2604 wrote to memory of 1392 2604 x2322352.exe 29 PID 2604 wrote to memory of 1392 2604 x2322352.exe 29 PID 2604 wrote to memory of 1392 2604 x2322352.exe 29 PID 2604 wrote to memory of 1392 2604 x2322352.exe 29 PID 2604 wrote to memory of 1392 2604 x2322352.exe 29 PID 2604 wrote to memory of 1392 2604 x2322352.exe 29 PID 1392 wrote to memory of 2168 1392 x2281247.exe 30 PID 1392 wrote to memory of 2168 1392 x2281247.exe 30 PID 1392 wrote to memory of 2168 1392 x2281247.exe 30 PID 1392 wrote to memory of 2168 1392 x2281247.exe 30 PID 1392 wrote to memory of 2168 1392 x2281247.exe 30 PID 1392 wrote to memory of 2168 1392 x2281247.exe 30 PID 1392 wrote to memory of 2168 1392 x2281247.exe 30 PID 2168 wrote to memory of 2664 2168 x7891445.exe 31 PID 2168 wrote to memory of 2664 2168 x7891445.exe 31 PID 2168 wrote to memory of 2664 2168 x7891445.exe 31 PID 2168 wrote to memory of 2664 2168 x7891445.exe 31 PID 2168 wrote to memory of 2664 2168 x7891445.exe 31 PID 2168 wrote to memory of 2664 2168 x7891445.exe 31 PID 2168 wrote to memory of 2664 2168 x7891445.exe 31 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2992 2664 g4492398.exe 33 PID 2664 wrote to memory of 2468 2664 g4492398.exe 34 PID 2664 wrote to memory of 2468 2664 g4492398.exe 34 PID 2664 wrote to memory of 2468 2664 g4492398.exe 34 PID 2664 wrote to memory of 2468 2664 g4492398.exe 34 PID 2664 wrote to memory of 2468 2664 g4492398.exe 34 PID 2664 wrote to memory of 2468 2664 g4492398.exe 34 PID 2664 wrote to memory of 2468 2664 g4492398.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe"C:\Users\Admin\AppData\Local\Temp\d68cfdd5c0929418d396be83be0594b2d8a830ce2ee0119290a755512a2a0d3c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2322352.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2322352.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2281247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2281247.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7891445.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7891445.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4492398.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4492398.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2468
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD54d5ab61f257d1d54a54266297286638d
SHA1e652cf6014c8ce449f6909217edd40d817bb0505
SHA256c1d03b677b4ef20f7b44e2ecf98e1f4a91aeb9b22d3af953bb14f40d85889638
SHA5129da57254cba67a72aa37c89f229e27ce5ad3a4e3e732f0e73ad0a43e5aba7b471ba4bd2bb75f27f645cde95307e303633b32af9f8d125d8baac0076755493e33
-
Filesize
827KB
MD54d5ab61f257d1d54a54266297286638d
SHA1e652cf6014c8ce449f6909217edd40d817bb0505
SHA256c1d03b677b4ef20f7b44e2ecf98e1f4a91aeb9b22d3af953bb14f40d85889638
SHA5129da57254cba67a72aa37c89f229e27ce5ad3a4e3e732f0e73ad0a43e5aba7b471ba4bd2bb75f27f645cde95307e303633b32af9f8d125d8baac0076755493e33
-
Filesize
556KB
MD5dc5716ed0e7fb32c8e40972e3766730a
SHA1d2999cc9e2b3b53627781da2f44c6a3fa183edc7
SHA25689b0b74e29c9766957d2af0b7c06688ff642da2d46cf609b5f6890725420705f
SHA5127cf9b3464c5cced5b4cbb39e61257517a81258458ed47193a45908b23730be59a3753a800596c02fc83548d15e33c631687caca8267dbae2738a19c3f42e66b9
-
Filesize
556KB
MD5dc5716ed0e7fb32c8e40972e3766730a
SHA1d2999cc9e2b3b53627781da2f44c6a3fa183edc7
SHA25689b0b74e29c9766957d2af0b7c06688ff642da2d46cf609b5f6890725420705f
SHA5127cf9b3464c5cced5b4cbb39e61257517a81258458ed47193a45908b23730be59a3753a800596c02fc83548d15e33c631687caca8267dbae2738a19c3f42e66b9
-
Filesize
390KB
MD5a754f66b03bfba7cf4302b2a085dbd93
SHA11cc8433d8bb412c2ac87c74d04ac225dfa72f0eb
SHA2568d0d785d31db869720dd5ad0c9fa76d4aac09e0ac2e4f1d72247c416ec74dcca
SHA5123e8451edcf2c40f155a99b2bf443cc57191aaa5947756661a170fc100953a8129d197f2558dc52d09d0eb00ce3fb1e4174f183dd3b4105ebc7b3c317ba003103
-
Filesize
390KB
MD5a754f66b03bfba7cf4302b2a085dbd93
SHA11cc8433d8bb412c2ac87c74d04ac225dfa72f0eb
SHA2568d0d785d31db869720dd5ad0c9fa76d4aac09e0ac2e4f1d72247c416ec74dcca
SHA5123e8451edcf2c40f155a99b2bf443cc57191aaa5947756661a170fc100953a8129d197f2558dc52d09d0eb00ce3fb1e4174f183dd3b4105ebc7b3c317ba003103
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a
-
Filesize
827KB
MD54d5ab61f257d1d54a54266297286638d
SHA1e652cf6014c8ce449f6909217edd40d817bb0505
SHA256c1d03b677b4ef20f7b44e2ecf98e1f4a91aeb9b22d3af953bb14f40d85889638
SHA5129da57254cba67a72aa37c89f229e27ce5ad3a4e3e732f0e73ad0a43e5aba7b471ba4bd2bb75f27f645cde95307e303633b32af9f8d125d8baac0076755493e33
-
Filesize
827KB
MD54d5ab61f257d1d54a54266297286638d
SHA1e652cf6014c8ce449f6909217edd40d817bb0505
SHA256c1d03b677b4ef20f7b44e2ecf98e1f4a91aeb9b22d3af953bb14f40d85889638
SHA5129da57254cba67a72aa37c89f229e27ce5ad3a4e3e732f0e73ad0a43e5aba7b471ba4bd2bb75f27f645cde95307e303633b32af9f8d125d8baac0076755493e33
-
Filesize
556KB
MD5dc5716ed0e7fb32c8e40972e3766730a
SHA1d2999cc9e2b3b53627781da2f44c6a3fa183edc7
SHA25689b0b74e29c9766957d2af0b7c06688ff642da2d46cf609b5f6890725420705f
SHA5127cf9b3464c5cced5b4cbb39e61257517a81258458ed47193a45908b23730be59a3753a800596c02fc83548d15e33c631687caca8267dbae2738a19c3f42e66b9
-
Filesize
556KB
MD5dc5716ed0e7fb32c8e40972e3766730a
SHA1d2999cc9e2b3b53627781da2f44c6a3fa183edc7
SHA25689b0b74e29c9766957d2af0b7c06688ff642da2d46cf609b5f6890725420705f
SHA5127cf9b3464c5cced5b4cbb39e61257517a81258458ed47193a45908b23730be59a3753a800596c02fc83548d15e33c631687caca8267dbae2738a19c3f42e66b9
-
Filesize
390KB
MD5a754f66b03bfba7cf4302b2a085dbd93
SHA11cc8433d8bb412c2ac87c74d04ac225dfa72f0eb
SHA2568d0d785d31db869720dd5ad0c9fa76d4aac09e0ac2e4f1d72247c416ec74dcca
SHA5123e8451edcf2c40f155a99b2bf443cc57191aaa5947756661a170fc100953a8129d197f2558dc52d09d0eb00ce3fb1e4174f183dd3b4105ebc7b3c317ba003103
-
Filesize
390KB
MD5a754f66b03bfba7cf4302b2a085dbd93
SHA11cc8433d8bb412c2ac87c74d04ac225dfa72f0eb
SHA2568d0d785d31db869720dd5ad0c9fa76d4aac09e0ac2e4f1d72247c416ec74dcca
SHA5123e8451edcf2c40f155a99b2bf443cc57191aaa5947756661a170fc100953a8129d197f2558dc52d09d0eb00ce3fb1e4174f183dd3b4105ebc7b3c317ba003103
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a
-
Filesize
356KB
MD5c7c2eeadeb3ffc1748ba28b2fd1e9c06
SHA193c85fdd61508697e21c74723c64015d03d5a59a
SHA256074e06b04fae91d1b6b35ee49fbfe5aca9cfc25641dc5d62614280f2796d335c
SHA51247760a13a0f12eaa354bdaf9c78b5048603f6465d8e4345622135740e0d13d0270539f664fb08821f67564e1c0ab9229d24229a740aaa59d20cd56303e0dc60a