Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 22:22

General

  • Target

    d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe

  • Size

    930KB

  • MD5

    9f2032e3e45d94c3b45082f3aeec21cb

  • SHA1

    9da8b01d0ff52d32bf237421ea24c345eb1c6783

  • SHA256

    d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968

  • SHA512

    2cf94ac12d7f34ab7d8d3f0f7ea35d55aa57870b12981416cdb83200261311bbcd323e9a74a2cc73f09d311ab019565e1c109697dce1a0f4e03079ea4981fb79

  • SSDEEP

    12288:UMrGy90PmSFP4b1FUTfBMXZQo5itjunCiWs5H/eeQbz293s6kaT8txeLeOc6/Qsb:iyIxi1FwyXZQoJCiFH/dQe/LeH6/h

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe
    "C:\Users\Admin\AppData\Local\Temp\d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5321897.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5321897.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2948598.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2948598.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0316171.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0316171.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2816
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2956
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 268
                7⤵
                • Program crash
                PID:2524
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 276
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5321897.exe

    Filesize

    828KB

    MD5

    a68983a16f355732cc0413a705468b8b

    SHA1

    e2a45cc9962f7a7e606333d1501b86c096f12497

    SHA256

    854e152d13833763f1e5e1c4c5d7afd1edc519dde7b3c456b73c561a0498071e

    SHA512

    d52f2cac6ac937304f1dd71819686aaa842dcadb702895d0fc3e35ada80bd2a1efd94f27c8def6d019942aed25ba879016a7d90cfc1d53f59bf7106783e0d639

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5321897.exe

    Filesize

    828KB

    MD5

    a68983a16f355732cc0413a705468b8b

    SHA1

    e2a45cc9962f7a7e606333d1501b86c096f12497

    SHA256

    854e152d13833763f1e5e1c4c5d7afd1edc519dde7b3c456b73c561a0498071e

    SHA512

    d52f2cac6ac937304f1dd71819686aaa842dcadb702895d0fc3e35ada80bd2a1efd94f27c8def6d019942aed25ba879016a7d90cfc1d53f59bf7106783e0d639

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2948598.exe

    Filesize

    555KB

    MD5

    523927b8552bea0d8e13dc7db25146fb

    SHA1

    1419879fddde9db0b66b98fae7649fb88f91c676

    SHA256

    75944944ab723ab77b835f30500273cc8be14b528bde1cef399dff82f3bddcfd

    SHA512

    6dd60b9148190208c15ac18d0ecd60d9dc40d41480ae9f0e250d6ea817697e6f392b40a313942557d1b576467be66bb73114cb64fbd1b49d0fcb611322b7784d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2948598.exe

    Filesize

    555KB

    MD5

    523927b8552bea0d8e13dc7db25146fb

    SHA1

    1419879fddde9db0b66b98fae7649fb88f91c676

    SHA256

    75944944ab723ab77b835f30500273cc8be14b528bde1cef399dff82f3bddcfd

    SHA512

    6dd60b9148190208c15ac18d0ecd60d9dc40d41480ae9f0e250d6ea817697e6f392b40a313942557d1b576467be66bb73114cb64fbd1b49d0fcb611322b7784d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0316171.exe

    Filesize

    389KB

    MD5

    64eab73a20b2ca4878ccd0f4fd9509e1

    SHA1

    2217f5b971032306cd2b7610725709b3dc433532

    SHA256

    6e30d171b311a8f5b1227444ced4732d5fdbe6b8ee01b3d562b3519c1d61bdb0

    SHA512

    1e86648a3a71e4b4545b818881e76a019881a16c770aa2dc46716763ce105537cf3f5b7e193e62be159c5d82b8b9ed2249234061b950a445e3b44f6aa8298dfe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0316171.exe

    Filesize

    389KB

    MD5

    64eab73a20b2ca4878ccd0f4fd9509e1

    SHA1

    2217f5b971032306cd2b7610725709b3dc433532

    SHA256

    6e30d171b311a8f5b1227444ced4732d5fdbe6b8ee01b3d562b3519c1d61bdb0

    SHA512

    1e86648a3a71e4b4545b818881e76a019881a16c770aa2dc46716763ce105537cf3f5b7e193e62be159c5d82b8b9ed2249234061b950a445e3b44f6aa8298dfe

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5321897.exe

    Filesize

    828KB

    MD5

    a68983a16f355732cc0413a705468b8b

    SHA1

    e2a45cc9962f7a7e606333d1501b86c096f12497

    SHA256

    854e152d13833763f1e5e1c4c5d7afd1edc519dde7b3c456b73c561a0498071e

    SHA512

    d52f2cac6ac937304f1dd71819686aaa842dcadb702895d0fc3e35ada80bd2a1efd94f27c8def6d019942aed25ba879016a7d90cfc1d53f59bf7106783e0d639

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5321897.exe

    Filesize

    828KB

    MD5

    a68983a16f355732cc0413a705468b8b

    SHA1

    e2a45cc9962f7a7e606333d1501b86c096f12497

    SHA256

    854e152d13833763f1e5e1c4c5d7afd1edc519dde7b3c456b73c561a0498071e

    SHA512

    d52f2cac6ac937304f1dd71819686aaa842dcadb702895d0fc3e35ada80bd2a1efd94f27c8def6d019942aed25ba879016a7d90cfc1d53f59bf7106783e0d639

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x2948598.exe

    Filesize

    555KB

    MD5

    523927b8552bea0d8e13dc7db25146fb

    SHA1

    1419879fddde9db0b66b98fae7649fb88f91c676

    SHA256

    75944944ab723ab77b835f30500273cc8be14b528bde1cef399dff82f3bddcfd

    SHA512

    6dd60b9148190208c15ac18d0ecd60d9dc40d41480ae9f0e250d6ea817697e6f392b40a313942557d1b576467be66bb73114cb64fbd1b49d0fcb611322b7784d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x2948598.exe

    Filesize

    555KB

    MD5

    523927b8552bea0d8e13dc7db25146fb

    SHA1

    1419879fddde9db0b66b98fae7649fb88f91c676

    SHA256

    75944944ab723ab77b835f30500273cc8be14b528bde1cef399dff82f3bddcfd

    SHA512

    6dd60b9148190208c15ac18d0ecd60d9dc40d41480ae9f0e250d6ea817697e6f392b40a313942557d1b576467be66bb73114cb64fbd1b49d0fcb611322b7784d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0316171.exe

    Filesize

    389KB

    MD5

    64eab73a20b2ca4878ccd0f4fd9509e1

    SHA1

    2217f5b971032306cd2b7610725709b3dc433532

    SHA256

    6e30d171b311a8f5b1227444ced4732d5fdbe6b8ee01b3d562b3519c1d61bdb0

    SHA512

    1e86648a3a71e4b4545b818881e76a019881a16c770aa2dc46716763ce105537cf3f5b7e193e62be159c5d82b8b9ed2249234061b950a445e3b44f6aa8298dfe

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0316171.exe

    Filesize

    389KB

    MD5

    64eab73a20b2ca4878ccd0f4fd9509e1

    SHA1

    2217f5b971032306cd2b7610725709b3dc433532

    SHA256

    6e30d171b311a8f5b1227444ced4732d5fdbe6b8ee01b3d562b3519c1d61bdb0

    SHA512

    1e86648a3a71e4b4545b818881e76a019881a16c770aa2dc46716763ce105537cf3f5b7e193e62be159c5d82b8b9ed2249234061b950a445e3b44f6aa8298dfe

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe

    Filesize

    356KB

    MD5

    d0ff0435b193d1206a608e03a399345c

    SHA1

    88ba574545f9421d1ba4678e55e83b8ff0fd2c87

    SHA256

    114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88

    SHA512

    4303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82

  • memory/2956-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2956-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2956-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2956-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2956-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2956-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2956-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2956-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2956-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2956-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB