Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 22:22
Static task
static1
Behavioral task
behavioral1
Sample
d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe
Resource
win10v2004-20230915-en
General
-
Target
d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe
-
Size
930KB
-
MD5
9f2032e3e45d94c3b45082f3aeec21cb
-
SHA1
9da8b01d0ff52d32bf237421ea24c345eb1c6783
-
SHA256
d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968
-
SHA512
2cf94ac12d7f34ab7d8d3f0f7ea35d55aa57870b12981416cdb83200261311bbcd323e9a74a2cc73f09d311ab019565e1c109697dce1a0f4e03079ea4981fb79
-
SSDEEP
12288:UMrGy90PmSFP4b1FUTfBMXZQo5itjunCiWs5H/eeQbz293s6kaT8txeLeOc6/Qsb:iyIxi1FwyXZQoJCiFH/dQe/LeH6/h
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2956-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2956-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2956-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2956-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2956-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2956-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 1676 x5321897.exe 2700 x2948598.exe 2816 x0316171.exe 2648 g7511048.exe -
Loads dropped DLL 13 IoCs
pid Process 2948 d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe 1676 x5321897.exe 1676 x5321897.exe 2700 x2948598.exe 2700 x2948598.exe 2816 x0316171.exe 2816 x0316171.exe 2816 x0316171.exe 2648 g7511048.exe 2484 WerFault.exe 2484 WerFault.exe 2484 WerFault.exe 2484 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5321897.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2948598.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0316171.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2648 set thread context of 2956 2648 g7511048.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2484 2648 WerFault.exe 30 2524 2956 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1676 2948 d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe 27 PID 2948 wrote to memory of 1676 2948 d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe 27 PID 2948 wrote to memory of 1676 2948 d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe 27 PID 2948 wrote to memory of 1676 2948 d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe 27 PID 2948 wrote to memory of 1676 2948 d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe 27 PID 2948 wrote to memory of 1676 2948 d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe 27 PID 2948 wrote to memory of 1676 2948 d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe 27 PID 1676 wrote to memory of 2700 1676 x5321897.exe 28 PID 1676 wrote to memory of 2700 1676 x5321897.exe 28 PID 1676 wrote to memory of 2700 1676 x5321897.exe 28 PID 1676 wrote to memory of 2700 1676 x5321897.exe 28 PID 1676 wrote to memory of 2700 1676 x5321897.exe 28 PID 1676 wrote to memory of 2700 1676 x5321897.exe 28 PID 1676 wrote to memory of 2700 1676 x5321897.exe 28 PID 2700 wrote to memory of 2816 2700 x2948598.exe 29 PID 2700 wrote to memory of 2816 2700 x2948598.exe 29 PID 2700 wrote to memory of 2816 2700 x2948598.exe 29 PID 2700 wrote to memory of 2816 2700 x2948598.exe 29 PID 2700 wrote to memory of 2816 2700 x2948598.exe 29 PID 2700 wrote to memory of 2816 2700 x2948598.exe 29 PID 2700 wrote to memory of 2816 2700 x2948598.exe 29 PID 2816 wrote to memory of 2648 2816 x0316171.exe 30 PID 2816 wrote to memory of 2648 2816 x0316171.exe 30 PID 2816 wrote to memory of 2648 2816 x0316171.exe 30 PID 2816 wrote to memory of 2648 2816 x0316171.exe 30 PID 2816 wrote to memory of 2648 2816 x0316171.exe 30 PID 2816 wrote to memory of 2648 2816 x0316171.exe 30 PID 2816 wrote to memory of 2648 2816 x0316171.exe 30 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2648 wrote to memory of 2956 2648 g7511048.exe 32 PID 2956 wrote to memory of 2524 2956 AppLaunch.exe 34 PID 2956 wrote to memory of 2524 2956 AppLaunch.exe 34 PID 2956 wrote to memory of 2524 2956 AppLaunch.exe 34 PID 2956 wrote to memory of 2524 2956 AppLaunch.exe 34 PID 2956 wrote to memory of 2524 2956 AppLaunch.exe 34 PID 2956 wrote to memory of 2524 2956 AppLaunch.exe 34 PID 2956 wrote to memory of 2524 2956 AppLaunch.exe 34 PID 2648 wrote to memory of 2484 2648 g7511048.exe 33 PID 2648 wrote to memory of 2484 2648 g7511048.exe 33 PID 2648 wrote to memory of 2484 2648 g7511048.exe 33 PID 2648 wrote to memory of 2484 2648 g7511048.exe 33 PID 2648 wrote to memory of 2484 2648 g7511048.exe 33 PID 2648 wrote to memory of 2484 2648 g7511048.exe 33 PID 2648 wrote to memory of 2484 2648 g7511048.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe"C:\Users\Admin\AppData\Local\Temp\d17e440d22156a8f0bccb6dcd7375da5af025b86aee404f088f75a31fab8e968.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5321897.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5321897.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2948598.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2948598.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0316171.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0316171.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7511048.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 2687⤵
- Program crash
PID:2524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2484
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5a68983a16f355732cc0413a705468b8b
SHA1e2a45cc9962f7a7e606333d1501b86c096f12497
SHA256854e152d13833763f1e5e1c4c5d7afd1edc519dde7b3c456b73c561a0498071e
SHA512d52f2cac6ac937304f1dd71819686aaa842dcadb702895d0fc3e35ada80bd2a1efd94f27c8def6d019942aed25ba879016a7d90cfc1d53f59bf7106783e0d639
-
Filesize
828KB
MD5a68983a16f355732cc0413a705468b8b
SHA1e2a45cc9962f7a7e606333d1501b86c096f12497
SHA256854e152d13833763f1e5e1c4c5d7afd1edc519dde7b3c456b73c561a0498071e
SHA512d52f2cac6ac937304f1dd71819686aaa842dcadb702895d0fc3e35ada80bd2a1efd94f27c8def6d019942aed25ba879016a7d90cfc1d53f59bf7106783e0d639
-
Filesize
555KB
MD5523927b8552bea0d8e13dc7db25146fb
SHA11419879fddde9db0b66b98fae7649fb88f91c676
SHA25675944944ab723ab77b835f30500273cc8be14b528bde1cef399dff82f3bddcfd
SHA5126dd60b9148190208c15ac18d0ecd60d9dc40d41480ae9f0e250d6ea817697e6f392b40a313942557d1b576467be66bb73114cb64fbd1b49d0fcb611322b7784d
-
Filesize
555KB
MD5523927b8552bea0d8e13dc7db25146fb
SHA11419879fddde9db0b66b98fae7649fb88f91c676
SHA25675944944ab723ab77b835f30500273cc8be14b528bde1cef399dff82f3bddcfd
SHA5126dd60b9148190208c15ac18d0ecd60d9dc40d41480ae9f0e250d6ea817697e6f392b40a313942557d1b576467be66bb73114cb64fbd1b49d0fcb611322b7784d
-
Filesize
389KB
MD564eab73a20b2ca4878ccd0f4fd9509e1
SHA12217f5b971032306cd2b7610725709b3dc433532
SHA2566e30d171b311a8f5b1227444ced4732d5fdbe6b8ee01b3d562b3519c1d61bdb0
SHA5121e86648a3a71e4b4545b818881e76a019881a16c770aa2dc46716763ce105537cf3f5b7e193e62be159c5d82b8b9ed2249234061b950a445e3b44f6aa8298dfe
-
Filesize
389KB
MD564eab73a20b2ca4878ccd0f4fd9509e1
SHA12217f5b971032306cd2b7610725709b3dc433532
SHA2566e30d171b311a8f5b1227444ced4732d5fdbe6b8ee01b3d562b3519c1d61bdb0
SHA5121e86648a3a71e4b4545b818881e76a019881a16c770aa2dc46716763ce105537cf3f5b7e193e62be159c5d82b8b9ed2249234061b950a445e3b44f6aa8298dfe
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82
-
Filesize
828KB
MD5a68983a16f355732cc0413a705468b8b
SHA1e2a45cc9962f7a7e606333d1501b86c096f12497
SHA256854e152d13833763f1e5e1c4c5d7afd1edc519dde7b3c456b73c561a0498071e
SHA512d52f2cac6ac937304f1dd71819686aaa842dcadb702895d0fc3e35ada80bd2a1efd94f27c8def6d019942aed25ba879016a7d90cfc1d53f59bf7106783e0d639
-
Filesize
828KB
MD5a68983a16f355732cc0413a705468b8b
SHA1e2a45cc9962f7a7e606333d1501b86c096f12497
SHA256854e152d13833763f1e5e1c4c5d7afd1edc519dde7b3c456b73c561a0498071e
SHA512d52f2cac6ac937304f1dd71819686aaa842dcadb702895d0fc3e35ada80bd2a1efd94f27c8def6d019942aed25ba879016a7d90cfc1d53f59bf7106783e0d639
-
Filesize
555KB
MD5523927b8552bea0d8e13dc7db25146fb
SHA11419879fddde9db0b66b98fae7649fb88f91c676
SHA25675944944ab723ab77b835f30500273cc8be14b528bde1cef399dff82f3bddcfd
SHA5126dd60b9148190208c15ac18d0ecd60d9dc40d41480ae9f0e250d6ea817697e6f392b40a313942557d1b576467be66bb73114cb64fbd1b49d0fcb611322b7784d
-
Filesize
555KB
MD5523927b8552bea0d8e13dc7db25146fb
SHA11419879fddde9db0b66b98fae7649fb88f91c676
SHA25675944944ab723ab77b835f30500273cc8be14b528bde1cef399dff82f3bddcfd
SHA5126dd60b9148190208c15ac18d0ecd60d9dc40d41480ae9f0e250d6ea817697e6f392b40a313942557d1b576467be66bb73114cb64fbd1b49d0fcb611322b7784d
-
Filesize
389KB
MD564eab73a20b2ca4878ccd0f4fd9509e1
SHA12217f5b971032306cd2b7610725709b3dc433532
SHA2566e30d171b311a8f5b1227444ced4732d5fdbe6b8ee01b3d562b3519c1d61bdb0
SHA5121e86648a3a71e4b4545b818881e76a019881a16c770aa2dc46716763ce105537cf3f5b7e193e62be159c5d82b8b9ed2249234061b950a445e3b44f6aa8298dfe
-
Filesize
389KB
MD564eab73a20b2ca4878ccd0f4fd9509e1
SHA12217f5b971032306cd2b7610725709b3dc433532
SHA2566e30d171b311a8f5b1227444ced4732d5fdbe6b8ee01b3d562b3519c1d61bdb0
SHA5121e86648a3a71e4b4545b818881e76a019881a16c770aa2dc46716763ce105537cf3f5b7e193e62be159c5d82b8b9ed2249234061b950a445e3b44f6aa8298dfe
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82
-
Filesize
356KB
MD5d0ff0435b193d1206a608e03a399345c
SHA188ba574545f9421d1ba4678e55e83b8ff0fd2c87
SHA256114a1ba67d7f8f785ec836d3be3072244cc4c7eb3bc10f6669f008e69c576e88
SHA5124303f8ff768b422272e9b2593ac89b6eb9f0da4832dfa127a8fcb7c343bb0d36d896ee3d3e09a81c461236ce8ca76b140e1b284b1387547680f71630e15e9e82