Analysis

  • max time kernel
    119s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 22:24

General

  • Target

    aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c.exe

  • Size

    929KB

  • MD5

    78ca7e8b46ee79803b25186fce5d90d8

  • SHA1

    11a847c3d8991603eb1c6e9ea05f3a569eba119f

  • SHA256

    aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c

  • SHA512

    1642dfd2b78ba46f76119f526436f2c6a24208a21128f7cd0f586cee0f1b8e2a3cf9b3e4b044776d602d299e92fef583bb8b0ce274142e0163c2be9aa5e392a6

  • SSDEEP

    12288:mMrCy90rVZDGHW8433uN/JXpxEH30EZEox/j8fqFD/MX5dq6r0vcOzdXX:4ysCr433u/z6ENox//FDMX3qcOzNX

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c.exe
    "C:\Users\Admin\AppData\Local\Temp\aa49aa75bc754c85e6f63daddbd50b31f7c1a545d304c73b5cb297f16d9e323c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8358276.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8358276.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1516394.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1516394.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2500597.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2500597.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 268
                7⤵
                • Program crash
                PID:2656
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 276
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8358276.exe

    Filesize

    827KB

    MD5

    fba43d9e77e1f4e64be9e58893d299aa

    SHA1

    8565a2dd28ae2b08c06055ee0af3b661198a878b

    SHA256

    8cb4805eb32b25d8a1f7c529eda9119470cb17e52a491cbbd75b3934a012bf31

    SHA512

    116b2cd4b8be5b70011fc2df2487adcae6d32c49da632d73f134b1417ed76962bbf20433308c873fe9e3f56491974c74eea37d3efaa9111a9694c42feb71514f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8358276.exe

    Filesize

    827KB

    MD5

    fba43d9e77e1f4e64be9e58893d299aa

    SHA1

    8565a2dd28ae2b08c06055ee0af3b661198a878b

    SHA256

    8cb4805eb32b25d8a1f7c529eda9119470cb17e52a491cbbd75b3934a012bf31

    SHA512

    116b2cd4b8be5b70011fc2df2487adcae6d32c49da632d73f134b1417ed76962bbf20433308c873fe9e3f56491974c74eea37d3efaa9111a9694c42feb71514f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1516394.exe

    Filesize

    555KB

    MD5

    494e82d5f7b6c35fadff449467c189f6

    SHA1

    0e815dba3e0f4e2a0b02ae31ea1110b585ab9383

    SHA256

    a67bdbab80d246d6785435a60e68fd94327c0f40013b52f35762e21a53313e6a

    SHA512

    a9c2258b520bcb3eee9d13ea7e67b09b752fe582e9ae0271cdf03a51e78c64f02f1155e2c5ae9eaad819cb44c7f011dbe71fc4f60902213f624292f439a897d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1516394.exe

    Filesize

    555KB

    MD5

    494e82d5f7b6c35fadff449467c189f6

    SHA1

    0e815dba3e0f4e2a0b02ae31ea1110b585ab9383

    SHA256

    a67bdbab80d246d6785435a60e68fd94327c0f40013b52f35762e21a53313e6a

    SHA512

    a9c2258b520bcb3eee9d13ea7e67b09b752fe582e9ae0271cdf03a51e78c64f02f1155e2c5ae9eaad819cb44c7f011dbe71fc4f60902213f624292f439a897d0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2500597.exe

    Filesize

    390KB

    MD5

    0b25832169450ab3c48b46e3fd950095

    SHA1

    13d2a962a6b8a6b74935a97c55e3587304a77fb8

    SHA256

    f979afb000d9f1bf5754e799b6110c44d2ef153edd24c03f3ac7633d64f33037

    SHA512

    207ebebaf765b34d5239b7cf931556e5631997f1f767b1f563774e2649b15902769070b94211ad254265f428f0cca64786ee0e0aafa1abb1611a75087f949b4c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2500597.exe

    Filesize

    390KB

    MD5

    0b25832169450ab3c48b46e3fd950095

    SHA1

    13d2a962a6b8a6b74935a97c55e3587304a77fb8

    SHA256

    f979afb000d9f1bf5754e799b6110c44d2ef153edd24c03f3ac7633d64f33037

    SHA512

    207ebebaf765b34d5239b7cf931556e5631997f1f767b1f563774e2649b15902769070b94211ad254265f428f0cca64786ee0e0aafa1abb1611a75087f949b4c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8358276.exe

    Filesize

    827KB

    MD5

    fba43d9e77e1f4e64be9e58893d299aa

    SHA1

    8565a2dd28ae2b08c06055ee0af3b661198a878b

    SHA256

    8cb4805eb32b25d8a1f7c529eda9119470cb17e52a491cbbd75b3934a012bf31

    SHA512

    116b2cd4b8be5b70011fc2df2487adcae6d32c49da632d73f134b1417ed76962bbf20433308c873fe9e3f56491974c74eea37d3efaa9111a9694c42feb71514f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8358276.exe

    Filesize

    827KB

    MD5

    fba43d9e77e1f4e64be9e58893d299aa

    SHA1

    8565a2dd28ae2b08c06055ee0af3b661198a878b

    SHA256

    8cb4805eb32b25d8a1f7c529eda9119470cb17e52a491cbbd75b3934a012bf31

    SHA512

    116b2cd4b8be5b70011fc2df2487adcae6d32c49da632d73f134b1417ed76962bbf20433308c873fe9e3f56491974c74eea37d3efaa9111a9694c42feb71514f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x1516394.exe

    Filesize

    555KB

    MD5

    494e82d5f7b6c35fadff449467c189f6

    SHA1

    0e815dba3e0f4e2a0b02ae31ea1110b585ab9383

    SHA256

    a67bdbab80d246d6785435a60e68fd94327c0f40013b52f35762e21a53313e6a

    SHA512

    a9c2258b520bcb3eee9d13ea7e67b09b752fe582e9ae0271cdf03a51e78c64f02f1155e2c5ae9eaad819cb44c7f011dbe71fc4f60902213f624292f439a897d0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x1516394.exe

    Filesize

    555KB

    MD5

    494e82d5f7b6c35fadff449467c189f6

    SHA1

    0e815dba3e0f4e2a0b02ae31ea1110b585ab9383

    SHA256

    a67bdbab80d246d6785435a60e68fd94327c0f40013b52f35762e21a53313e6a

    SHA512

    a9c2258b520bcb3eee9d13ea7e67b09b752fe582e9ae0271cdf03a51e78c64f02f1155e2c5ae9eaad819cb44c7f011dbe71fc4f60902213f624292f439a897d0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x2500597.exe

    Filesize

    390KB

    MD5

    0b25832169450ab3c48b46e3fd950095

    SHA1

    13d2a962a6b8a6b74935a97c55e3587304a77fb8

    SHA256

    f979afb000d9f1bf5754e799b6110c44d2ef153edd24c03f3ac7633d64f33037

    SHA512

    207ebebaf765b34d5239b7cf931556e5631997f1f767b1f563774e2649b15902769070b94211ad254265f428f0cca64786ee0e0aafa1abb1611a75087f949b4c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x2500597.exe

    Filesize

    390KB

    MD5

    0b25832169450ab3c48b46e3fd950095

    SHA1

    13d2a962a6b8a6b74935a97c55e3587304a77fb8

    SHA256

    f979afb000d9f1bf5754e799b6110c44d2ef153edd24c03f3ac7633d64f33037

    SHA512

    207ebebaf765b34d5239b7cf931556e5631997f1f767b1f563774e2649b15902769070b94211ad254265f428f0cca64786ee0e0aafa1abb1611a75087f949b4c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9759617.exe

    Filesize

    356KB

    MD5

    2394d979956c5b244ba343910d832f00

    SHA1

    5517e72200cf6097771dfa0e55d0aec6ea5e2f88

    SHA256

    ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

    SHA512

    d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

  • memory/2616-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2616-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB