Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 22:42
Static task
static1
Behavioral task
behavioral1
Sample
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe
Resource
win10v2004-20230915-en
General
-
Target
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe
-
Size
866KB
-
MD5
eeacddb883c73f4e22781b88dbfb5b3b
-
SHA1
a5d7426e70b412785d331fc96273ea4b1d987cc3
-
SHA256
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9
-
SHA512
753a4758d6da1ab7188b70356c4decaa39344f6cd33b533b5d11c7e4ef564ec211f60ca94130f87fbfeaeea4db303cda4c90a8865ae6d1d1b67050e95b9a70fb
-
SSDEEP
12288:YMrIy90jM4BLFyCmkb+iePQUprgyb+mfT/myMJdhSiG4gJgQLUmUPkerkxiexhik:gywMA4Cx2YUprfRfTOxDxQL/2kxieF5
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2548-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2836 z9569971.exe 2652 z4051908.exe 2720 z9258037.exe 2816 r5800198.exe -
Loads dropped DLL 13 IoCs
pid Process 2456 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe 2836 z9569971.exe 2836 z9569971.exe 2652 z4051908.exe 2652 z4051908.exe 2720 z9258037.exe 2720 z9258037.exe 2720 z9258037.exe 2816 r5800198.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9569971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4051908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9258037.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2816 set thread context of 2548 2816 r5800198.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2636 2816 WerFault.exe 31 2520 2548 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2836 2456 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe 28 PID 2456 wrote to memory of 2836 2456 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe 28 PID 2456 wrote to memory of 2836 2456 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe 28 PID 2456 wrote to memory of 2836 2456 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe 28 PID 2456 wrote to memory of 2836 2456 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe 28 PID 2456 wrote to memory of 2836 2456 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe 28 PID 2456 wrote to memory of 2836 2456 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe 28 PID 2836 wrote to memory of 2652 2836 z9569971.exe 29 PID 2836 wrote to memory of 2652 2836 z9569971.exe 29 PID 2836 wrote to memory of 2652 2836 z9569971.exe 29 PID 2836 wrote to memory of 2652 2836 z9569971.exe 29 PID 2836 wrote to memory of 2652 2836 z9569971.exe 29 PID 2836 wrote to memory of 2652 2836 z9569971.exe 29 PID 2836 wrote to memory of 2652 2836 z9569971.exe 29 PID 2652 wrote to memory of 2720 2652 z4051908.exe 30 PID 2652 wrote to memory of 2720 2652 z4051908.exe 30 PID 2652 wrote to memory of 2720 2652 z4051908.exe 30 PID 2652 wrote to memory of 2720 2652 z4051908.exe 30 PID 2652 wrote to memory of 2720 2652 z4051908.exe 30 PID 2652 wrote to memory of 2720 2652 z4051908.exe 30 PID 2652 wrote to memory of 2720 2652 z4051908.exe 30 PID 2720 wrote to memory of 2816 2720 z9258037.exe 31 PID 2720 wrote to memory of 2816 2720 z9258037.exe 31 PID 2720 wrote to memory of 2816 2720 z9258037.exe 31 PID 2720 wrote to memory of 2816 2720 z9258037.exe 31 PID 2720 wrote to memory of 2816 2720 z9258037.exe 31 PID 2720 wrote to memory of 2816 2720 z9258037.exe 31 PID 2720 wrote to memory of 2816 2720 z9258037.exe 31 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2548 2816 r5800198.exe 33 PID 2816 wrote to memory of 2636 2816 r5800198.exe 34 PID 2816 wrote to memory of 2636 2816 r5800198.exe 34 PID 2816 wrote to memory of 2636 2816 r5800198.exe 34 PID 2816 wrote to memory of 2636 2816 r5800198.exe 34 PID 2816 wrote to memory of 2636 2816 r5800198.exe 34 PID 2816 wrote to memory of 2636 2816 r5800198.exe 34 PID 2816 wrote to memory of 2636 2816 r5800198.exe 34 PID 2548 wrote to memory of 2520 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2520 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2520 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2520 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2520 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2520 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2520 2548 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe"C:\Users\Admin\AppData\Local\Temp\a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9569971.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9569971.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4051908.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4051908.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9258037.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9258037.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5800198.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5800198.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 2687⤵
- Program crash
PID:2520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2636
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD548ef9ed634eac6873652b73fa16bbd62
SHA1b27315492b816bc520e1d5648d271f0651c979e7
SHA256b5f7176a1fe57e13ad243269529dc8d26c29b82ca3c177302978df1cc2cf3026
SHA512e4058feeefbcb0139501727b6f6c7de566530c4433821351404e659d5def4f9f897f6e90e2d914a45888106b6208c1419447a10983fc343c8687a607d23a77e2
-
Filesize
764KB
MD548ef9ed634eac6873652b73fa16bbd62
SHA1b27315492b816bc520e1d5648d271f0651c979e7
SHA256b5f7176a1fe57e13ad243269529dc8d26c29b82ca3c177302978df1cc2cf3026
SHA512e4058feeefbcb0139501727b6f6c7de566530c4433821351404e659d5def4f9f897f6e90e2d914a45888106b6208c1419447a10983fc343c8687a607d23a77e2
-
Filesize
581KB
MD56108620755bba9aa8ce0a2d0f421d7f2
SHA19779d7d25f6cbb4ff4e2c9bd8435caa03734dbb7
SHA256202d91db0a04736e9fb6f6853d2d23c213ab917aaa2142a2374064f961473142
SHA512281d6d2d8995ff3a4fe586be2d4025e4aa83fe9c963db6ae8e432e5d44917e01d91a1cfdf9c8ee74b3f8a2e4f7c9399833497c22a46d1f6166518536d56b1eff
-
Filesize
581KB
MD56108620755bba9aa8ce0a2d0f421d7f2
SHA19779d7d25f6cbb4ff4e2c9bd8435caa03734dbb7
SHA256202d91db0a04736e9fb6f6853d2d23c213ab917aaa2142a2374064f961473142
SHA512281d6d2d8995ff3a4fe586be2d4025e4aa83fe9c963db6ae8e432e5d44917e01d91a1cfdf9c8ee74b3f8a2e4f7c9399833497c22a46d1f6166518536d56b1eff
-
Filesize
399KB
MD58fc97389945c83c9b91a75717a2efa32
SHA125a1e97fde336da9e2b82a66bfa21e4a020cfeb2
SHA25636307a145fb1b4033f65156a162244db10e27fad32ae94068b2f907d10593378
SHA512d1823fa2990761b3e2500749d2f23e3ec678b942ed184cae503533da555f2e517883735c5ffe3c4c88bc9fa92ead6a2c2a07aae8d0204f949468f5b75bae44dc
-
Filesize
399KB
MD58fc97389945c83c9b91a75717a2efa32
SHA125a1e97fde336da9e2b82a66bfa21e4a020cfeb2
SHA25636307a145fb1b4033f65156a162244db10e27fad32ae94068b2f907d10593378
SHA512d1823fa2990761b3e2500749d2f23e3ec678b942ed184cae503533da555f2e517883735c5ffe3c4c88bc9fa92ead6a2c2a07aae8d0204f949468f5b75bae44dc
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
764KB
MD548ef9ed634eac6873652b73fa16bbd62
SHA1b27315492b816bc520e1d5648d271f0651c979e7
SHA256b5f7176a1fe57e13ad243269529dc8d26c29b82ca3c177302978df1cc2cf3026
SHA512e4058feeefbcb0139501727b6f6c7de566530c4433821351404e659d5def4f9f897f6e90e2d914a45888106b6208c1419447a10983fc343c8687a607d23a77e2
-
Filesize
764KB
MD548ef9ed634eac6873652b73fa16bbd62
SHA1b27315492b816bc520e1d5648d271f0651c979e7
SHA256b5f7176a1fe57e13ad243269529dc8d26c29b82ca3c177302978df1cc2cf3026
SHA512e4058feeefbcb0139501727b6f6c7de566530c4433821351404e659d5def4f9f897f6e90e2d914a45888106b6208c1419447a10983fc343c8687a607d23a77e2
-
Filesize
581KB
MD56108620755bba9aa8ce0a2d0f421d7f2
SHA19779d7d25f6cbb4ff4e2c9bd8435caa03734dbb7
SHA256202d91db0a04736e9fb6f6853d2d23c213ab917aaa2142a2374064f961473142
SHA512281d6d2d8995ff3a4fe586be2d4025e4aa83fe9c963db6ae8e432e5d44917e01d91a1cfdf9c8ee74b3f8a2e4f7c9399833497c22a46d1f6166518536d56b1eff
-
Filesize
581KB
MD56108620755bba9aa8ce0a2d0f421d7f2
SHA19779d7d25f6cbb4ff4e2c9bd8435caa03734dbb7
SHA256202d91db0a04736e9fb6f6853d2d23c213ab917aaa2142a2374064f961473142
SHA512281d6d2d8995ff3a4fe586be2d4025e4aa83fe9c963db6ae8e432e5d44917e01d91a1cfdf9c8ee74b3f8a2e4f7c9399833497c22a46d1f6166518536d56b1eff
-
Filesize
399KB
MD58fc97389945c83c9b91a75717a2efa32
SHA125a1e97fde336da9e2b82a66bfa21e4a020cfeb2
SHA25636307a145fb1b4033f65156a162244db10e27fad32ae94068b2f907d10593378
SHA512d1823fa2990761b3e2500749d2f23e3ec678b942ed184cae503533da555f2e517883735c5ffe3c4c88bc9fa92ead6a2c2a07aae8d0204f949468f5b75bae44dc
-
Filesize
399KB
MD58fc97389945c83c9b91a75717a2efa32
SHA125a1e97fde336da9e2b82a66bfa21e4a020cfeb2
SHA25636307a145fb1b4033f65156a162244db10e27fad32ae94068b2f907d10593378
SHA512d1823fa2990761b3e2500749d2f23e3ec678b942ed184cae503533da555f2e517883735c5ffe3c4c88bc9fa92ead6a2c2a07aae8d0204f949468f5b75bae44dc
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6