Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 22:47
Static task
static1
Behavioral task
behavioral1
Sample
493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe
Resource
win10v2004-20230915-en
General
-
Target
493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe
-
Size
866KB
-
MD5
78a2ac81f2d8c4b6144fed2884650b7f
-
SHA1
508b05f74ac652040aee983eee929f2fc1a6cf2d
-
SHA256
493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1
-
SHA512
8649a47953793e42e2e71f5ea5624030833846b308aa91c65ab6b1332f31b216f2ae9053245365464cbe130c9c59c171d2c8aa59209d1c0915adff2e589b75c2
-
SSDEEP
12288:cMrLy90gaUez5WlGEOEgC+Ncc18EHo4DQgb0RzObDre8VFRMNfvsg2eyYplqKF:HyfaU/rOA+qQb0pMR3kbyCnF
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2644-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2644-53-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2644-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2644-51-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2644-58-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2644-60-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2644-61-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2644-66-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
Processes:
z6193069.exez5385396.exez3487491.exer7989047.exepid process 1380 z6193069.exe 2324 z5385396.exe 2784 z3487491.exe 2672 r7989047.exe -
Loads dropped DLL 13 IoCs
Processes:
493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exez6193069.exez5385396.exez3487491.exer7989047.exeWerFault.exepid process 2240 493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe 1380 z6193069.exe 1380 z6193069.exe 2324 z5385396.exe 2324 z5385396.exe 2784 z3487491.exe 2784 z3487491.exe 2784 z3487491.exe 2672 r7989047.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exez6193069.exez5385396.exez3487491.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6193069.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5385396.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z3487491.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
r7989047.exedescription pid process target process PID 2672 set thread context of 2644 2672 r7989047.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2576 2672 WerFault.exe r7989047.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exez6193069.exez5385396.exez3487491.exer7989047.exedescription pid process target process PID 2240 wrote to memory of 1380 2240 493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe z6193069.exe PID 2240 wrote to memory of 1380 2240 493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe z6193069.exe PID 2240 wrote to memory of 1380 2240 493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe z6193069.exe PID 2240 wrote to memory of 1380 2240 493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe z6193069.exe PID 2240 wrote to memory of 1380 2240 493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe z6193069.exe PID 2240 wrote to memory of 1380 2240 493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe z6193069.exe PID 2240 wrote to memory of 1380 2240 493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe z6193069.exe PID 1380 wrote to memory of 2324 1380 z6193069.exe z5385396.exe PID 1380 wrote to memory of 2324 1380 z6193069.exe z5385396.exe PID 1380 wrote to memory of 2324 1380 z6193069.exe z5385396.exe PID 1380 wrote to memory of 2324 1380 z6193069.exe z5385396.exe PID 1380 wrote to memory of 2324 1380 z6193069.exe z5385396.exe PID 1380 wrote to memory of 2324 1380 z6193069.exe z5385396.exe PID 1380 wrote to memory of 2324 1380 z6193069.exe z5385396.exe PID 2324 wrote to memory of 2784 2324 z5385396.exe z3487491.exe PID 2324 wrote to memory of 2784 2324 z5385396.exe z3487491.exe PID 2324 wrote to memory of 2784 2324 z5385396.exe z3487491.exe PID 2324 wrote to memory of 2784 2324 z5385396.exe z3487491.exe PID 2324 wrote to memory of 2784 2324 z5385396.exe z3487491.exe PID 2324 wrote to memory of 2784 2324 z5385396.exe z3487491.exe PID 2324 wrote to memory of 2784 2324 z5385396.exe z3487491.exe PID 2784 wrote to memory of 2672 2784 z3487491.exe r7989047.exe PID 2784 wrote to memory of 2672 2784 z3487491.exe r7989047.exe PID 2784 wrote to memory of 2672 2784 z3487491.exe r7989047.exe PID 2784 wrote to memory of 2672 2784 z3487491.exe r7989047.exe PID 2784 wrote to memory of 2672 2784 z3487491.exe r7989047.exe PID 2784 wrote to memory of 2672 2784 z3487491.exe r7989047.exe PID 2784 wrote to memory of 2672 2784 z3487491.exe r7989047.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2644 2672 r7989047.exe AppLaunch.exe PID 2672 wrote to memory of 2576 2672 r7989047.exe WerFault.exe PID 2672 wrote to memory of 2576 2672 r7989047.exe WerFault.exe PID 2672 wrote to memory of 2576 2672 r7989047.exe WerFault.exe PID 2672 wrote to memory of 2576 2672 r7989047.exe WerFault.exe PID 2672 wrote to memory of 2576 2672 r7989047.exe WerFault.exe PID 2672 wrote to memory of 2576 2672 r7989047.exe WerFault.exe PID 2672 wrote to memory of 2576 2672 r7989047.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe"C:\Users\Admin\AppData\Local\Temp\493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2576
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD5af7a90d89e6a8403a25ae6c0e2bd4655
SHA12afb5989688e6dbf7316c7afdec4f71619bf0260
SHA256f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d
SHA512727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888
-
Filesize
764KB
MD5af7a90d89e6a8403a25ae6c0e2bd4655
SHA12afb5989688e6dbf7316c7afdec4f71619bf0260
SHA256f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d
SHA512727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888
-
Filesize
581KB
MD5f1ff3c611da99fbff62910a5298bcad2
SHA1d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec
SHA256cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836
SHA5123b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e
-
Filesize
581KB
MD5f1ff3c611da99fbff62910a5298bcad2
SHA1d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec
SHA256cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836
SHA5123b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e
-
Filesize
399KB
MD52f1d19f90db1a28d3c016371b2827e80
SHA1978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13
SHA2569bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce
SHA5123b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee
-
Filesize
399KB
MD52f1d19f90db1a28d3c016371b2827e80
SHA1978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13
SHA2569bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce
SHA5123b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
Filesize
764KB
MD5af7a90d89e6a8403a25ae6c0e2bd4655
SHA12afb5989688e6dbf7316c7afdec4f71619bf0260
SHA256f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d
SHA512727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888
-
Filesize
764KB
MD5af7a90d89e6a8403a25ae6c0e2bd4655
SHA12afb5989688e6dbf7316c7afdec4f71619bf0260
SHA256f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d
SHA512727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888
-
Filesize
581KB
MD5f1ff3c611da99fbff62910a5298bcad2
SHA1d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec
SHA256cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836
SHA5123b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e
-
Filesize
581KB
MD5f1ff3c611da99fbff62910a5298bcad2
SHA1d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec
SHA256cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836
SHA5123b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e
-
Filesize
399KB
MD52f1d19f90db1a28d3c016371b2827e80
SHA1978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13
SHA2569bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce
SHA5123b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee
-
Filesize
399KB
MD52f1d19f90db1a28d3c016371b2827e80
SHA1978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13
SHA2569bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce
SHA5123b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e
-
Filesize
356KB
MD5d0632a606309fdafdefb6725df4b365f
SHA10bb18d5be8302a4841987de5c903556d5bdc73ce
SHA256a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50
SHA5128fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e