Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe
Resource
win10v2004-20230915-en
General
-
Target
a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe
-
Size
928KB
-
MD5
0199093794d290a99beaf45e3c7f1fbe
-
SHA1
6e87b68d126f3f18e7a837ab57b2c5ad5672d4a2
-
SHA256
a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8
-
SHA512
45994761e1ec171ad511793e52570e86cdf78cf149e2bed81c58894264150a0b4fbcbf823c115e9e4d37fcce4eddcf43ada8db4a6183d42b25834ba0c1c060d1
-
SSDEEP
24576:w3y5bSCko/Ki/BfAgg3F0CCohgtuTppP6:wC5b2odf7g1fCoWu
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2760-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2760-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2760-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2760-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2760-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2760-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2192 x2705174.exe 2488 x4415469.exe 2412 x2348099.exe 2724 g8427987.exe -
Loads dropped DLL 13 IoCs
pid Process 2068 a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe 2192 x2705174.exe 2192 x2705174.exe 2488 x4415469.exe 2488 x4415469.exe 2412 x2348099.exe 2412 x2348099.exe 2412 x2348099.exe 2724 g8427987.exe 872 WerFault.exe 872 WerFault.exe 872 WerFault.exe 872 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2705174.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4415469.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2348099.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2724 set thread context of 2760 2724 g8427987.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 872 2724 WerFault.exe 30 2868 2760 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2192 2068 a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe 27 PID 2068 wrote to memory of 2192 2068 a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe 27 PID 2068 wrote to memory of 2192 2068 a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe 27 PID 2068 wrote to memory of 2192 2068 a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe 27 PID 2068 wrote to memory of 2192 2068 a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe 27 PID 2068 wrote to memory of 2192 2068 a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe 27 PID 2068 wrote to memory of 2192 2068 a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe 27 PID 2192 wrote to memory of 2488 2192 x2705174.exe 28 PID 2192 wrote to memory of 2488 2192 x2705174.exe 28 PID 2192 wrote to memory of 2488 2192 x2705174.exe 28 PID 2192 wrote to memory of 2488 2192 x2705174.exe 28 PID 2192 wrote to memory of 2488 2192 x2705174.exe 28 PID 2192 wrote to memory of 2488 2192 x2705174.exe 28 PID 2192 wrote to memory of 2488 2192 x2705174.exe 28 PID 2488 wrote to memory of 2412 2488 x4415469.exe 29 PID 2488 wrote to memory of 2412 2488 x4415469.exe 29 PID 2488 wrote to memory of 2412 2488 x4415469.exe 29 PID 2488 wrote to memory of 2412 2488 x4415469.exe 29 PID 2488 wrote to memory of 2412 2488 x4415469.exe 29 PID 2488 wrote to memory of 2412 2488 x4415469.exe 29 PID 2488 wrote to memory of 2412 2488 x4415469.exe 29 PID 2412 wrote to memory of 2724 2412 x2348099.exe 30 PID 2412 wrote to memory of 2724 2412 x2348099.exe 30 PID 2412 wrote to memory of 2724 2412 x2348099.exe 30 PID 2412 wrote to memory of 2724 2412 x2348099.exe 30 PID 2412 wrote to memory of 2724 2412 x2348099.exe 30 PID 2412 wrote to memory of 2724 2412 x2348099.exe 30 PID 2412 wrote to memory of 2724 2412 x2348099.exe 30 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 2760 2724 g8427987.exe 32 PID 2724 wrote to memory of 872 2724 g8427987.exe 33 PID 2724 wrote to memory of 872 2724 g8427987.exe 33 PID 2724 wrote to memory of 872 2724 g8427987.exe 33 PID 2724 wrote to memory of 872 2724 g8427987.exe 33 PID 2724 wrote to memory of 872 2724 g8427987.exe 33 PID 2724 wrote to memory of 872 2724 g8427987.exe 33 PID 2724 wrote to memory of 872 2724 g8427987.exe 33 PID 2760 wrote to memory of 2868 2760 AppLaunch.exe 34 PID 2760 wrote to memory of 2868 2760 AppLaunch.exe 34 PID 2760 wrote to memory of 2868 2760 AppLaunch.exe 34 PID 2760 wrote to memory of 2868 2760 AppLaunch.exe 34 PID 2760 wrote to memory of 2868 2760 AppLaunch.exe 34 PID 2760 wrote to memory of 2868 2760 AppLaunch.exe 34 PID 2760 wrote to memory of 2868 2760 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe"C:\Users\Admin\AppData\Local\Temp\a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2705174.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2705174.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4415469.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4415469.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2348099.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2348099.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8427987.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8427987.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 2687⤵
- Program crash
PID:2868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:872
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD588ba9b91b2911757d895b8e43d205c9b
SHA1eb4079e15d998e14fedd93ef32dfb475a50a807f
SHA25693162b2b92e77d425ed15c077f3480844ade4e264cbab4f54412fb3f27c65bc8
SHA512fcb2472aeef1a9b0f43beb833c041a14a5d99943b12159409424bc6dbe802fc7cb4aebbd148a0ff5c19fba90d97ed3b6919ae8b5963ca912c91c331f1441f48d
-
Filesize
826KB
MD588ba9b91b2911757d895b8e43d205c9b
SHA1eb4079e15d998e14fedd93ef32dfb475a50a807f
SHA25693162b2b92e77d425ed15c077f3480844ade4e264cbab4f54412fb3f27c65bc8
SHA512fcb2472aeef1a9b0f43beb833c041a14a5d99943b12159409424bc6dbe802fc7cb4aebbd148a0ff5c19fba90d97ed3b6919ae8b5963ca912c91c331f1441f48d
-
Filesize
555KB
MD53af6a54de23335c609363a2528936a8e
SHA131573523a2c2d8d35c79b93562b20aee74511942
SHA256bf535c4f2e2782955e9b92c021f4e4108dab127399d91d5003c10945d368d9cd
SHA512a69ed9ca13db67cc35aaf024e29062318a46c3cba2369f35be6ea7e0ad6b5cf1c72b9d9934ac3bec44bb93e55669e055d3e4a40adbd6249d50627bcbbf324c6a
-
Filesize
555KB
MD53af6a54de23335c609363a2528936a8e
SHA131573523a2c2d8d35c79b93562b20aee74511942
SHA256bf535c4f2e2782955e9b92c021f4e4108dab127399d91d5003c10945d368d9cd
SHA512a69ed9ca13db67cc35aaf024e29062318a46c3cba2369f35be6ea7e0ad6b5cf1c72b9d9934ac3bec44bb93e55669e055d3e4a40adbd6249d50627bcbbf324c6a
-
Filesize
390KB
MD5df0793e9931104ab921c3554ef9f4711
SHA1ec77e9b580d1f0ee636a30b3fa361c8c787c7339
SHA25672b94e4ff68f3cff949ddab0e283d112abc99078bb330c1162575972eabe9f4a
SHA5122ed6224a5140a8c0dbe6fe80b136242db6a2dabe8bc29ebf719c050a1e798c69d176a0a9e407939efc21b5ff70e7308d8f2eecbaf59c4d1fb015653509bdabed
-
Filesize
390KB
MD5df0793e9931104ab921c3554ef9f4711
SHA1ec77e9b580d1f0ee636a30b3fa361c8c787c7339
SHA25672b94e4ff68f3cff949ddab0e283d112abc99078bb330c1162575972eabe9f4a
SHA5122ed6224a5140a8c0dbe6fe80b136242db6a2dabe8bc29ebf719c050a1e798c69d176a0a9e407939efc21b5ff70e7308d8f2eecbaf59c4d1fb015653509bdabed
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34
-
Filesize
826KB
MD588ba9b91b2911757d895b8e43d205c9b
SHA1eb4079e15d998e14fedd93ef32dfb475a50a807f
SHA25693162b2b92e77d425ed15c077f3480844ade4e264cbab4f54412fb3f27c65bc8
SHA512fcb2472aeef1a9b0f43beb833c041a14a5d99943b12159409424bc6dbe802fc7cb4aebbd148a0ff5c19fba90d97ed3b6919ae8b5963ca912c91c331f1441f48d
-
Filesize
826KB
MD588ba9b91b2911757d895b8e43d205c9b
SHA1eb4079e15d998e14fedd93ef32dfb475a50a807f
SHA25693162b2b92e77d425ed15c077f3480844ade4e264cbab4f54412fb3f27c65bc8
SHA512fcb2472aeef1a9b0f43beb833c041a14a5d99943b12159409424bc6dbe802fc7cb4aebbd148a0ff5c19fba90d97ed3b6919ae8b5963ca912c91c331f1441f48d
-
Filesize
555KB
MD53af6a54de23335c609363a2528936a8e
SHA131573523a2c2d8d35c79b93562b20aee74511942
SHA256bf535c4f2e2782955e9b92c021f4e4108dab127399d91d5003c10945d368d9cd
SHA512a69ed9ca13db67cc35aaf024e29062318a46c3cba2369f35be6ea7e0ad6b5cf1c72b9d9934ac3bec44bb93e55669e055d3e4a40adbd6249d50627bcbbf324c6a
-
Filesize
555KB
MD53af6a54de23335c609363a2528936a8e
SHA131573523a2c2d8d35c79b93562b20aee74511942
SHA256bf535c4f2e2782955e9b92c021f4e4108dab127399d91d5003c10945d368d9cd
SHA512a69ed9ca13db67cc35aaf024e29062318a46c3cba2369f35be6ea7e0ad6b5cf1c72b9d9934ac3bec44bb93e55669e055d3e4a40adbd6249d50627bcbbf324c6a
-
Filesize
390KB
MD5df0793e9931104ab921c3554ef9f4711
SHA1ec77e9b580d1f0ee636a30b3fa361c8c787c7339
SHA25672b94e4ff68f3cff949ddab0e283d112abc99078bb330c1162575972eabe9f4a
SHA5122ed6224a5140a8c0dbe6fe80b136242db6a2dabe8bc29ebf719c050a1e798c69d176a0a9e407939efc21b5ff70e7308d8f2eecbaf59c4d1fb015653509bdabed
-
Filesize
390KB
MD5df0793e9931104ab921c3554ef9f4711
SHA1ec77e9b580d1f0ee636a30b3fa361c8c787c7339
SHA25672b94e4ff68f3cff949ddab0e283d112abc99078bb330c1162575972eabe9f4a
SHA5122ed6224a5140a8c0dbe6fe80b136242db6a2dabe8bc29ebf719c050a1e798c69d176a0a9e407939efc21b5ff70e7308d8f2eecbaf59c4d1fb015653509bdabed
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34
-
Filesize
356KB
MD59cd10ca5a616a0fd1bc094ead09f1831
SHA16d21f53e73859ed5f1fecd4e625f96a1c1d480f9
SHA25653f3ef025010246ce1f9a27aa640b479b4789490c6f8bf89be07ab45a8aa0846
SHA512e53a665b2f39d41682cb251731d6127355a8ff2c7ec7247ba93e3e1c7b44a0bbbe23df28b091f86ae31bc5599fb6dafc681008cf6e29a60046f0c47a21645f34