Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 22:59
Static task
static1
Behavioral task
behavioral1
Sample
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe
Resource
win10v2004-20230915-en
General
-
Target
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe
-
Size
928KB
-
MD5
7e9038f0075273341c946e6d0a898503
-
SHA1
6f137da0a8a75adfdafbde89dae5f18ff710fe96
-
SHA256
a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183
-
SHA512
d0f60d45acc701d23bb3d48c9e18b6a4388c1f0352b1cf91f008cc36da4f9354dacaaca919c2b47a0dd8d7a0f407950af2828617caa2cbc8564a8bfe6c93625b
-
SSDEEP
12288:ZMrYy90b3brxBN4FdFynLszbHw03KFvijorCSmsXzQMSrQMsiOc6H4AbZCG6AXz:Zy+bVBN4FdFSETw058sYQMuQMGc6H5D
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2544-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2544-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2544-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2544-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2544-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2544-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2172 x9079639.exe 3056 x7251593.exe 2728 x2309458.exe 2748 g3061500.exe -
Loads dropped DLL 13 IoCs
pid Process 2060 a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe 2172 x9079639.exe 2172 x9079639.exe 3056 x7251593.exe 3056 x7251593.exe 2728 x2309458.exe 2728 x2309458.exe 2728 x2309458.exe 2748 g3061500.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9079639.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7251593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2309458.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 2544 2748 g3061500.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2644 2748 WerFault.exe 31 2788 2544 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2172 2060 a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe 28 PID 2060 wrote to memory of 2172 2060 a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe 28 PID 2060 wrote to memory of 2172 2060 a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe 28 PID 2060 wrote to memory of 2172 2060 a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe 28 PID 2060 wrote to memory of 2172 2060 a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe 28 PID 2060 wrote to memory of 2172 2060 a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe 28 PID 2060 wrote to memory of 2172 2060 a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe 28 PID 2172 wrote to memory of 3056 2172 x9079639.exe 29 PID 2172 wrote to memory of 3056 2172 x9079639.exe 29 PID 2172 wrote to memory of 3056 2172 x9079639.exe 29 PID 2172 wrote to memory of 3056 2172 x9079639.exe 29 PID 2172 wrote to memory of 3056 2172 x9079639.exe 29 PID 2172 wrote to memory of 3056 2172 x9079639.exe 29 PID 2172 wrote to memory of 3056 2172 x9079639.exe 29 PID 3056 wrote to memory of 2728 3056 x7251593.exe 30 PID 3056 wrote to memory of 2728 3056 x7251593.exe 30 PID 3056 wrote to memory of 2728 3056 x7251593.exe 30 PID 3056 wrote to memory of 2728 3056 x7251593.exe 30 PID 3056 wrote to memory of 2728 3056 x7251593.exe 30 PID 3056 wrote to memory of 2728 3056 x7251593.exe 30 PID 3056 wrote to memory of 2728 3056 x7251593.exe 30 PID 2728 wrote to memory of 2748 2728 x2309458.exe 31 PID 2728 wrote to memory of 2748 2728 x2309458.exe 31 PID 2728 wrote to memory of 2748 2728 x2309458.exe 31 PID 2728 wrote to memory of 2748 2728 x2309458.exe 31 PID 2728 wrote to memory of 2748 2728 x2309458.exe 31 PID 2728 wrote to memory of 2748 2728 x2309458.exe 31 PID 2728 wrote to memory of 2748 2728 x2309458.exe 31 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2544 2748 g3061500.exe 33 PID 2748 wrote to memory of 2644 2748 g3061500.exe 34 PID 2748 wrote to memory of 2644 2748 g3061500.exe 34 PID 2748 wrote to memory of 2644 2748 g3061500.exe 34 PID 2748 wrote to memory of 2644 2748 g3061500.exe 34 PID 2748 wrote to memory of 2644 2748 g3061500.exe 34 PID 2748 wrote to memory of 2644 2748 g3061500.exe 34 PID 2748 wrote to memory of 2644 2748 g3061500.exe 34 PID 2544 wrote to memory of 2788 2544 AppLaunch.exe 35 PID 2544 wrote to memory of 2788 2544 AppLaunch.exe 35 PID 2544 wrote to memory of 2788 2544 AppLaunch.exe 35 PID 2544 wrote to memory of 2788 2544 AppLaunch.exe 35 PID 2544 wrote to memory of 2788 2544 AppLaunch.exe 35 PID 2544 wrote to memory of 2788 2544 AppLaunch.exe 35 PID 2544 wrote to memory of 2788 2544 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe"C:\Users\Admin\AppData\Local\Temp\a347221b4d6b0e225e60632d367f931c47ce81a4d0bce1893c3d400bf39b9183.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9079639.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9079639.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7251593.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7251593.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2309458.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2309458.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3061500.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3061500.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 2687⤵
- Program crash
PID:2788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2644
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD58f175ca47a7d52480f9d7dbfd93845c4
SHA1c76f60bd414932b07e247a84bd7766bd9367297c
SHA256b5b4394b5e9a9bf2c6af82de5034519983289cab058b5690806f22bcabeb9bd2
SHA512a7b30076be90aac169bf14396b8ed63615d0ec9d629e5a5bd0b723b4b8321618edd1124db14c2e79061630631b941d986683465e73d1beab8bc6524d817ee3ab
-
Filesize
826KB
MD58f175ca47a7d52480f9d7dbfd93845c4
SHA1c76f60bd414932b07e247a84bd7766bd9367297c
SHA256b5b4394b5e9a9bf2c6af82de5034519983289cab058b5690806f22bcabeb9bd2
SHA512a7b30076be90aac169bf14396b8ed63615d0ec9d629e5a5bd0b723b4b8321618edd1124db14c2e79061630631b941d986683465e73d1beab8bc6524d817ee3ab
-
Filesize
555KB
MD57abc43a033ed31c3b5f2c4979f09c60e
SHA15880cbf58877c8a75a65b5c4cc5a56ec314c8148
SHA2567215e5959bb4c73628a52e1631c00f71e743a2574e0d14524b5fc1e69bdacd62
SHA5125a2b3ea983b905a2b9dc7505c6330edfef88b483f9f63ab780ff29d95a3f7b1211835d71513cdc7a87311cd6ecb18525aa6d32c223ce3eb74db13b26ee20a23e
-
Filesize
555KB
MD57abc43a033ed31c3b5f2c4979f09c60e
SHA15880cbf58877c8a75a65b5c4cc5a56ec314c8148
SHA2567215e5959bb4c73628a52e1631c00f71e743a2574e0d14524b5fc1e69bdacd62
SHA5125a2b3ea983b905a2b9dc7505c6330edfef88b483f9f63ab780ff29d95a3f7b1211835d71513cdc7a87311cd6ecb18525aa6d32c223ce3eb74db13b26ee20a23e
-
Filesize
390KB
MD5e646f28ea1f6dff6cf3fb3fe0bf1df0e
SHA19dab2697a30318712c67e6cd8060fee4b3867ccb
SHA256b4e078259f98bdfef6303e1768a079d295e7b66c0d16de897e5ba35deb51a7d2
SHA51229fa05024bba2c3c8ff7b37be91e67a9582f322858327a48f295cba8931d2842ab4db98e9f9498b8c3a51e5aeb2dacdf02e6195a526639336d90041e42f8c5fe
-
Filesize
390KB
MD5e646f28ea1f6dff6cf3fb3fe0bf1df0e
SHA19dab2697a30318712c67e6cd8060fee4b3867ccb
SHA256b4e078259f98bdfef6303e1768a079d295e7b66c0d16de897e5ba35deb51a7d2
SHA51229fa05024bba2c3c8ff7b37be91e67a9582f322858327a48f295cba8931d2842ab4db98e9f9498b8c3a51e5aeb2dacdf02e6195a526639336d90041e42f8c5fe
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
826KB
MD58f175ca47a7d52480f9d7dbfd93845c4
SHA1c76f60bd414932b07e247a84bd7766bd9367297c
SHA256b5b4394b5e9a9bf2c6af82de5034519983289cab058b5690806f22bcabeb9bd2
SHA512a7b30076be90aac169bf14396b8ed63615d0ec9d629e5a5bd0b723b4b8321618edd1124db14c2e79061630631b941d986683465e73d1beab8bc6524d817ee3ab
-
Filesize
826KB
MD58f175ca47a7d52480f9d7dbfd93845c4
SHA1c76f60bd414932b07e247a84bd7766bd9367297c
SHA256b5b4394b5e9a9bf2c6af82de5034519983289cab058b5690806f22bcabeb9bd2
SHA512a7b30076be90aac169bf14396b8ed63615d0ec9d629e5a5bd0b723b4b8321618edd1124db14c2e79061630631b941d986683465e73d1beab8bc6524d817ee3ab
-
Filesize
555KB
MD57abc43a033ed31c3b5f2c4979f09c60e
SHA15880cbf58877c8a75a65b5c4cc5a56ec314c8148
SHA2567215e5959bb4c73628a52e1631c00f71e743a2574e0d14524b5fc1e69bdacd62
SHA5125a2b3ea983b905a2b9dc7505c6330edfef88b483f9f63ab780ff29d95a3f7b1211835d71513cdc7a87311cd6ecb18525aa6d32c223ce3eb74db13b26ee20a23e
-
Filesize
555KB
MD57abc43a033ed31c3b5f2c4979f09c60e
SHA15880cbf58877c8a75a65b5c4cc5a56ec314c8148
SHA2567215e5959bb4c73628a52e1631c00f71e743a2574e0d14524b5fc1e69bdacd62
SHA5125a2b3ea983b905a2b9dc7505c6330edfef88b483f9f63ab780ff29d95a3f7b1211835d71513cdc7a87311cd6ecb18525aa6d32c223ce3eb74db13b26ee20a23e
-
Filesize
390KB
MD5e646f28ea1f6dff6cf3fb3fe0bf1df0e
SHA19dab2697a30318712c67e6cd8060fee4b3867ccb
SHA256b4e078259f98bdfef6303e1768a079d295e7b66c0d16de897e5ba35deb51a7d2
SHA51229fa05024bba2c3c8ff7b37be91e67a9582f322858327a48f295cba8931d2842ab4db98e9f9498b8c3a51e5aeb2dacdf02e6195a526639336d90041e42f8c5fe
-
Filesize
390KB
MD5e646f28ea1f6dff6cf3fb3fe0bf1df0e
SHA19dab2697a30318712c67e6cd8060fee4b3867ccb
SHA256b4e078259f98bdfef6303e1768a079d295e7b66c0d16de897e5ba35deb51a7d2
SHA51229fa05024bba2c3c8ff7b37be91e67a9582f322858327a48f295cba8931d2842ab4db98e9f9498b8c3a51e5aeb2dacdf02e6195a526639336d90041e42f8c5fe
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74