Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 17:33
Static task
static1
Behavioral task
behavioral1
Sample
4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe
-
Size
696KB
-
MD5
075b4db83c7bcbde6efd1e8cd3b210a2
-
SHA1
eaea0611f8de30886a21ca97769fd1606671631e
-
SHA256
4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015
-
SHA512
d2eaba3c64cd10a1a10872bfe8b771883af6bebb5ab9eee50e8cdf0b3499ef10abee321d1ab68e29f5bc9eb9cb7fe825ff1bfc0be455fcf2af315a5161e9d8a1
-
SSDEEP
12288:hMrUy90Yq/smRbRcteoabjD7z61iHlrdMCB1B2w7K1t7RbfRvf6uT5:Ryfq/PbYeFYiHvzV7GZD6m5
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2512-62-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2512-63-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2512-64-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2512-66-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2512-68-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2512-70-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1HQ87qh6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1HQ87qh6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1HQ87qh6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1HQ87qh6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1HQ87qh6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1HQ87qh6.exe -
Executes dropped EXE 3 IoCs
pid Process 2584 Gg0uU14.exe 2352 1HQ87qh6.exe 2528 2eN5607.exe -
Loads dropped DLL 11 IoCs
pid Process 1596 4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe 2584 Gg0uU14.exe 2584 Gg0uU14.exe 2352 1HQ87qh6.exe 2584 Gg0uU14.exe 2584 Gg0uU14.exe 2528 2eN5607.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1HQ87qh6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1HQ87qh6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Gg0uU14.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 2512 2528 2eN5607.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 3060 2528 WerFault.exe 30 2092 2512 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2352 1HQ87qh6.exe 2352 1HQ87qh6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2352 1HQ87qh6.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2584 1596 4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe 28 PID 1596 wrote to memory of 2584 1596 4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe 28 PID 1596 wrote to memory of 2584 1596 4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe 28 PID 1596 wrote to memory of 2584 1596 4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe 28 PID 1596 wrote to memory of 2584 1596 4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe 28 PID 1596 wrote to memory of 2584 1596 4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe 28 PID 1596 wrote to memory of 2584 1596 4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe 28 PID 2584 wrote to memory of 2352 2584 Gg0uU14.exe 29 PID 2584 wrote to memory of 2352 2584 Gg0uU14.exe 29 PID 2584 wrote to memory of 2352 2584 Gg0uU14.exe 29 PID 2584 wrote to memory of 2352 2584 Gg0uU14.exe 29 PID 2584 wrote to memory of 2352 2584 Gg0uU14.exe 29 PID 2584 wrote to memory of 2352 2584 Gg0uU14.exe 29 PID 2584 wrote to memory of 2352 2584 Gg0uU14.exe 29 PID 2584 wrote to memory of 2528 2584 Gg0uU14.exe 30 PID 2584 wrote to memory of 2528 2584 Gg0uU14.exe 30 PID 2584 wrote to memory of 2528 2584 Gg0uU14.exe 30 PID 2584 wrote to memory of 2528 2584 Gg0uU14.exe 30 PID 2584 wrote to memory of 2528 2584 Gg0uU14.exe 30 PID 2584 wrote to memory of 2528 2584 Gg0uU14.exe 30 PID 2584 wrote to memory of 2528 2584 Gg0uU14.exe 30 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 2512 2528 2eN5607.exe 32 PID 2528 wrote to memory of 3060 2528 2eN5607.exe 33 PID 2528 wrote to memory of 3060 2528 2eN5607.exe 33 PID 2528 wrote to memory of 3060 2528 2eN5607.exe 33 PID 2528 wrote to memory of 3060 2528 2eN5607.exe 33 PID 2528 wrote to memory of 3060 2528 2eN5607.exe 33 PID 2528 wrote to memory of 3060 2528 2eN5607.exe 33 PID 2528 wrote to memory of 3060 2528 2eN5607.exe 33 PID 2512 wrote to memory of 2092 2512 AppLaunch.exe 34 PID 2512 wrote to memory of 2092 2512 AppLaunch.exe 34 PID 2512 wrote to memory of 2092 2512 AppLaunch.exe 34 PID 2512 wrote to memory of 2092 2512 AppLaunch.exe 34 PID 2512 wrote to memory of 2092 2512 AppLaunch.exe 34 PID 2512 wrote to memory of 2092 2512 AppLaunch.exe 34 PID 2512 wrote to memory of 2092 2512 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe"C:\Users\Admin\AppData\Local\Temp\4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gg0uU14.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gg0uU14.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1HQ87qh6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1HQ87qh6.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 2685⤵
- Program crash
PID:2092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 2844⤵
- Loads dropped DLL
- Program crash
PID:3060
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD5af08aed92c4ce6c1026b3e0745e9b73b
SHA14dc257f502e59e08eb2da442b155b7c1828f26d6
SHA2560b60cc1f42eea5e66d777a5b2ccb22eb8aca6ea1be18754534c951b85631ff0c
SHA5128ec90e5e479c7a283e71e640481ed5e873c905c8d5d9089c345b57dc532617669e51557b0ffeeead942d3341bd9510323e5996891eabf37d1c394578b58477d8
-
Filesize
452KB
MD5af08aed92c4ce6c1026b3e0745e9b73b
SHA14dc257f502e59e08eb2da442b155b7c1828f26d6
SHA2560b60cc1f42eea5e66d777a5b2ccb22eb8aca6ea1be18754534c951b85631ff0c
SHA5128ec90e5e479c7a283e71e640481ed5e873c905c8d5d9089c345b57dc532617669e51557b0ffeeead942d3341bd9510323e5996891eabf37d1c394578b58477d8
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
452KB
MD5af08aed92c4ce6c1026b3e0745e9b73b
SHA14dc257f502e59e08eb2da442b155b7c1828f26d6
SHA2560b60cc1f42eea5e66d777a5b2ccb22eb8aca6ea1be18754534c951b85631ff0c
SHA5128ec90e5e479c7a283e71e640481ed5e873c905c8d5d9089c345b57dc532617669e51557b0ffeeead942d3341bd9510323e5996891eabf37d1c394578b58477d8
-
Filesize
452KB
MD5af08aed92c4ce6c1026b3e0745e9b73b
SHA14dc257f502e59e08eb2da442b155b7c1828f26d6
SHA2560b60cc1f42eea5e66d777a5b2ccb22eb8aca6ea1be18754534c951b85631ff0c
SHA5128ec90e5e479c7a283e71e640481ed5e873c905c8d5d9089c345b57dc532617669e51557b0ffeeead942d3341bd9510323e5996891eabf37d1c394578b58477d8
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3