Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:22

General

  • Target

    0913538d8b20385c7404ce9a727c4fd85a20afc0b6d2eb37352874ba776fd10e.exe

  • Size

    994KB

  • MD5

    45ca2867d4b76c51dcc1acbb58b5bf5f

  • SHA1

    9b1b1753f398b13053698f5208e28d28d2864b17

  • SHA256

    0913538d8b20385c7404ce9a727c4fd85a20afc0b6d2eb37352874ba776fd10e

  • SHA512

    961da8d842e7098c42b91ea433734ee2834f2e6ecfa63e97c6c90a2fe5559f636ab23c5987f12fc5f9e8974a9a7086a22c327f7c61d168525adda2b7d84d4118

  • SSDEEP

    24576:XyeLu358WBzN6nA7dBpsS19Z8LzN35FVgSeDd:i5vD2osS1KFqX

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0913538d8b20385c7404ce9a727c4fd85a20afc0b6d2eb37352874ba776fd10e.exe
    "C:\Users\Admin\AppData\Local\Temp\0913538d8b20385c7404ce9a727c4fd85a20afc0b6d2eb37352874ba776fd10e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2982742.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2982742.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6669333.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6669333.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1144533.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1144533.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7395171.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7395171.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9560689.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9560689.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2668
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2052
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2708
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 268
                  8⤵
                  • Program crash
                  PID:2528
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2982742.exe

    Filesize

    893KB

    MD5

    7f93610f52714d00ecc4e1798b912cfd

    SHA1

    e3e634337ca35ac041caf8a997451e1e6373d484

    SHA256

    7a7ee864d30bdb3b8b7350a6ec82291d91b7d9cb776f5391f08e667c414821c7

    SHA512

    024adc27e95741edbfa910020fd275a880ead32ba7dadf4e99be4168a0ebc85ee0378dc6ccfecd3a32134429ee3d786240fc1618f86ec54cd777bab25027608d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2982742.exe

    Filesize

    893KB

    MD5

    7f93610f52714d00ecc4e1798b912cfd

    SHA1

    e3e634337ca35ac041caf8a997451e1e6373d484

    SHA256

    7a7ee864d30bdb3b8b7350a6ec82291d91b7d9cb776f5391f08e667c414821c7

    SHA512

    024adc27e95741edbfa910020fd275a880ead32ba7dadf4e99be4168a0ebc85ee0378dc6ccfecd3a32134429ee3d786240fc1618f86ec54cd777bab25027608d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6669333.exe

    Filesize

    709KB

    MD5

    04429e12de6263e986d4b54655a79a47

    SHA1

    dd03a5a442fcec5f2561335870ee1375ee8f850e

    SHA256

    0f5550f61380d1213e8e9dc12002aefdc6eac7ba241aaf7c802662be0b669002

    SHA512

    cbb75033193cce482db385eda98bf29cee67f0520adff75c302a6dc6b865fee13cbe3f52d8b475201fe7f678e5f5e3a83ab12795389cd16fcaecaa73a5266872

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6669333.exe

    Filesize

    709KB

    MD5

    04429e12de6263e986d4b54655a79a47

    SHA1

    dd03a5a442fcec5f2561335870ee1375ee8f850e

    SHA256

    0f5550f61380d1213e8e9dc12002aefdc6eac7ba241aaf7c802662be0b669002

    SHA512

    cbb75033193cce482db385eda98bf29cee67f0520adff75c302a6dc6b865fee13cbe3f52d8b475201fe7f678e5f5e3a83ab12795389cd16fcaecaa73a5266872

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1144533.exe

    Filesize

    527KB

    MD5

    e01dddd3b7c09f326bf0414b1ad47608

    SHA1

    45ac52bf915c798c37c3fc5ad4d359ab78a63d6b

    SHA256

    679cc51bf1578f98104cb460208e6469e5a6f666b04abb5ac9b72ad76f36dc19

    SHA512

    6f94e51caacc04374a27284217dee4bcdf6b2530b3f2ccc75a5bf1a7c0f8586200a02838bd6b653d30cb194962743e61c687eaf3776beddb8323b3fe302097d8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1144533.exe

    Filesize

    527KB

    MD5

    e01dddd3b7c09f326bf0414b1ad47608

    SHA1

    45ac52bf915c798c37c3fc5ad4d359ab78a63d6b

    SHA256

    679cc51bf1578f98104cb460208e6469e5a6f666b04abb5ac9b72ad76f36dc19

    SHA512

    6f94e51caacc04374a27284217dee4bcdf6b2530b3f2ccc75a5bf1a7c0f8586200a02838bd6b653d30cb194962743e61c687eaf3776beddb8323b3fe302097d8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7395171.exe

    Filesize

    296KB

    MD5

    4783da6aec5126b3b7cd1ed46126b82e

    SHA1

    c5bb2e9b0e68d0617644877db47dd15ed57099da

    SHA256

    3c702cb760064c17d6a17da48b9dd4132b9f5870e7b6cfe4a24de9c27a849b49

    SHA512

    96c2514737bb2b372f69e7d839ba2b1f4c3f1e4cf2a3842526769a4e6db5b400204e5d9b0f7db76434f5844ae94392392c2aaf7c65cb8b0687d80451238501cc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7395171.exe

    Filesize

    296KB

    MD5

    4783da6aec5126b3b7cd1ed46126b82e

    SHA1

    c5bb2e9b0e68d0617644877db47dd15ed57099da

    SHA256

    3c702cb760064c17d6a17da48b9dd4132b9f5870e7b6cfe4a24de9c27a849b49

    SHA512

    96c2514737bb2b372f69e7d839ba2b1f4c3f1e4cf2a3842526769a4e6db5b400204e5d9b0f7db76434f5844ae94392392c2aaf7c65cb8b0687d80451238501cc

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9560689.exe

    Filesize

    11KB

    MD5

    b530de265c83d5fe298e29c97e106d63

    SHA1

    c895f9bb76f26056719c587e2e62e23751ef3bd0

    SHA256

    3cefc7b492ac144052388b62f1491823b9559226fd315efa8486011907fc18f7

    SHA512

    4c415590a9862fd6256998e986982d1e03590993349dd0eda21244acf950c143992aa6929747ab8ce82457513a65f54fda8b77434da54af28f603b464f7f1fe2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9560689.exe

    Filesize

    11KB

    MD5

    b530de265c83d5fe298e29c97e106d63

    SHA1

    c895f9bb76f26056719c587e2e62e23751ef3bd0

    SHA256

    3cefc7b492ac144052388b62f1491823b9559226fd315efa8486011907fc18f7

    SHA512

    4c415590a9862fd6256998e986982d1e03590993349dd0eda21244acf950c143992aa6929747ab8ce82457513a65f54fda8b77434da54af28f603b464f7f1fe2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2982742.exe

    Filesize

    893KB

    MD5

    7f93610f52714d00ecc4e1798b912cfd

    SHA1

    e3e634337ca35ac041caf8a997451e1e6373d484

    SHA256

    7a7ee864d30bdb3b8b7350a6ec82291d91b7d9cb776f5391f08e667c414821c7

    SHA512

    024adc27e95741edbfa910020fd275a880ead32ba7dadf4e99be4168a0ebc85ee0378dc6ccfecd3a32134429ee3d786240fc1618f86ec54cd777bab25027608d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2982742.exe

    Filesize

    893KB

    MD5

    7f93610f52714d00ecc4e1798b912cfd

    SHA1

    e3e634337ca35ac041caf8a997451e1e6373d484

    SHA256

    7a7ee864d30bdb3b8b7350a6ec82291d91b7d9cb776f5391f08e667c414821c7

    SHA512

    024adc27e95741edbfa910020fd275a880ead32ba7dadf4e99be4168a0ebc85ee0378dc6ccfecd3a32134429ee3d786240fc1618f86ec54cd777bab25027608d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6669333.exe

    Filesize

    709KB

    MD5

    04429e12de6263e986d4b54655a79a47

    SHA1

    dd03a5a442fcec5f2561335870ee1375ee8f850e

    SHA256

    0f5550f61380d1213e8e9dc12002aefdc6eac7ba241aaf7c802662be0b669002

    SHA512

    cbb75033193cce482db385eda98bf29cee67f0520adff75c302a6dc6b865fee13cbe3f52d8b475201fe7f678e5f5e3a83ab12795389cd16fcaecaa73a5266872

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6669333.exe

    Filesize

    709KB

    MD5

    04429e12de6263e986d4b54655a79a47

    SHA1

    dd03a5a442fcec5f2561335870ee1375ee8f850e

    SHA256

    0f5550f61380d1213e8e9dc12002aefdc6eac7ba241aaf7c802662be0b669002

    SHA512

    cbb75033193cce482db385eda98bf29cee67f0520adff75c302a6dc6b865fee13cbe3f52d8b475201fe7f678e5f5e3a83ab12795389cd16fcaecaa73a5266872

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1144533.exe

    Filesize

    527KB

    MD5

    e01dddd3b7c09f326bf0414b1ad47608

    SHA1

    45ac52bf915c798c37c3fc5ad4d359ab78a63d6b

    SHA256

    679cc51bf1578f98104cb460208e6469e5a6f666b04abb5ac9b72ad76f36dc19

    SHA512

    6f94e51caacc04374a27284217dee4bcdf6b2530b3f2ccc75a5bf1a7c0f8586200a02838bd6b653d30cb194962743e61c687eaf3776beddb8323b3fe302097d8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1144533.exe

    Filesize

    527KB

    MD5

    e01dddd3b7c09f326bf0414b1ad47608

    SHA1

    45ac52bf915c798c37c3fc5ad4d359ab78a63d6b

    SHA256

    679cc51bf1578f98104cb460208e6469e5a6f666b04abb5ac9b72ad76f36dc19

    SHA512

    6f94e51caacc04374a27284217dee4bcdf6b2530b3f2ccc75a5bf1a7c0f8586200a02838bd6b653d30cb194962743e61c687eaf3776beddb8323b3fe302097d8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7395171.exe

    Filesize

    296KB

    MD5

    4783da6aec5126b3b7cd1ed46126b82e

    SHA1

    c5bb2e9b0e68d0617644877db47dd15ed57099da

    SHA256

    3c702cb760064c17d6a17da48b9dd4132b9f5870e7b6cfe4a24de9c27a849b49

    SHA512

    96c2514737bb2b372f69e7d839ba2b1f4c3f1e4cf2a3842526769a4e6db5b400204e5d9b0f7db76434f5844ae94392392c2aaf7c65cb8b0687d80451238501cc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7395171.exe

    Filesize

    296KB

    MD5

    4783da6aec5126b3b7cd1ed46126b82e

    SHA1

    c5bb2e9b0e68d0617644877db47dd15ed57099da

    SHA256

    3c702cb760064c17d6a17da48b9dd4132b9f5870e7b6cfe4a24de9c27a849b49

    SHA512

    96c2514737bb2b372f69e7d839ba2b1f4c3f1e4cf2a3842526769a4e6db5b400204e5d9b0f7db76434f5844ae94392392c2aaf7c65cb8b0687d80451238501cc

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9560689.exe

    Filesize

    11KB

    MD5

    b530de265c83d5fe298e29c97e106d63

    SHA1

    c895f9bb76f26056719c587e2e62e23751ef3bd0

    SHA256

    3cefc7b492ac144052388b62f1491823b9559226fd315efa8486011907fc18f7

    SHA512

    4c415590a9862fd6256998e986982d1e03590993349dd0eda21244acf950c143992aa6929747ab8ce82457513a65f54fda8b77434da54af28f603b464f7f1fe2

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9836469.exe

    Filesize

    276KB

    MD5

    4f320dee9a1767599011977ea0a5da93

    SHA1

    87d0b38ebe6af1289745bb59c2595f613bc3487d

    SHA256

    f3f8f4535c9480681461b8332cc7735eb8a43b3509558bf35fe25520a13cf6bf

    SHA512

    316273207a45f67e06633e0f2e35bd852f77c79c2e4385a49d9d735103eaf64f18821780447f3c4bffcccc6b6a5f382c84e281b437459acb936639f157de2356

  • memory/2668-49-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-51-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-48-0x0000000000270000-0x000000000027A000-memory.dmp

    Filesize

    40KB

  • memory/2668-50-0x000007FEF5600000-0x000007FEF5FEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2708-68-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2708-65-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2708-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2708-61-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2708-70-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2708-72-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2708-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2708-66-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2708-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2708-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB