Analysis
-
max time kernel
118s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe
Resource
win10v2004-20230915-en
General
-
Target
933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe
-
Size
848KB
-
MD5
4894a8dae3964b1a648b585a0a9dab4a
-
SHA1
65f0a461003508d18fafe4d9692f866191fb5f73
-
SHA256
933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555
-
SHA512
898be57f574071149b88f97366705007b1f6ea40a8e173ff08ffc40bdb019c67efc33cdb054eb387980f1a5c30f74642720849021853d5bc8ca73fd5a2249c7f
-
SSDEEP
12288:kMr2y9046GLQbmTB7B4ehWcciSyCOySTwFhKM9/1nhLGSFCjGlOvZxoWiBlsDQh/:CyYwZB4UW7in9mt/1hlCsOgWivhyI
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2516-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2516-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2516-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2516-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2516-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2516-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2824 x8827372.exe 2116 x1163751.exe 2816 x9906571.exe 2620 g7068801.exe -
Loads dropped DLL 13 IoCs
pid Process 1700 933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe 2824 x8827372.exe 2824 x8827372.exe 2116 x1163751.exe 2116 x1163751.exe 2816 x9906571.exe 2816 x9906571.exe 2816 x9906571.exe 2620 g7068801.exe 2660 WerFault.exe 2660 WerFault.exe 2660 WerFault.exe 2660 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8827372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1163751.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9906571.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2620 set thread context of 2516 2620 g7068801.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2660 2620 WerFault.exe 31 2544 2516 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2824 1700 933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe 28 PID 1700 wrote to memory of 2824 1700 933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe 28 PID 1700 wrote to memory of 2824 1700 933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe 28 PID 1700 wrote to memory of 2824 1700 933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe 28 PID 1700 wrote to memory of 2824 1700 933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe 28 PID 1700 wrote to memory of 2824 1700 933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe 28 PID 1700 wrote to memory of 2824 1700 933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe 28 PID 2824 wrote to memory of 2116 2824 x8827372.exe 29 PID 2824 wrote to memory of 2116 2824 x8827372.exe 29 PID 2824 wrote to memory of 2116 2824 x8827372.exe 29 PID 2824 wrote to memory of 2116 2824 x8827372.exe 29 PID 2824 wrote to memory of 2116 2824 x8827372.exe 29 PID 2824 wrote to memory of 2116 2824 x8827372.exe 29 PID 2824 wrote to memory of 2116 2824 x8827372.exe 29 PID 2116 wrote to memory of 2816 2116 x1163751.exe 30 PID 2116 wrote to memory of 2816 2116 x1163751.exe 30 PID 2116 wrote to memory of 2816 2116 x1163751.exe 30 PID 2116 wrote to memory of 2816 2116 x1163751.exe 30 PID 2116 wrote to memory of 2816 2116 x1163751.exe 30 PID 2116 wrote to memory of 2816 2116 x1163751.exe 30 PID 2116 wrote to memory of 2816 2116 x1163751.exe 30 PID 2816 wrote to memory of 2620 2816 x9906571.exe 31 PID 2816 wrote to memory of 2620 2816 x9906571.exe 31 PID 2816 wrote to memory of 2620 2816 x9906571.exe 31 PID 2816 wrote to memory of 2620 2816 x9906571.exe 31 PID 2816 wrote to memory of 2620 2816 x9906571.exe 31 PID 2816 wrote to memory of 2620 2816 x9906571.exe 31 PID 2816 wrote to memory of 2620 2816 x9906571.exe 31 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2516 2620 g7068801.exe 33 PID 2620 wrote to memory of 2660 2620 g7068801.exe 34 PID 2620 wrote to memory of 2660 2620 g7068801.exe 34 PID 2620 wrote to memory of 2660 2620 g7068801.exe 34 PID 2620 wrote to memory of 2660 2620 g7068801.exe 34 PID 2620 wrote to memory of 2660 2620 g7068801.exe 34 PID 2620 wrote to memory of 2660 2620 g7068801.exe 34 PID 2620 wrote to memory of 2660 2620 g7068801.exe 34 PID 2516 wrote to memory of 2544 2516 AppLaunch.exe 35 PID 2516 wrote to memory of 2544 2516 AppLaunch.exe 35 PID 2516 wrote to memory of 2544 2516 AppLaunch.exe 35 PID 2516 wrote to memory of 2544 2516 AppLaunch.exe 35 PID 2516 wrote to memory of 2544 2516 AppLaunch.exe 35 PID 2516 wrote to memory of 2544 2516 AppLaunch.exe 35 PID 2516 wrote to memory of 2544 2516 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe"C:\Users\Admin\AppData\Local\Temp\933ef839a5d23d482dc31264f665b7c00edece81640ffa0ba0621c714c267555.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8827372.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8827372.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1163751.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1163751.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9906571.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9906571.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7068801.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7068801.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 2687⤵
- Program crash
PID:2544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2660
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
746KB
MD5820f72fa2c7b5ebc0ce688f64468b37f
SHA18c2a47ecd1e8ae1d5fc4b73aab96a7ab1b06eac8
SHA256fbd176b9eeb544f2ddfdb6d12fb9eb752eed862f024acac9ad68f03dbcd91fb4
SHA512adecc675cf3ca7d553dff40aecc6843ff4cdb78fc3506f29ea9fc81d0d3266ba1d1a25426b10550eec380cf1216ac13235cc1aa6518a50ab2f6a04338f8269b5
-
Filesize
746KB
MD5820f72fa2c7b5ebc0ce688f64468b37f
SHA18c2a47ecd1e8ae1d5fc4b73aab96a7ab1b06eac8
SHA256fbd176b9eeb544f2ddfdb6d12fb9eb752eed862f024acac9ad68f03dbcd91fb4
SHA512adecc675cf3ca7d553dff40aecc6843ff4cdb78fc3506f29ea9fc81d0d3266ba1d1a25426b10550eec380cf1216ac13235cc1aa6518a50ab2f6a04338f8269b5
-
Filesize
516KB
MD5f6d3c34d8ca4375ae75facf59d42606f
SHA13cd30d934290815dddcf8b03a26b7b4a5312248d
SHA256b695aaec18bee39c7bafc0e35b3dfd53ff0769f773a8c8eff2f4c98b786639e1
SHA5124bfca60683a97a959aad64d1a03de9ea86b031b529c3b4f1198604303d45bbac0200383110d987eb85f97231a89e6264dca1186d8d81d7a5e8e9de55630994d6
-
Filesize
516KB
MD5f6d3c34d8ca4375ae75facf59d42606f
SHA13cd30d934290815dddcf8b03a26b7b4a5312248d
SHA256b695aaec18bee39c7bafc0e35b3dfd53ff0769f773a8c8eff2f4c98b786639e1
SHA5124bfca60683a97a959aad64d1a03de9ea86b031b529c3b4f1198604303d45bbac0200383110d987eb85f97231a89e6264dca1186d8d81d7a5e8e9de55630994d6
-
Filesize
350KB
MD52b939da28ef7ca1ff85338429266ee42
SHA1da562468685421159a5b4a3caf3f1636bff213b3
SHA25615dbaa16713f2f3921ff2ab3de7ce87114355843692cd1a6f0bb5573274290c9
SHA512aaf986d2f75a65284cc91de4a5d274ddffdada4f955c754819fdced3430959980d183d64d48eab41c25de16072082cf3f87a0526aa3a63d5d6ef918265a02982
-
Filesize
350KB
MD52b939da28ef7ca1ff85338429266ee42
SHA1da562468685421159a5b4a3caf3f1636bff213b3
SHA25615dbaa16713f2f3921ff2ab3de7ce87114355843692cd1a6f0bb5573274290c9
SHA512aaf986d2f75a65284cc91de4a5d274ddffdada4f955c754819fdced3430959980d183d64d48eab41c25de16072082cf3f87a0526aa3a63d5d6ef918265a02982
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c
-
Filesize
746KB
MD5820f72fa2c7b5ebc0ce688f64468b37f
SHA18c2a47ecd1e8ae1d5fc4b73aab96a7ab1b06eac8
SHA256fbd176b9eeb544f2ddfdb6d12fb9eb752eed862f024acac9ad68f03dbcd91fb4
SHA512adecc675cf3ca7d553dff40aecc6843ff4cdb78fc3506f29ea9fc81d0d3266ba1d1a25426b10550eec380cf1216ac13235cc1aa6518a50ab2f6a04338f8269b5
-
Filesize
746KB
MD5820f72fa2c7b5ebc0ce688f64468b37f
SHA18c2a47ecd1e8ae1d5fc4b73aab96a7ab1b06eac8
SHA256fbd176b9eeb544f2ddfdb6d12fb9eb752eed862f024acac9ad68f03dbcd91fb4
SHA512adecc675cf3ca7d553dff40aecc6843ff4cdb78fc3506f29ea9fc81d0d3266ba1d1a25426b10550eec380cf1216ac13235cc1aa6518a50ab2f6a04338f8269b5
-
Filesize
516KB
MD5f6d3c34d8ca4375ae75facf59d42606f
SHA13cd30d934290815dddcf8b03a26b7b4a5312248d
SHA256b695aaec18bee39c7bafc0e35b3dfd53ff0769f773a8c8eff2f4c98b786639e1
SHA5124bfca60683a97a959aad64d1a03de9ea86b031b529c3b4f1198604303d45bbac0200383110d987eb85f97231a89e6264dca1186d8d81d7a5e8e9de55630994d6
-
Filesize
516KB
MD5f6d3c34d8ca4375ae75facf59d42606f
SHA13cd30d934290815dddcf8b03a26b7b4a5312248d
SHA256b695aaec18bee39c7bafc0e35b3dfd53ff0769f773a8c8eff2f4c98b786639e1
SHA5124bfca60683a97a959aad64d1a03de9ea86b031b529c3b4f1198604303d45bbac0200383110d987eb85f97231a89e6264dca1186d8d81d7a5e8e9de55630994d6
-
Filesize
350KB
MD52b939da28ef7ca1ff85338429266ee42
SHA1da562468685421159a5b4a3caf3f1636bff213b3
SHA25615dbaa16713f2f3921ff2ab3de7ce87114355843692cd1a6f0bb5573274290c9
SHA512aaf986d2f75a65284cc91de4a5d274ddffdada4f955c754819fdced3430959980d183d64d48eab41c25de16072082cf3f87a0526aa3a63d5d6ef918265a02982
-
Filesize
350KB
MD52b939da28ef7ca1ff85338429266ee42
SHA1da562468685421159a5b4a3caf3f1636bff213b3
SHA25615dbaa16713f2f3921ff2ab3de7ce87114355843692cd1a6f0bb5573274290c9
SHA512aaf986d2f75a65284cc91de4a5d274ddffdada4f955c754819fdced3430959980d183d64d48eab41c25de16072082cf3f87a0526aa3a63d5d6ef918265a02982
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c
-
Filesize
276KB
MD5a21d95b53268c7a5d2f751aa7379eddf
SHA18bcd6036d95e8e630ed06572b921e0395dc1111f
SHA2560bd342b7feb474e1c64638efab03b833c4699319c5fc60b5e84a4e05e9304092
SHA512a24f223f4afa78fb624d9f01ba8198ca31a61186cf435ce20067c412b2d9d13f2b6b9aaefb79ae12ac17b4c50684b6c0b7900a1e9ca97e3920cd0db74d3b3f5c