Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:30

General

  • Target

    f9eaee9d430ac99f45dc070e3638aa97c1ff48d9309ea1c25b752b056db59cfd.exe

  • Size

    986KB

  • MD5

    80fc8c4437b5fd3cfeecde8a175b6927

  • SHA1

    38661276e3efbee7d2319873f06df8b1d1b3d51f

  • SHA256

    f9eaee9d430ac99f45dc070e3638aa97c1ff48d9309ea1c25b752b056db59cfd

  • SHA512

    4c6b407bc8e0b822e58faf7aa6554c503726c7866da94ca3a22ea5917003268ca41f95f6f29b5ebddb92eb424147fac2606e0d9eb08ae2aef652e2954674bf5c

  • SSDEEP

    24576:lyU5GmUim3c3OxxBxt74HDu390Wp1z/i/d1A9zWKDsW:AKGkOzBxt0u39xp1Dui9zW

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9eaee9d430ac99f45dc070e3638aa97c1ff48d9309ea1c25b752b056db59cfd.exe
    "C:\Users\Admin\AppData\Local\Temp\f9eaee9d430ac99f45dc070e3638aa97c1ff48d9309ea1c25b752b056db59cfd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0113943.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0113943.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5784870.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5784870.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6483160.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6483160.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2340
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1339842.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1339842.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2820
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5190116.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5190116.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2772
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2800
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2576
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 268
                  8⤵
                  • Program crash
                  PID:2016
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0113943.exe

    Filesize

    888KB

    MD5

    e71672017894c4bfaaaa812e9ab3c40d

    SHA1

    1aad9ec327b19359a690157353fe2f6b71a14125

    SHA256

    8a126ca5accaa1c6a0aea6788e15f388512a99e0402de57c31de106bc9b08359

    SHA512

    92b23eca42a27c921e1aaa3717b7a505fe452ed178f634701283cb1df5ad982289cf84ccc833d671f493adf31c85ffc5054da5be8c37cf74638d5a8f0a198ea0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0113943.exe

    Filesize

    888KB

    MD5

    e71672017894c4bfaaaa812e9ab3c40d

    SHA1

    1aad9ec327b19359a690157353fe2f6b71a14125

    SHA256

    8a126ca5accaa1c6a0aea6788e15f388512a99e0402de57c31de106bc9b08359

    SHA512

    92b23eca42a27c921e1aaa3717b7a505fe452ed178f634701283cb1df5ad982289cf84ccc833d671f493adf31c85ffc5054da5be8c37cf74638d5a8f0a198ea0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5784870.exe

    Filesize

    710KB

    MD5

    82e20fa150ef3df6d112ab9f453f8c99

    SHA1

    74676a55ed0bc202efb1b1a064d7a540b7c60328

    SHA256

    cd7374f4bac2b651508a7805a34b167a2a3bdde4274d6b0eb1b58ffd4d3186a7

    SHA512

    4366a4c002a7179c3f1768225689e99cae6ff84d2834ad707ebfcdb77885f5789c001a619b3f089c896418c4de161582a7bbfb31345aeef143f75aaceed0fd3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5784870.exe

    Filesize

    710KB

    MD5

    82e20fa150ef3df6d112ab9f453f8c99

    SHA1

    74676a55ed0bc202efb1b1a064d7a540b7c60328

    SHA256

    cd7374f4bac2b651508a7805a34b167a2a3bdde4274d6b0eb1b58ffd4d3186a7

    SHA512

    4366a4c002a7179c3f1768225689e99cae6ff84d2834ad707ebfcdb77885f5789c001a619b3f089c896418c4de161582a7bbfb31345aeef143f75aaceed0fd3f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6483160.exe

    Filesize

    527KB

    MD5

    ab999c9cca0d1448597c5ff7ebd88bf9

    SHA1

    f0d12ddc8bb1b755d70052c990046ef1204fb712

    SHA256

    53029fb6f4e564b2eb53f656b82d81c239a7f9a0e0748c8b8134497ba9817232

    SHA512

    38519abf327e80c00cfe9f6dc07b075a18dfdb1d960ec6e78374e6c912b84aebbc135fa1cf915f824a0376164eda13e943ca666857aefeb202b85e974a913c3f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6483160.exe

    Filesize

    527KB

    MD5

    ab999c9cca0d1448597c5ff7ebd88bf9

    SHA1

    f0d12ddc8bb1b755d70052c990046ef1204fb712

    SHA256

    53029fb6f4e564b2eb53f656b82d81c239a7f9a0e0748c8b8134497ba9817232

    SHA512

    38519abf327e80c00cfe9f6dc07b075a18dfdb1d960ec6e78374e6c912b84aebbc135fa1cf915f824a0376164eda13e943ca666857aefeb202b85e974a913c3f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1339842.exe

    Filesize

    296KB

    MD5

    b04b91edaf31f755487e95eaa688c6e6

    SHA1

    a6492b7e542ff8fa655496b99d67fdc457975119

    SHA256

    e947f32ae642d870e4b513d0982e88d59e9f08b02cc593e19157c932cc4b6a2c

    SHA512

    e99c18458be3bd5eeddc1fbd96022eb514e28f4d06e1b16e7320acb901ea747f798c792f2b0dd8a927c830c5c0b4578ac369d2e2400367630c84891130f32d4d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1339842.exe

    Filesize

    296KB

    MD5

    b04b91edaf31f755487e95eaa688c6e6

    SHA1

    a6492b7e542ff8fa655496b99d67fdc457975119

    SHA256

    e947f32ae642d870e4b513d0982e88d59e9f08b02cc593e19157c932cc4b6a2c

    SHA512

    e99c18458be3bd5eeddc1fbd96022eb514e28f4d06e1b16e7320acb901ea747f798c792f2b0dd8a927c830c5c0b4578ac369d2e2400367630c84891130f32d4d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5190116.exe

    Filesize

    11KB

    MD5

    4a56bea3b8c1256f2e4b86d9c05d888c

    SHA1

    b374c9c87070c51ad2648e8a3fa49de8314b57f6

    SHA256

    bae44dec8bd26a464557f339406a6d6219b0a28f9f1b0b5c0c90cf59eada81d9

    SHA512

    557ed27d722e7317a13c7f3f92264833ac7f081c7fadc1bd7b7d94b965dde41a9d12610f640520b329415c4a6589b0823d89e69f9416526f890886f8d4f326f1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5190116.exe

    Filesize

    11KB

    MD5

    4a56bea3b8c1256f2e4b86d9c05d888c

    SHA1

    b374c9c87070c51ad2648e8a3fa49de8314b57f6

    SHA256

    bae44dec8bd26a464557f339406a6d6219b0a28f9f1b0b5c0c90cf59eada81d9

    SHA512

    557ed27d722e7317a13c7f3f92264833ac7f081c7fadc1bd7b7d94b965dde41a9d12610f640520b329415c4a6589b0823d89e69f9416526f890886f8d4f326f1

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0113943.exe

    Filesize

    888KB

    MD5

    e71672017894c4bfaaaa812e9ab3c40d

    SHA1

    1aad9ec327b19359a690157353fe2f6b71a14125

    SHA256

    8a126ca5accaa1c6a0aea6788e15f388512a99e0402de57c31de106bc9b08359

    SHA512

    92b23eca42a27c921e1aaa3717b7a505fe452ed178f634701283cb1df5ad982289cf84ccc833d671f493adf31c85ffc5054da5be8c37cf74638d5a8f0a198ea0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z0113943.exe

    Filesize

    888KB

    MD5

    e71672017894c4bfaaaa812e9ab3c40d

    SHA1

    1aad9ec327b19359a690157353fe2f6b71a14125

    SHA256

    8a126ca5accaa1c6a0aea6788e15f388512a99e0402de57c31de106bc9b08359

    SHA512

    92b23eca42a27c921e1aaa3717b7a505fe452ed178f634701283cb1df5ad982289cf84ccc833d671f493adf31c85ffc5054da5be8c37cf74638d5a8f0a198ea0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5784870.exe

    Filesize

    710KB

    MD5

    82e20fa150ef3df6d112ab9f453f8c99

    SHA1

    74676a55ed0bc202efb1b1a064d7a540b7c60328

    SHA256

    cd7374f4bac2b651508a7805a34b167a2a3bdde4274d6b0eb1b58ffd4d3186a7

    SHA512

    4366a4c002a7179c3f1768225689e99cae6ff84d2834ad707ebfcdb77885f5789c001a619b3f089c896418c4de161582a7bbfb31345aeef143f75aaceed0fd3f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5784870.exe

    Filesize

    710KB

    MD5

    82e20fa150ef3df6d112ab9f453f8c99

    SHA1

    74676a55ed0bc202efb1b1a064d7a540b7c60328

    SHA256

    cd7374f4bac2b651508a7805a34b167a2a3bdde4274d6b0eb1b58ffd4d3186a7

    SHA512

    4366a4c002a7179c3f1768225689e99cae6ff84d2834ad707ebfcdb77885f5789c001a619b3f089c896418c4de161582a7bbfb31345aeef143f75aaceed0fd3f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6483160.exe

    Filesize

    527KB

    MD5

    ab999c9cca0d1448597c5ff7ebd88bf9

    SHA1

    f0d12ddc8bb1b755d70052c990046ef1204fb712

    SHA256

    53029fb6f4e564b2eb53f656b82d81c239a7f9a0e0748c8b8134497ba9817232

    SHA512

    38519abf327e80c00cfe9f6dc07b075a18dfdb1d960ec6e78374e6c912b84aebbc135fa1cf915f824a0376164eda13e943ca666857aefeb202b85e974a913c3f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z6483160.exe

    Filesize

    527KB

    MD5

    ab999c9cca0d1448597c5ff7ebd88bf9

    SHA1

    f0d12ddc8bb1b755d70052c990046ef1204fb712

    SHA256

    53029fb6f4e564b2eb53f656b82d81c239a7f9a0e0748c8b8134497ba9817232

    SHA512

    38519abf327e80c00cfe9f6dc07b075a18dfdb1d960ec6e78374e6c912b84aebbc135fa1cf915f824a0376164eda13e943ca666857aefeb202b85e974a913c3f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1339842.exe

    Filesize

    296KB

    MD5

    b04b91edaf31f755487e95eaa688c6e6

    SHA1

    a6492b7e542ff8fa655496b99d67fdc457975119

    SHA256

    e947f32ae642d870e4b513d0982e88d59e9f08b02cc593e19157c932cc4b6a2c

    SHA512

    e99c18458be3bd5eeddc1fbd96022eb514e28f4d06e1b16e7320acb901ea747f798c792f2b0dd8a927c830c5c0b4578ac369d2e2400367630c84891130f32d4d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1339842.exe

    Filesize

    296KB

    MD5

    b04b91edaf31f755487e95eaa688c6e6

    SHA1

    a6492b7e542ff8fa655496b99d67fdc457975119

    SHA256

    e947f32ae642d870e4b513d0982e88d59e9f08b02cc593e19157c932cc4b6a2c

    SHA512

    e99c18458be3bd5eeddc1fbd96022eb514e28f4d06e1b16e7320acb901ea747f798c792f2b0dd8a927c830c5c0b4578ac369d2e2400367630c84891130f32d4d

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5190116.exe

    Filesize

    11KB

    MD5

    4a56bea3b8c1256f2e4b86d9c05d888c

    SHA1

    b374c9c87070c51ad2648e8a3fa49de8314b57f6

    SHA256

    bae44dec8bd26a464557f339406a6d6219b0a28f9f1b0b5c0c90cf59eada81d9

    SHA512

    557ed27d722e7317a13c7f3f92264833ac7f081c7fadc1bd7b7d94b965dde41a9d12610f640520b329415c4a6589b0823d89e69f9416526f890886f8d4f326f1

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2727394.exe

    Filesize

    276KB

    MD5

    61779402f24137d46d35687738be3cf4

    SHA1

    7d748dab6e97f5cb5af15b2335236d1137c8943a

    SHA256

    29c646d18a359950a821043c310ea4feb600bf25036f71493f1054b3109c917d

    SHA512

    07bdaaa4c81c330214926aa30cde8eb411293a7ff699fd62317b4d38582a5989bf90c146c6f36041f865c472363dadc1797f73f3db667b0d20d44cdd637afac4

  • memory/2576-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2576-61-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2576-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2576-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2576-66-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2576-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2576-65-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2576-68-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2576-70-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2576-72-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2772-51-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2772-50-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2772-49-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2772-48-0x0000000000BD0000-0x0000000000BDA000-memory.dmp

    Filesize

    40KB