Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:46

General

  • Target

    ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe

  • Size

    994KB

  • MD5

    74b8035f9bdd374c54b949ca7770e1d7

  • SHA1

    4469103b14380a8f2437c1c8a28a41edfbb3ce77

  • SHA256

    ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22

  • SHA512

    4a14454a9d9619c2695e28be2a75fb11ae628459ccf44cfdd13e0eae586031ede99abc2a92db997c3846b98a1f569e308464c5f7fb386d25a227d2552b50d400

  • SSDEEP

    24576:9ycxeVv0YZg5T4+0DZczTc8u0AiAI48QHdI2x/i1l2f8Kvj:YcbYZmFqyzTc1aAICIsf8Kv

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe
    "C:\Users\Admin\AppData\Local\Temp\ce0b7354f310393020c14f028e0217c0aa7925e1ef6d9ddd59fae7a4b736ad22.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2680
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2688
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1176
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1200
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 268
                  8⤵
                  • Program crash
                  PID:1044
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

    Filesize

    892KB

    MD5

    cd66853383948e7893667dc85f735d41

    SHA1

    0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad

    SHA256

    8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02

    SHA512

    4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

    Filesize

    892KB

    MD5

    cd66853383948e7893667dc85f735d41

    SHA1

    0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad

    SHA256

    8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02

    SHA512

    4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

    Filesize

    709KB

    MD5

    171dd67ac919b1720b075e1d4cdde7f5

    SHA1

    5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88

    SHA256

    2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65

    SHA512

    36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

    Filesize

    709KB

    MD5

    171dd67ac919b1720b075e1d4cdde7f5

    SHA1

    5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88

    SHA256

    2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65

    SHA512

    36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

    Filesize

    526KB

    MD5

    28aaa203a07144d930148c5623704cea

    SHA1

    f91734db60eae32ee22b5d8a6bd6f65e4c304cf9

    SHA256

    7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2

    SHA512

    532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

    Filesize

    526KB

    MD5

    28aaa203a07144d930148c5623704cea

    SHA1

    f91734db60eae32ee22b5d8a6bd6f65e4c304cf9

    SHA256

    7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2

    SHA512

    532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

    Filesize

    296KB

    MD5

    0a5d6d994534807bb5143511258c6c17

    SHA1

    da056fc7801b80ba994100052b6f764aca0700fd

    SHA256

    058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714

    SHA512

    63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

    Filesize

    296KB

    MD5

    0a5d6d994534807bb5143511258c6c17

    SHA1

    da056fc7801b80ba994100052b6f764aca0700fd

    SHA256

    058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714

    SHA512

    63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

    Filesize

    11KB

    MD5

    f6d0b8f359744b55258659dd2b3e3bad

    SHA1

    aed13b92a575889d502c87c7989b6fd00ab27580

    SHA256

    6a0bfb156ac8580978927364c5ef4f905434225f53654cb1d06b56b944556a86

    SHA512

    c88e4bc9b508a549d87b4c5007ebf599a2631e594dbcb8702f51df34f2201c57cdb4ac1ef68cd52062cf78810247da93585e7ff0af97f43f559b14c13d89f2b9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

    Filesize

    11KB

    MD5

    f6d0b8f359744b55258659dd2b3e3bad

    SHA1

    aed13b92a575889d502c87c7989b6fd00ab27580

    SHA256

    6a0bfb156ac8580978927364c5ef4f905434225f53654cb1d06b56b944556a86

    SHA512

    c88e4bc9b508a549d87b4c5007ebf599a2631e594dbcb8702f51df34f2201c57cdb4ac1ef68cd52062cf78810247da93585e7ff0af97f43f559b14c13d89f2b9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

    Filesize

    892KB

    MD5

    cd66853383948e7893667dc85f735d41

    SHA1

    0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad

    SHA256

    8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02

    SHA512

    4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4617123.exe

    Filesize

    892KB

    MD5

    cd66853383948e7893667dc85f735d41

    SHA1

    0619dc2dcfc4fa28295b9af4b3bd338b6cf773ad

    SHA256

    8941da23099d932ec1f222c39ebc5a2f74173780cfa60d911c10e117c2951d02

    SHA512

    4d476e8b6e2c6c928cb30eeac009f672db82a9bbe35f11d48effcc35fe360ec472afe56a11dbe264c745a3b78761491a8cf6425d6b4d308bda47a813fe1e16fb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

    Filesize

    709KB

    MD5

    171dd67ac919b1720b075e1d4cdde7f5

    SHA1

    5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88

    SHA256

    2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65

    SHA512

    36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4611947.exe

    Filesize

    709KB

    MD5

    171dd67ac919b1720b075e1d4cdde7f5

    SHA1

    5c49b1c9588a9b3a9dd4db0b9c8cadd179ee9e88

    SHA256

    2976cdbc188438b1bc77313cd5cc707f4e7c0a7a413a40ce66fd2fb59b017a65

    SHA512

    36ea1e03e13c3567f710a1eb5654fe4afe1d77331bd8cdbf4594a67f9ec124f7d2826c25b24276764bef71e8aab1f5e8b50c87bd926a056c483e8a2a76e6bb3d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

    Filesize

    526KB

    MD5

    28aaa203a07144d930148c5623704cea

    SHA1

    f91734db60eae32ee22b5d8a6bd6f65e4c304cf9

    SHA256

    7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2

    SHA512

    532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1715189.exe

    Filesize

    526KB

    MD5

    28aaa203a07144d930148c5623704cea

    SHA1

    f91734db60eae32ee22b5d8a6bd6f65e4c304cf9

    SHA256

    7161ae0249c132c91777b5727dc01b38db7ed7aeb1674d65cef581115380a9e2

    SHA512

    532c7fff1940b4d846e26ad6f7e7799cc385e6294f97487fc3bcb39fba2d9a6f5c8603470bc72db47752a10c47c19cb911069a09ae1239340c9c01f12b557d40

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

    Filesize

    296KB

    MD5

    0a5d6d994534807bb5143511258c6c17

    SHA1

    da056fc7801b80ba994100052b6f764aca0700fd

    SHA256

    058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714

    SHA512

    63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6613839.exe

    Filesize

    296KB

    MD5

    0a5d6d994534807bb5143511258c6c17

    SHA1

    da056fc7801b80ba994100052b6f764aca0700fd

    SHA256

    058c1429000b055fde82228a40864fd725fd641769c35c37d2e6ec560e205714

    SHA512

    63ed9bfabcfb1e590d91fb0c6e06ed3078f280ce68775525cfe9f69e4b510a303ff3eaf5411d8b947ac89f5b6b228db042e575990b7e19778641f584e2911684

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5435240.exe

    Filesize

    11KB

    MD5

    f6d0b8f359744b55258659dd2b3e3bad

    SHA1

    aed13b92a575889d502c87c7989b6fd00ab27580

    SHA256

    6a0bfb156ac8580978927364c5ef4f905434225f53654cb1d06b56b944556a86

    SHA512

    c88e4bc9b508a549d87b4c5007ebf599a2631e594dbcb8702f51df34f2201c57cdb4ac1ef68cd52062cf78810247da93585e7ff0af97f43f559b14c13d89f2b9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r6087599.exe

    Filesize

    276KB

    MD5

    a8cffc155ab471df997633c2a5459a4b

    SHA1

    a053e6838aff74151c24502536dfd975bbb9c5de

    SHA256

    8013e530c307857ce9924a27d45a0ea7d55699a568d55543dafd5308b4f8aa00

    SHA512

    076a73ab43e0200c13820aed1c0d5e705da87b1459d45024c42c56f7e07f5a103f1f09c900903812f55e6dfe565ccc037ef3935a7f7730883ee84eab8c2c51bd

  • memory/1200-61-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1200-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1200-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1200-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1200-65-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1200-66-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1200-67-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1200-69-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1200-71-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1200-60-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2688-57-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2688-49-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2688-48-0x0000000001220000-0x000000000122A000-memory.dmp

    Filesize

    40KB