Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe
Resource
win10v2004-20230915-en
General
-
Target
310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe
-
Size
957KB
-
MD5
3b39f2c6abd924165252890ac7e2fc51
-
SHA1
d584aebbc558921ee2ca00517fa0ad3bb4351d43
-
SHA256
310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742
-
SHA512
0a88bda1dfdaa5ee43650e409e7e6018cdbd67b8a090a2efb61f036c84a330904f1fdca675e39a88f1f8040ba13c023bd4f5169783dbb94a07bb14514b70bf60
-
SSDEEP
12288:VMrZy90k04Ni7zT39FS+7eljWXfxJPhliYOO6uihQ8ZZWvdGLb59ij1zkWskGhEc:8yndNozT3i+7m4jht64msvk5Mj1gK+
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1928 x0640703.exe 2108 x9953633.exe 2744 x5438303.exe 3060 g4867102.exe -
Loads dropped DLL 13 IoCs
pid Process 2204 310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe 1928 x0640703.exe 1928 x0640703.exe 2108 x9953633.exe 2108 x9953633.exe 2744 x5438303.exe 2744 x5438303.exe 2744 x5438303.exe 3060 g4867102.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe 2620 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0640703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9953633.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5438303.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3060 set thread context of 2804 3060 g4867102.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2620 3060 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1928 2204 310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe 28 PID 2204 wrote to memory of 1928 2204 310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe 28 PID 2204 wrote to memory of 1928 2204 310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe 28 PID 2204 wrote to memory of 1928 2204 310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe 28 PID 2204 wrote to memory of 1928 2204 310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe 28 PID 2204 wrote to memory of 1928 2204 310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe 28 PID 2204 wrote to memory of 1928 2204 310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe 28 PID 1928 wrote to memory of 2108 1928 x0640703.exe 29 PID 1928 wrote to memory of 2108 1928 x0640703.exe 29 PID 1928 wrote to memory of 2108 1928 x0640703.exe 29 PID 1928 wrote to memory of 2108 1928 x0640703.exe 29 PID 1928 wrote to memory of 2108 1928 x0640703.exe 29 PID 1928 wrote to memory of 2108 1928 x0640703.exe 29 PID 1928 wrote to memory of 2108 1928 x0640703.exe 29 PID 2108 wrote to memory of 2744 2108 x9953633.exe 30 PID 2108 wrote to memory of 2744 2108 x9953633.exe 30 PID 2108 wrote to memory of 2744 2108 x9953633.exe 30 PID 2108 wrote to memory of 2744 2108 x9953633.exe 30 PID 2108 wrote to memory of 2744 2108 x9953633.exe 30 PID 2108 wrote to memory of 2744 2108 x9953633.exe 30 PID 2108 wrote to memory of 2744 2108 x9953633.exe 30 PID 2744 wrote to memory of 3060 2744 x5438303.exe 31 PID 2744 wrote to memory of 3060 2744 x5438303.exe 31 PID 2744 wrote to memory of 3060 2744 x5438303.exe 31 PID 2744 wrote to memory of 3060 2744 x5438303.exe 31 PID 2744 wrote to memory of 3060 2744 x5438303.exe 31 PID 2744 wrote to memory of 3060 2744 x5438303.exe 31 PID 2744 wrote to memory of 3060 2744 x5438303.exe 31 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2804 3060 g4867102.exe 32 PID 3060 wrote to memory of 2620 3060 g4867102.exe 33 PID 3060 wrote to memory of 2620 3060 g4867102.exe 33 PID 3060 wrote to memory of 2620 3060 g4867102.exe 33 PID 3060 wrote to memory of 2620 3060 g4867102.exe 33 PID 3060 wrote to memory of 2620 3060 g4867102.exe 33 PID 3060 wrote to memory of 2620 3060 g4867102.exe 33 PID 3060 wrote to memory of 2620 3060 g4867102.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe"C:\Users\Admin\AppData\Local\Temp\310fd74e16f6fed06c9824763a2a70884e36ccc86c061df76bd01d2a0480d742.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0640703.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0640703.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9953633.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9953633.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5438303.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5438303.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4867102.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4867102.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2620
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
855KB
MD51a32b12421e39e10a60a79d727942144
SHA114e18aeacb3dbf305a93589e8752f5d7af984fcf
SHA256ded68a6b02db81b37c72472a9c7c2a0f134c68b43d95f379db3833cd65b3254b
SHA512c387c4401781ba6e8f8db519060bf295938d7bb05b00dde0e81fc6a3f21338d4cf18b5858e6df42fe229ada66e40ace68fdf49dbfdb97104be38f65ed41b99c8
-
Filesize
855KB
MD51a32b12421e39e10a60a79d727942144
SHA114e18aeacb3dbf305a93589e8752f5d7af984fcf
SHA256ded68a6b02db81b37c72472a9c7c2a0f134c68b43d95f379db3833cd65b3254b
SHA512c387c4401781ba6e8f8db519060bf295938d7bb05b00dde0e81fc6a3f21338d4cf18b5858e6df42fe229ada66e40ace68fdf49dbfdb97104be38f65ed41b99c8
-
Filesize
581KB
MD54701b26bd3e2f75b0f42375523275de0
SHA105e6b02c2db87e8cedaa4a49fda539517279f45f
SHA25666515c21bb168877c0a5b979ddcf7a3839c3b8c56ad27113820cf29278524dd5
SHA512103df3aca7e198ad3ea0adc9ac339a8a722eb99cf536887bd4ba43e11329d26597577eefb12a17b73e00bfddea2ce9e98d827a326a0e73ac1d3dcf52cd4c4d3f
-
Filesize
581KB
MD54701b26bd3e2f75b0f42375523275de0
SHA105e6b02c2db87e8cedaa4a49fda539517279f45f
SHA25666515c21bb168877c0a5b979ddcf7a3839c3b8c56ad27113820cf29278524dd5
SHA512103df3aca7e198ad3ea0adc9ac339a8a722eb99cf536887bd4ba43e11329d26597577eefb12a17b73e00bfddea2ce9e98d827a326a0e73ac1d3dcf52cd4c4d3f
-
Filesize
404KB
MD520b5571c01ff6380ca6abb9dec6b7f82
SHA1d520671cb23928aff2940ea441c29d5885d76234
SHA2564142747123a2bda352e40892ca2b3d7eba4b0ef14f843265756bbcb4aa665129
SHA512184b4ed5bf9dd87b2bfaee33f1f82cc014e841e9a2a9cf2fd3159680f3f13459c538623bad24da00ab4706736c677b9a4b82f4c9bcbb0ceaa17f13ef59b19cae
-
Filesize
404KB
MD520b5571c01ff6380ca6abb9dec6b7f82
SHA1d520671cb23928aff2940ea441c29d5885d76234
SHA2564142747123a2bda352e40892ca2b3d7eba4b0ef14f843265756bbcb4aa665129
SHA512184b4ed5bf9dd87b2bfaee33f1f82cc014e841e9a2a9cf2fd3159680f3f13459c538623bad24da00ab4706736c677b9a4b82f4c9bcbb0ceaa17f13ef59b19cae
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f
-
Filesize
855KB
MD51a32b12421e39e10a60a79d727942144
SHA114e18aeacb3dbf305a93589e8752f5d7af984fcf
SHA256ded68a6b02db81b37c72472a9c7c2a0f134c68b43d95f379db3833cd65b3254b
SHA512c387c4401781ba6e8f8db519060bf295938d7bb05b00dde0e81fc6a3f21338d4cf18b5858e6df42fe229ada66e40ace68fdf49dbfdb97104be38f65ed41b99c8
-
Filesize
855KB
MD51a32b12421e39e10a60a79d727942144
SHA114e18aeacb3dbf305a93589e8752f5d7af984fcf
SHA256ded68a6b02db81b37c72472a9c7c2a0f134c68b43d95f379db3833cd65b3254b
SHA512c387c4401781ba6e8f8db519060bf295938d7bb05b00dde0e81fc6a3f21338d4cf18b5858e6df42fe229ada66e40ace68fdf49dbfdb97104be38f65ed41b99c8
-
Filesize
581KB
MD54701b26bd3e2f75b0f42375523275de0
SHA105e6b02c2db87e8cedaa4a49fda539517279f45f
SHA25666515c21bb168877c0a5b979ddcf7a3839c3b8c56ad27113820cf29278524dd5
SHA512103df3aca7e198ad3ea0adc9ac339a8a722eb99cf536887bd4ba43e11329d26597577eefb12a17b73e00bfddea2ce9e98d827a326a0e73ac1d3dcf52cd4c4d3f
-
Filesize
581KB
MD54701b26bd3e2f75b0f42375523275de0
SHA105e6b02c2db87e8cedaa4a49fda539517279f45f
SHA25666515c21bb168877c0a5b979ddcf7a3839c3b8c56ad27113820cf29278524dd5
SHA512103df3aca7e198ad3ea0adc9ac339a8a722eb99cf536887bd4ba43e11329d26597577eefb12a17b73e00bfddea2ce9e98d827a326a0e73ac1d3dcf52cd4c4d3f
-
Filesize
404KB
MD520b5571c01ff6380ca6abb9dec6b7f82
SHA1d520671cb23928aff2940ea441c29d5885d76234
SHA2564142747123a2bda352e40892ca2b3d7eba4b0ef14f843265756bbcb4aa665129
SHA512184b4ed5bf9dd87b2bfaee33f1f82cc014e841e9a2a9cf2fd3159680f3f13459c538623bad24da00ab4706736c677b9a4b82f4c9bcbb0ceaa17f13ef59b19cae
-
Filesize
404KB
MD520b5571c01ff6380ca6abb9dec6b7f82
SHA1d520671cb23928aff2940ea441c29d5885d76234
SHA2564142747123a2bda352e40892ca2b3d7eba4b0ef14f843265756bbcb4aa665129
SHA512184b4ed5bf9dd87b2bfaee33f1f82cc014e841e9a2a9cf2fd3159680f3f13459c538623bad24da00ab4706736c677b9a4b82f4c9bcbb0ceaa17f13ef59b19cae
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f
-
Filesize
396KB
MD5e4310b4f423d984f28a44c5893b81a47
SHA12914520ea0e0ebc8aefd7b40f0aabf9b3fcaaaa9
SHA25615b4d9ccc8ab4d7a9cf546bfe73925cc3bcc0248db515b8c70d908ad575d5763
SHA51230916bcfde7f548b7aae7fdb202bec1a8ba0340251c3d7463fb4c94253f44faedd8bf8d7c9df416d5c993f38e783edd07b1696cf51b1cdcccdb41572e8dc181f