Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 22:32
Static task
static1
Behavioral task
behavioral1
Sample
4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe
Resource
win10v2004-20230915-en
General
-
Target
4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe
-
Size
956KB
-
MD5
ad9a050a806ed357ebdaf7645f7d956a
-
SHA1
60559c8131a5ab066d8681316c0eabd5c292a3d1
-
SHA256
4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52
-
SHA512
a1e96a27e43da3ec87d660293b20cfffc428783c1435729b5c6e923c9ccd8e0af38431d8bcbba0cb2072bda18116caa9c3e406133552981a3a31cd3d11c46a50
-
SSDEEP
24576:py7fbHnAbhSHhHJhlADjiaKvtcpu/3JDksmw6d/b1Jrf+yKo/hV:c/HAl8hJhlSjMj/XG/LtKo/h
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2912 x1326444.exe 2996 x8711755.exe 2676 x9264755.exe 2548 g9078854.exe -
Loads dropped DLL 13 IoCs
pid Process 1132 4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe 2912 x1326444.exe 2912 x1326444.exe 2996 x8711755.exe 2996 x8711755.exe 2676 x9264755.exe 2676 x9264755.exe 2676 x9264755.exe 2548 g9078854.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1326444.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8711755.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9264755.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2548 set thread context of 2644 2548 g9078854.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 3000 2548 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1132 wrote to memory of 2912 1132 4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe 28 PID 1132 wrote to memory of 2912 1132 4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe 28 PID 1132 wrote to memory of 2912 1132 4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe 28 PID 1132 wrote to memory of 2912 1132 4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe 28 PID 1132 wrote to memory of 2912 1132 4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe 28 PID 1132 wrote to memory of 2912 1132 4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe 28 PID 1132 wrote to memory of 2912 1132 4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe 28 PID 2912 wrote to memory of 2996 2912 x1326444.exe 29 PID 2912 wrote to memory of 2996 2912 x1326444.exe 29 PID 2912 wrote to memory of 2996 2912 x1326444.exe 29 PID 2912 wrote to memory of 2996 2912 x1326444.exe 29 PID 2912 wrote to memory of 2996 2912 x1326444.exe 29 PID 2912 wrote to memory of 2996 2912 x1326444.exe 29 PID 2912 wrote to memory of 2996 2912 x1326444.exe 29 PID 2996 wrote to memory of 2676 2996 x8711755.exe 30 PID 2996 wrote to memory of 2676 2996 x8711755.exe 30 PID 2996 wrote to memory of 2676 2996 x8711755.exe 30 PID 2996 wrote to memory of 2676 2996 x8711755.exe 30 PID 2996 wrote to memory of 2676 2996 x8711755.exe 30 PID 2996 wrote to memory of 2676 2996 x8711755.exe 30 PID 2996 wrote to memory of 2676 2996 x8711755.exe 30 PID 2676 wrote to memory of 2548 2676 x9264755.exe 31 PID 2676 wrote to memory of 2548 2676 x9264755.exe 31 PID 2676 wrote to memory of 2548 2676 x9264755.exe 31 PID 2676 wrote to memory of 2548 2676 x9264755.exe 31 PID 2676 wrote to memory of 2548 2676 x9264755.exe 31 PID 2676 wrote to memory of 2548 2676 x9264755.exe 31 PID 2676 wrote to memory of 2548 2676 x9264755.exe 31 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 2644 2548 g9078854.exe 32 PID 2548 wrote to memory of 3000 2548 g9078854.exe 33 PID 2548 wrote to memory of 3000 2548 g9078854.exe 33 PID 2548 wrote to memory of 3000 2548 g9078854.exe 33 PID 2548 wrote to memory of 3000 2548 g9078854.exe 33 PID 2548 wrote to memory of 3000 2548 g9078854.exe 33 PID 2548 wrote to memory of 3000 2548 g9078854.exe 33 PID 2548 wrote to memory of 3000 2548 g9078854.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe"C:\Users\Admin\AppData\Local\Temp\4eb83e5f4039efe9296d95f59b3a2cd5678c22007cf270b8a65b6b58ac2e0e52.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1326444.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1326444.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8711755.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8711755.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9264755.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9264755.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9078854.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9078854.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:3000
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854KB
MD5f2eb343ba96f22fe55ecd8c14fc44878
SHA1f44a1b41dfe9b3428e5bc55ae8e357715c0a5042
SHA2567087b8192ef8cdca1415f47deb80073b824be58520f0dc3ce588c8c30c329434
SHA5120aa4b496c3330b701dbbea65b5e198ba89190dbde56e7794115aee45218a589bb9f28e3a30fd17b37407ce0a46b1936f01cb7729ca00e955c2f8d58ff32c30a4
-
Filesize
854KB
MD5f2eb343ba96f22fe55ecd8c14fc44878
SHA1f44a1b41dfe9b3428e5bc55ae8e357715c0a5042
SHA2567087b8192ef8cdca1415f47deb80073b824be58520f0dc3ce588c8c30c329434
SHA5120aa4b496c3330b701dbbea65b5e198ba89190dbde56e7794115aee45218a589bb9f28e3a30fd17b37407ce0a46b1936f01cb7729ca00e955c2f8d58ff32c30a4
-
Filesize
580KB
MD5e83b22f424f559a05cab5b2d3170e299
SHA1587ed5dd45619ec512dfbf280d2d13b948a21572
SHA256c68f03e0e7c3777f7053d3280718522112a03529b85656d8eca5d57530068884
SHA512bebbd782b8f031501c51ea18cfb6fe0dcd53b7d8c454be9caf998ce5eb985af7bf98a0819054c6ca2bac00bd4b6773b91e9b00a264e2f23f50910f70e02f0c51
-
Filesize
580KB
MD5e83b22f424f559a05cab5b2d3170e299
SHA1587ed5dd45619ec512dfbf280d2d13b948a21572
SHA256c68f03e0e7c3777f7053d3280718522112a03529b85656d8eca5d57530068884
SHA512bebbd782b8f031501c51ea18cfb6fe0dcd53b7d8c454be9caf998ce5eb985af7bf98a0819054c6ca2bac00bd4b6773b91e9b00a264e2f23f50910f70e02f0c51
-
Filesize
403KB
MD51b579e825aa12552e8aff1b6bf79fa3c
SHA120486a475a53144a6113cb79ce925687168d1b86
SHA256cf4d6904d8adf42d9104eb1ae55631c1dd2ae1ec5a7e18885ef189deebe5b800
SHA51258695e64f1f9b1e9aa405c3b148033e182c1566cccfe22808ded3a8ad47dddec5ab3bb2513822cc0feafe9b1c4510b33a03d44db9ea81e888564119d65fc69ae
-
Filesize
403KB
MD51b579e825aa12552e8aff1b6bf79fa3c
SHA120486a475a53144a6113cb79ce925687168d1b86
SHA256cf4d6904d8adf42d9104eb1ae55631c1dd2ae1ec5a7e18885ef189deebe5b800
SHA51258695e64f1f9b1e9aa405c3b148033e182c1566cccfe22808ded3a8ad47dddec5ab3bb2513822cc0feafe9b1c4510b33a03d44db9ea81e888564119d65fc69ae
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3
-
Filesize
854KB
MD5f2eb343ba96f22fe55ecd8c14fc44878
SHA1f44a1b41dfe9b3428e5bc55ae8e357715c0a5042
SHA2567087b8192ef8cdca1415f47deb80073b824be58520f0dc3ce588c8c30c329434
SHA5120aa4b496c3330b701dbbea65b5e198ba89190dbde56e7794115aee45218a589bb9f28e3a30fd17b37407ce0a46b1936f01cb7729ca00e955c2f8d58ff32c30a4
-
Filesize
854KB
MD5f2eb343ba96f22fe55ecd8c14fc44878
SHA1f44a1b41dfe9b3428e5bc55ae8e357715c0a5042
SHA2567087b8192ef8cdca1415f47deb80073b824be58520f0dc3ce588c8c30c329434
SHA5120aa4b496c3330b701dbbea65b5e198ba89190dbde56e7794115aee45218a589bb9f28e3a30fd17b37407ce0a46b1936f01cb7729ca00e955c2f8d58ff32c30a4
-
Filesize
580KB
MD5e83b22f424f559a05cab5b2d3170e299
SHA1587ed5dd45619ec512dfbf280d2d13b948a21572
SHA256c68f03e0e7c3777f7053d3280718522112a03529b85656d8eca5d57530068884
SHA512bebbd782b8f031501c51ea18cfb6fe0dcd53b7d8c454be9caf998ce5eb985af7bf98a0819054c6ca2bac00bd4b6773b91e9b00a264e2f23f50910f70e02f0c51
-
Filesize
580KB
MD5e83b22f424f559a05cab5b2d3170e299
SHA1587ed5dd45619ec512dfbf280d2d13b948a21572
SHA256c68f03e0e7c3777f7053d3280718522112a03529b85656d8eca5d57530068884
SHA512bebbd782b8f031501c51ea18cfb6fe0dcd53b7d8c454be9caf998ce5eb985af7bf98a0819054c6ca2bac00bd4b6773b91e9b00a264e2f23f50910f70e02f0c51
-
Filesize
403KB
MD51b579e825aa12552e8aff1b6bf79fa3c
SHA120486a475a53144a6113cb79ce925687168d1b86
SHA256cf4d6904d8adf42d9104eb1ae55631c1dd2ae1ec5a7e18885ef189deebe5b800
SHA51258695e64f1f9b1e9aa405c3b148033e182c1566cccfe22808ded3a8ad47dddec5ab3bb2513822cc0feafe9b1c4510b33a03d44db9ea81e888564119d65fc69ae
-
Filesize
403KB
MD51b579e825aa12552e8aff1b6bf79fa3c
SHA120486a475a53144a6113cb79ce925687168d1b86
SHA256cf4d6904d8adf42d9104eb1ae55631c1dd2ae1ec5a7e18885ef189deebe5b800
SHA51258695e64f1f9b1e9aa405c3b148033e182c1566cccfe22808ded3a8ad47dddec5ab3bb2513822cc0feafe9b1c4510b33a03d44db9ea81e888564119d65fc69ae
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3
-
Filesize
396KB
MD531c50c2c10366e87cb1f23f6b4c706f5
SHA10f08dea0757afee0329e50cf073d68346d8ae83e
SHA25604ae794435371a57fe2ed545c50093bf05058a0bb1bc7180bb8a3331f4f9ba83
SHA512c19b02e5d01a48b66f366823985a66625ae004445f37609b785ad24766d68e0dd25987db1ed89974436e4e5c0a759c0df4b806b9355d399d58bb911789b4d4c3