Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 23:21
Static task
static1
Behavioral task
behavioral1
Sample
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe
Resource
win10v2004-20230915-en
General
-
Target
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe
-
Size
928KB
-
MD5
237f0453ec09669ea06948d3d012bca9
-
SHA1
b57668880ac7bb91fa0a45dde4a6793ae3cde767
-
SHA256
2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a
-
SHA512
7a9022858544cee136bf701fca463a85055a92c9f26116596e364f25cb2197fa3d5fda114ba7420592afe3c24929615815857bae2b8f2442d53040b51f7403e7
-
SSDEEP
12288:dMr6y90rv/kDDwTOIHJcm+vHGvI3igXQnFlr/D63z5ASw32jhGm/QD8F2O316uoV:Ty+2DwTLHOm+uvsQzGDC3ou8FImUD
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1200 x8212383.exe 2772 x6270797.exe 2612 x5282751.exe 2868 g0214893.exe -
Loads dropped DLL 13 IoCs
pid Process 2940 2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe 1200 x8212383.exe 1200 x8212383.exe 2772 x6270797.exe 2772 x6270797.exe 2612 x5282751.exe 2612 x5282751.exe 2612 x5282751.exe 2868 g0214893.exe 540 WerFault.exe 540 WerFault.exe 540 WerFault.exe 540 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5282751.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8212383.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6270797.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 2628 2868 g0214893.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 540 2868 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1200 2940 2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe 27 PID 2940 wrote to memory of 1200 2940 2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe 27 PID 2940 wrote to memory of 1200 2940 2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe 27 PID 2940 wrote to memory of 1200 2940 2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe 27 PID 2940 wrote to memory of 1200 2940 2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe 27 PID 2940 wrote to memory of 1200 2940 2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe 27 PID 2940 wrote to memory of 1200 2940 2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe 27 PID 1200 wrote to memory of 2772 1200 x8212383.exe 28 PID 1200 wrote to memory of 2772 1200 x8212383.exe 28 PID 1200 wrote to memory of 2772 1200 x8212383.exe 28 PID 1200 wrote to memory of 2772 1200 x8212383.exe 28 PID 1200 wrote to memory of 2772 1200 x8212383.exe 28 PID 1200 wrote to memory of 2772 1200 x8212383.exe 28 PID 1200 wrote to memory of 2772 1200 x8212383.exe 28 PID 2772 wrote to memory of 2612 2772 x6270797.exe 29 PID 2772 wrote to memory of 2612 2772 x6270797.exe 29 PID 2772 wrote to memory of 2612 2772 x6270797.exe 29 PID 2772 wrote to memory of 2612 2772 x6270797.exe 29 PID 2772 wrote to memory of 2612 2772 x6270797.exe 29 PID 2772 wrote to memory of 2612 2772 x6270797.exe 29 PID 2772 wrote to memory of 2612 2772 x6270797.exe 29 PID 2612 wrote to memory of 2868 2612 x5282751.exe 30 PID 2612 wrote to memory of 2868 2612 x5282751.exe 30 PID 2612 wrote to memory of 2868 2612 x5282751.exe 30 PID 2612 wrote to memory of 2868 2612 x5282751.exe 30 PID 2612 wrote to memory of 2868 2612 x5282751.exe 30 PID 2612 wrote to memory of 2868 2612 x5282751.exe 30 PID 2612 wrote to memory of 2868 2612 x5282751.exe 30 PID 2868 wrote to memory of 2580 2868 g0214893.exe 33 PID 2868 wrote to memory of 2580 2868 g0214893.exe 33 PID 2868 wrote to memory of 2580 2868 g0214893.exe 33 PID 2868 wrote to memory of 2580 2868 g0214893.exe 33 PID 2868 wrote to memory of 2580 2868 g0214893.exe 33 PID 2868 wrote to memory of 2580 2868 g0214893.exe 33 PID 2868 wrote to memory of 2580 2868 g0214893.exe 33 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 2628 2868 g0214893.exe 34 PID 2868 wrote to memory of 540 2868 g0214893.exe 35 PID 2868 wrote to memory of 540 2868 g0214893.exe 35 PID 2868 wrote to memory of 540 2868 g0214893.exe 35 PID 2868 wrote to memory of 540 2868 g0214893.exe 35 PID 2868 wrote to memory of 540 2868 g0214893.exe 35 PID 2868 wrote to memory of 540 2868 g0214893.exe 35 PID 2868 wrote to memory of 540 2868 g0214893.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe"C:\Users\Admin\AppData\Local\Temp\2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8212383.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8212383.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6270797.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6270797.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5282751.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5282751.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:540
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD58e4dcfe1e2d7cb98480652d6d17f3176
SHA155ca68e9a1a88aa1c22fbaa64e004988c79b01d9
SHA256391bb62fd9fac9e484c049172f8fbaba3d1b5e01b9d74ef3c94352a97ff1e18d
SHA512e8f2bc09551691e171472efb6e7166637bc0d8de76880d141da12241b7d9d582663745ff698c605886b6b7e7ff6712c0346d33507565295318bce9c0cb44c13b
-
Filesize
826KB
MD58e4dcfe1e2d7cb98480652d6d17f3176
SHA155ca68e9a1a88aa1c22fbaa64e004988c79b01d9
SHA256391bb62fd9fac9e484c049172f8fbaba3d1b5e01b9d74ef3c94352a97ff1e18d
SHA512e8f2bc09551691e171472efb6e7166637bc0d8de76880d141da12241b7d9d582663745ff698c605886b6b7e7ff6712c0346d33507565295318bce9c0cb44c13b
-
Filesize
566KB
MD5b75463dc2cc1105e42f6ac36ad677e89
SHA1563965ee6f02c11091b5bb08038ac1ca9632467b
SHA256a265d07899f1984c13ef4fd0cfe0bdfead9f5932d9e49be015b7f62fdf1d9596
SHA512c82b060bc92bfedff4541f77f96b07f73f4727dfeb0e75d859f03c04e4be71f5079c6b0df0fc9b9b81de30468d351022a5ae68cb880d460d6979055c96b300b7
-
Filesize
566KB
MD5b75463dc2cc1105e42f6ac36ad677e89
SHA1563965ee6f02c11091b5bb08038ac1ca9632467b
SHA256a265d07899f1984c13ef4fd0cfe0bdfead9f5932d9e49be015b7f62fdf1d9596
SHA512c82b060bc92bfedff4541f77f96b07f73f4727dfeb0e75d859f03c04e4be71f5079c6b0df0fc9b9b81de30468d351022a5ae68cb880d460d6979055c96b300b7
-
Filesize
390KB
MD55fb5558a8bf8986befcf6285851f2b7f
SHA1c4dae9dec2abc5df6374d3501cbe244592b75014
SHA256cf76342b2c967836eb1f883d642c92b74f877f6498782efbbde79e34de973a9e
SHA51232647a5883ef212096171e99c45c708cab0359a5c1096549dc5ff8f59c7136a966ea2e04d0eed7d3ef4bc4d10f073ad7e0cd7da4e8cf1298021a218c298f367a
-
Filesize
390KB
MD55fb5558a8bf8986befcf6285851f2b7f
SHA1c4dae9dec2abc5df6374d3501cbe244592b75014
SHA256cf76342b2c967836eb1f883d642c92b74f877f6498782efbbde79e34de973a9e
SHA51232647a5883ef212096171e99c45c708cab0359a5c1096549dc5ff8f59c7136a966ea2e04d0eed7d3ef4bc4d10f073ad7e0cd7da4e8cf1298021a218c298f367a
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096
-
Filesize
826KB
MD58e4dcfe1e2d7cb98480652d6d17f3176
SHA155ca68e9a1a88aa1c22fbaa64e004988c79b01d9
SHA256391bb62fd9fac9e484c049172f8fbaba3d1b5e01b9d74ef3c94352a97ff1e18d
SHA512e8f2bc09551691e171472efb6e7166637bc0d8de76880d141da12241b7d9d582663745ff698c605886b6b7e7ff6712c0346d33507565295318bce9c0cb44c13b
-
Filesize
826KB
MD58e4dcfe1e2d7cb98480652d6d17f3176
SHA155ca68e9a1a88aa1c22fbaa64e004988c79b01d9
SHA256391bb62fd9fac9e484c049172f8fbaba3d1b5e01b9d74ef3c94352a97ff1e18d
SHA512e8f2bc09551691e171472efb6e7166637bc0d8de76880d141da12241b7d9d582663745ff698c605886b6b7e7ff6712c0346d33507565295318bce9c0cb44c13b
-
Filesize
566KB
MD5b75463dc2cc1105e42f6ac36ad677e89
SHA1563965ee6f02c11091b5bb08038ac1ca9632467b
SHA256a265d07899f1984c13ef4fd0cfe0bdfead9f5932d9e49be015b7f62fdf1d9596
SHA512c82b060bc92bfedff4541f77f96b07f73f4727dfeb0e75d859f03c04e4be71f5079c6b0df0fc9b9b81de30468d351022a5ae68cb880d460d6979055c96b300b7
-
Filesize
566KB
MD5b75463dc2cc1105e42f6ac36ad677e89
SHA1563965ee6f02c11091b5bb08038ac1ca9632467b
SHA256a265d07899f1984c13ef4fd0cfe0bdfead9f5932d9e49be015b7f62fdf1d9596
SHA512c82b060bc92bfedff4541f77f96b07f73f4727dfeb0e75d859f03c04e4be71f5079c6b0df0fc9b9b81de30468d351022a5ae68cb880d460d6979055c96b300b7
-
Filesize
390KB
MD55fb5558a8bf8986befcf6285851f2b7f
SHA1c4dae9dec2abc5df6374d3501cbe244592b75014
SHA256cf76342b2c967836eb1f883d642c92b74f877f6498782efbbde79e34de973a9e
SHA51232647a5883ef212096171e99c45c708cab0359a5c1096549dc5ff8f59c7136a966ea2e04d0eed7d3ef4bc4d10f073ad7e0cd7da4e8cf1298021a218c298f367a
-
Filesize
390KB
MD55fb5558a8bf8986befcf6285851f2b7f
SHA1c4dae9dec2abc5df6374d3501cbe244592b75014
SHA256cf76342b2c967836eb1f883d642c92b74f877f6498782efbbde79e34de973a9e
SHA51232647a5883ef212096171e99c45c708cab0359a5c1096549dc5ff8f59c7136a966ea2e04d0eed7d3ef4bc4d10f073ad7e0cd7da4e8cf1298021a218c298f367a
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096
-
Filesize
364KB
MD516d0f5ba3c4f006e63dd2c43008a6813
SHA146e4305b77f4b4f7b01f32eede69ab5750349c79
SHA2562f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824
SHA512c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096