Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 04:54
Static task
static1
Behavioral task
behavioral1
Sample
65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe
Resource
win10v2004-20230915-en
General
-
Target
65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe
-
Size
865KB
-
MD5
4d113fa36d8870ea3a4bdab579fad637
-
SHA1
db5550335e99d36b6b350bbfa5d10d42cfd9903c
-
SHA256
65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711
-
SHA512
29c644c9d09624a31d8e72622b6e65bbb4ed945697067d856314276ef20694487dbb3505916a01d724a52788799f081d97c0a998a2c71e02942a2b30212e1eff
-
SSDEEP
24576:dyJw5n0ZJBHZlpJqUrB8mw0xLJA+kXFAYcjp2e9BxgOGC3:4Jwh0ZJF7pdBTL25qHc1OGC
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2704-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2704-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
Processes:
z8098477.exez2538785.exez7984807.exer0108035.exepid process 1932 z8098477.exe 2308 z2538785.exe 2772 z7984807.exe 2804 r0108035.exe -
Loads dropped DLL 13 IoCs
Processes:
65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exez8098477.exez2538785.exez7984807.exer0108035.exeWerFault.exepid process 3064 65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe 1932 z8098477.exe 1932 z8098477.exe 2308 z2538785.exe 2308 z2538785.exe 2772 z7984807.exe 2772 z7984807.exe 2772 z7984807.exe 2804 r0108035.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exez8098477.exez2538785.exez7984807.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8098477.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2538785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7984807.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
r0108035.exedescription pid process target process PID 2804 set thread context of 2704 2804 r0108035.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2732 2804 WerFault.exe r0108035.exe 2592 2704 WerFault.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exez8098477.exez2538785.exez7984807.exer0108035.exeAppLaunch.exedescription pid process target process PID 3064 wrote to memory of 1932 3064 65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe z8098477.exe PID 3064 wrote to memory of 1932 3064 65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe z8098477.exe PID 3064 wrote to memory of 1932 3064 65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe z8098477.exe PID 3064 wrote to memory of 1932 3064 65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe z8098477.exe PID 3064 wrote to memory of 1932 3064 65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe z8098477.exe PID 3064 wrote to memory of 1932 3064 65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe z8098477.exe PID 3064 wrote to memory of 1932 3064 65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe z8098477.exe PID 1932 wrote to memory of 2308 1932 z8098477.exe z2538785.exe PID 1932 wrote to memory of 2308 1932 z8098477.exe z2538785.exe PID 1932 wrote to memory of 2308 1932 z8098477.exe z2538785.exe PID 1932 wrote to memory of 2308 1932 z8098477.exe z2538785.exe PID 1932 wrote to memory of 2308 1932 z8098477.exe z2538785.exe PID 1932 wrote to memory of 2308 1932 z8098477.exe z2538785.exe PID 1932 wrote to memory of 2308 1932 z8098477.exe z2538785.exe PID 2308 wrote to memory of 2772 2308 z2538785.exe z7984807.exe PID 2308 wrote to memory of 2772 2308 z2538785.exe z7984807.exe PID 2308 wrote to memory of 2772 2308 z2538785.exe z7984807.exe PID 2308 wrote to memory of 2772 2308 z2538785.exe z7984807.exe PID 2308 wrote to memory of 2772 2308 z2538785.exe z7984807.exe PID 2308 wrote to memory of 2772 2308 z2538785.exe z7984807.exe PID 2308 wrote to memory of 2772 2308 z2538785.exe z7984807.exe PID 2772 wrote to memory of 2804 2772 z7984807.exe r0108035.exe PID 2772 wrote to memory of 2804 2772 z7984807.exe r0108035.exe PID 2772 wrote to memory of 2804 2772 z7984807.exe r0108035.exe PID 2772 wrote to memory of 2804 2772 z7984807.exe r0108035.exe PID 2772 wrote to memory of 2804 2772 z7984807.exe r0108035.exe PID 2772 wrote to memory of 2804 2772 z7984807.exe r0108035.exe PID 2772 wrote to memory of 2804 2772 z7984807.exe r0108035.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2804 wrote to memory of 2704 2804 r0108035.exe AppLaunch.exe PID 2704 wrote to memory of 2592 2704 AppLaunch.exe WerFault.exe PID 2704 wrote to memory of 2592 2704 AppLaunch.exe WerFault.exe PID 2704 wrote to memory of 2592 2704 AppLaunch.exe WerFault.exe PID 2704 wrote to memory of 2592 2704 AppLaunch.exe WerFault.exe PID 2704 wrote to memory of 2592 2704 AppLaunch.exe WerFault.exe PID 2704 wrote to memory of 2592 2704 AppLaunch.exe WerFault.exe PID 2704 wrote to memory of 2592 2704 AppLaunch.exe WerFault.exe PID 2804 wrote to memory of 2732 2804 r0108035.exe WerFault.exe PID 2804 wrote to memory of 2732 2804 r0108035.exe WerFault.exe PID 2804 wrote to memory of 2732 2804 r0108035.exe WerFault.exe PID 2804 wrote to memory of 2732 2804 r0108035.exe WerFault.exe PID 2804 wrote to memory of 2732 2804 r0108035.exe WerFault.exe PID 2804 wrote to memory of 2732 2804 r0108035.exe WerFault.exe PID 2804 wrote to memory of 2732 2804 r0108035.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe"C:\Users\Admin\AppData\Local\Temp\65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8098477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8098477.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2538785.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2538785.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7984807.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7984807.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 2687⤵
- Program crash
PID:2592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2732
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD5299872d04406b3a339684016ce88da9f
SHA1affa0e4f55bf508590f217b52c411665703c9667
SHA256612b556a6d83d462761bd79ae5b7083c6a097d0014ada7e97812ce11e72141f7
SHA5129d13a0bfaadc78e0a12958829f887145a2afc1ec714cf74773e53ae240f0013b4c522b0f9b10b72f7cf022b4411ddbabd57b88595cc080e61df0d20ace3e3dd4
-
Filesize
764KB
MD5299872d04406b3a339684016ce88da9f
SHA1affa0e4f55bf508590f217b52c411665703c9667
SHA256612b556a6d83d462761bd79ae5b7083c6a097d0014ada7e97812ce11e72141f7
SHA5129d13a0bfaadc78e0a12958829f887145a2afc1ec714cf74773e53ae240f0013b4c522b0f9b10b72f7cf022b4411ddbabd57b88595cc080e61df0d20ace3e3dd4
-
Filesize
581KB
MD533471b11966a0d33b317d7f4ea0c4a5d
SHA1c7bf4edb6a1f4c2736ea45a0aae5a7ff79578df8
SHA256905b3f57343efc1b9ab405cc63230758a5e5bba689816cf600392134a6b08b42
SHA512e86bb1c28bfec1d84b03f659635359b1b3fc8d4cdca83fdc9e4d213faf87f7ee40592a4da48a38470e8a7a55a8e473b9c5158c534a43cf194013d46893f67857
-
Filesize
581KB
MD533471b11966a0d33b317d7f4ea0c4a5d
SHA1c7bf4edb6a1f4c2736ea45a0aae5a7ff79578df8
SHA256905b3f57343efc1b9ab405cc63230758a5e5bba689816cf600392134a6b08b42
SHA512e86bb1c28bfec1d84b03f659635359b1b3fc8d4cdca83fdc9e4d213faf87f7ee40592a4da48a38470e8a7a55a8e473b9c5158c534a43cf194013d46893f67857
-
Filesize
399KB
MD5c1d81df536f992476204ef5bc110f9a5
SHA14b342e6c528dd2e39e2712b689c1de66a1be199f
SHA2569da08bb055ebcda1b2c33458a9ba17b60bfccf1f9a2a199896da81a23c8d76e5
SHA512ea7a494b2fcd8da68306453bd7a26fea9c6a6559d4571e82ab3b66071b2ff0b103e24e6ebe4b9cb6e7d232fd2a4d8faf7fa634e80fdd2cc191f244db57410141
-
Filesize
399KB
MD5c1d81df536f992476204ef5bc110f9a5
SHA14b342e6c528dd2e39e2712b689c1de66a1be199f
SHA2569da08bb055ebcda1b2c33458a9ba17b60bfccf1f9a2a199896da81a23c8d76e5
SHA512ea7a494b2fcd8da68306453bd7a26fea9c6a6559d4571e82ab3b66071b2ff0b103e24e6ebe4b9cb6e7d232fd2a4d8faf7fa634e80fdd2cc191f244db57410141
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
764KB
MD5299872d04406b3a339684016ce88da9f
SHA1affa0e4f55bf508590f217b52c411665703c9667
SHA256612b556a6d83d462761bd79ae5b7083c6a097d0014ada7e97812ce11e72141f7
SHA5129d13a0bfaadc78e0a12958829f887145a2afc1ec714cf74773e53ae240f0013b4c522b0f9b10b72f7cf022b4411ddbabd57b88595cc080e61df0d20ace3e3dd4
-
Filesize
764KB
MD5299872d04406b3a339684016ce88da9f
SHA1affa0e4f55bf508590f217b52c411665703c9667
SHA256612b556a6d83d462761bd79ae5b7083c6a097d0014ada7e97812ce11e72141f7
SHA5129d13a0bfaadc78e0a12958829f887145a2afc1ec714cf74773e53ae240f0013b4c522b0f9b10b72f7cf022b4411ddbabd57b88595cc080e61df0d20ace3e3dd4
-
Filesize
581KB
MD533471b11966a0d33b317d7f4ea0c4a5d
SHA1c7bf4edb6a1f4c2736ea45a0aae5a7ff79578df8
SHA256905b3f57343efc1b9ab405cc63230758a5e5bba689816cf600392134a6b08b42
SHA512e86bb1c28bfec1d84b03f659635359b1b3fc8d4cdca83fdc9e4d213faf87f7ee40592a4da48a38470e8a7a55a8e473b9c5158c534a43cf194013d46893f67857
-
Filesize
581KB
MD533471b11966a0d33b317d7f4ea0c4a5d
SHA1c7bf4edb6a1f4c2736ea45a0aae5a7ff79578df8
SHA256905b3f57343efc1b9ab405cc63230758a5e5bba689816cf600392134a6b08b42
SHA512e86bb1c28bfec1d84b03f659635359b1b3fc8d4cdca83fdc9e4d213faf87f7ee40592a4da48a38470e8a7a55a8e473b9c5158c534a43cf194013d46893f67857
-
Filesize
399KB
MD5c1d81df536f992476204ef5bc110f9a5
SHA14b342e6c528dd2e39e2712b689c1de66a1be199f
SHA2569da08bb055ebcda1b2c33458a9ba17b60bfccf1f9a2a199896da81a23c8d76e5
SHA512ea7a494b2fcd8da68306453bd7a26fea9c6a6559d4571e82ab3b66071b2ff0b103e24e6ebe4b9cb6e7d232fd2a4d8faf7fa634e80fdd2cc191f244db57410141
-
Filesize
399KB
MD5c1d81df536f992476204ef5bc110f9a5
SHA14b342e6c528dd2e39e2712b689c1de66a1be199f
SHA2569da08bb055ebcda1b2c33458a9ba17b60bfccf1f9a2a199896da81a23c8d76e5
SHA512ea7a494b2fcd8da68306453bd7a26fea9c6a6559d4571e82ab3b66071b2ff0b103e24e6ebe4b9cb6e7d232fd2a4d8faf7fa634e80fdd2cc191f244db57410141
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea