Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 04:54

General

  • Target

    65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe

  • Size

    865KB

  • MD5

    4d113fa36d8870ea3a4bdab579fad637

  • SHA1

    db5550335e99d36b6b350bbfa5d10d42cfd9903c

  • SHA256

    65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711

  • SHA512

    29c644c9d09624a31d8e72622b6e65bbb4ed945697067d856314276ef20694487dbb3505916a01d724a52788799f081d97c0a998a2c71e02942a2b30212e1eff

  • SSDEEP

    24576:dyJw5n0ZJBHZlpJqUrB8mw0xLJA+kXFAYcjp2e9BxgOGC3:4Jwh0ZJF7pdBTL25qHc1OGC

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe
    "C:\Users\Admin\AppData\Local\Temp\65bd17c560cd153e6cf95a46da3235b171dcdcebd042a49443ff3c3068ba0711.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8098477.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8098477.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2538785.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2538785.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7984807.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7984807.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 268
                7⤵
                • Program crash
                PID:2592
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 276
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8098477.exe
    Filesize

    764KB

    MD5

    299872d04406b3a339684016ce88da9f

    SHA1

    affa0e4f55bf508590f217b52c411665703c9667

    SHA256

    612b556a6d83d462761bd79ae5b7083c6a097d0014ada7e97812ce11e72141f7

    SHA512

    9d13a0bfaadc78e0a12958829f887145a2afc1ec714cf74773e53ae240f0013b4c522b0f9b10b72f7cf022b4411ddbabd57b88595cc080e61df0d20ace3e3dd4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8098477.exe
    Filesize

    764KB

    MD5

    299872d04406b3a339684016ce88da9f

    SHA1

    affa0e4f55bf508590f217b52c411665703c9667

    SHA256

    612b556a6d83d462761bd79ae5b7083c6a097d0014ada7e97812ce11e72141f7

    SHA512

    9d13a0bfaadc78e0a12958829f887145a2afc1ec714cf74773e53ae240f0013b4c522b0f9b10b72f7cf022b4411ddbabd57b88595cc080e61df0d20ace3e3dd4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2538785.exe
    Filesize

    581KB

    MD5

    33471b11966a0d33b317d7f4ea0c4a5d

    SHA1

    c7bf4edb6a1f4c2736ea45a0aae5a7ff79578df8

    SHA256

    905b3f57343efc1b9ab405cc63230758a5e5bba689816cf600392134a6b08b42

    SHA512

    e86bb1c28bfec1d84b03f659635359b1b3fc8d4cdca83fdc9e4d213faf87f7ee40592a4da48a38470e8a7a55a8e473b9c5158c534a43cf194013d46893f67857

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2538785.exe
    Filesize

    581KB

    MD5

    33471b11966a0d33b317d7f4ea0c4a5d

    SHA1

    c7bf4edb6a1f4c2736ea45a0aae5a7ff79578df8

    SHA256

    905b3f57343efc1b9ab405cc63230758a5e5bba689816cf600392134a6b08b42

    SHA512

    e86bb1c28bfec1d84b03f659635359b1b3fc8d4cdca83fdc9e4d213faf87f7ee40592a4da48a38470e8a7a55a8e473b9c5158c534a43cf194013d46893f67857

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7984807.exe
    Filesize

    399KB

    MD5

    c1d81df536f992476204ef5bc110f9a5

    SHA1

    4b342e6c528dd2e39e2712b689c1de66a1be199f

    SHA256

    9da08bb055ebcda1b2c33458a9ba17b60bfccf1f9a2a199896da81a23c8d76e5

    SHA512

    ea7a494b2fcd8da68306453bd7a26fea9c6a6559d4571e82ab3b66071b2ff0b103e24e6ebe4b9cb6e7d232fd2a4d8faf7fa634e80fdd2cc191f244db57410141

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7984807.exe
    Filesize

    399KB

    MD5

    c1d81df536f992476204ef5bc110f9a5

    SHA1

    4b342e6c528dd2e39e2712b689c1de66a1be199f

    SHA256

    9da08bb055ebcda1b2c33458a9ba17b60bfccf1f9a2a199896da81a23c8d76e5

    SHA512

    ea7a494b2fcd8da68306453bd7a26fea9c6a6559d4571e82ab3b66071b2ff0b103e24e6ebe4b9cb6e7d232fd2a4d8faf7fa634e80fdd2cc191f244db57410141

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8098477.exe
    Filesize

    764KB

    MD5

    299872d04406b3a339684016ce88da9f

    SHA1

    affa0e4f55bf508590f217b52c411665703c9667

    SHA256

    612b556a6d83d462761bd79ae5b7083c6a097d0014ada7e97812ce11e72141f7

    SHA512

    9d13a0bfaadc78e0a12958829f887145a2afc1ec714cf74773e53ae240f0013b4c522b0f9b10b72f7cf022b4411ddbabd57b88595cc080e61df0d20ace3e3dd4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z8098477.exe
    Filesize

    764KB

    MD5

    299872d04406b3a339684016ce88da9f

    SHA1

    affa0e4f55bf508590f217b52c411665703c9667

    SHA256

    612b556a6d83d462761bd79ae5b7083c6a097d0014ada7e97812ce11e72141f7

    SHA512

    9d13a0bfaadc78e0a12958829f887145a2afc1ec714cf74773e53ae240f0013b4c522b0f9b10b72f7cf022b4411ddbabd57b88595cc080e61df0d20ace3e3dd4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2538785.exe
    Filesize

    581KB

    MD5

    33471b11966a0d33b317d7f4ea0c4a5d

    SHA1

    c7bf4edb6a1f4c2736ea45a0aae5a7ff79578df8

    SHA256

    905b3f57343efc1b9ab405cc63230758a5e5bba689816cf600392134a6b08b42

    SHA512

    e86bb1c28bfec1d84b03f659635359b1b3fc8d4cdca83fdc9e4d213faf87f7ee40592a4da48a38470e8a7a55a8e473b9c5158c534a43cf194013d46893f67857

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2538785.exe
    Filesize

    581KB

    MD5

    33471b11966a0d33b317d7f4ea0c4a5d

    SHA1

    c7bf4edb6a1f4c2736ea45a0aae5a7ff79578df8

    SHA256

    905b3f57343efc1b9ab405cc63230758a5e5bba689816cf600392134a6b08b42

    SHA512

    e86bb1c28bfec1d84b03f659635359b1b3fc8d4cdca83fdc9e4d213faf87f7ee40592a4da48a38470e8a7a55a8e473b9c5158c534a43cf194013d46893f67857

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7984807.exe
    Filesize

    399KB

    MD5

    c1d81df536f992476204ef5bc110f9a5

    SHA1

    4b342e6c528dd2e39e2712b689c1de66a1be199f

    SHA256

    9da08bb055ebcda1b2c33458a9ba17b60bfccf1f9a2a199896da81a23c8d76e5

    SHA512

    ea7a494b2fcd8da68306453bd7a26fea9c6a6559d4571e82ab3b66071b2ff0b103e24e6ebe4b9cb6e7d232fd2a4d8faf7fa634e80fdd2cc191f244db57410141

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7984807.exe
    Filesize

    399KB

    MD5

    c1d81df536f992476204ef5bc110f9a5

    SHA1

    4b342e6c528dd2e39e2712b689c1de66a1be199f

    SHA256

    9da08bb055ebcda1b2c33458a9ba17b60bfccf1f9a2a199896da81a23c8d76e5

    SHA512

    ea7a494b2fcd8da68306453bd7a26fea9c6a6559d4571e82ab3b66071b2ff0b103e24e6ebe4b9cb6e7d232fd2a4d8faf7fa634e80fdd2cc191f244db57410141

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0108035.exe
    Filesize

    356KB

    MD5

    bab1b99956076a291c8ac5eb5af9c117

    SHA1

    13c92d4af43b0d14a5c518d5ad1c15ed61d58d03

    SHA256

    e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe

    SHA512

    147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea

  • memory/2704-46-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2704-45-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2704-50-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2704-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2704-52-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2704-54-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2704-48-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2704-47-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2704-43-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2704-44-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB