Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 04:54
Static task
static1
Behavioral task
behavioral1
Sample
535b505642f561753d0600f9937ce07e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
535b505642f561753d0600f9937ce07e.exe
Resource
win10v2004-20230915-en
General
-
Target
535b505642f561753d0600f9937ce07e.exe
-
Size
866KB
-
MD5
535b505642f561753d0600f9937ce07e
-
SHA1
6c234f6baa3a4b88ae608feb2b21cd6961f48a97
-
SHA256
e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e
-
SHA512
7136e6863d9bd346858f4dcb1f4ffd48df4bfee93c7822c0592724f8aa07a930334ac231ed50f7294f5c965558c6b1fb1fa4b5a3773803532f7b34cd88cb4342
-
SSDEEP
24576:syADpUa/4ZhoiiLPm+MvOBj1E7hrAVpAizxRi:bWuLZaiAPAmZ14FAIizx
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1704-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1704-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1704-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1704-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1704-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1704-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
Processes:
z6303187.exez0963353.exez8761135.exer0865111.exepid process 3056 z6303187.exe 2740 z0963353.exe 2616 z8761135.exe 2868 r0865111.exe -
Loads dropped DLL 13 IoCs
Processes:
535b505642f561753d0600f9937ce07e.exez6303187.exez0963353.exez8761135.exer0865111.exeWerFault.exepid process 2060 535b505642f561753d0600f9937ce07e.exe 3056 z6303187.exe 3056 z6303187.exe 2740 z0963353.exe 2740 z0963353.exe 2616 z8761135.exe 2616 z8761135.exe 2616 z8761135.exe 2868 r0865111.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
535b505642f561753d0600f9937ce07e.exez6303187.exez0963353.exez8761135.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 535b505642f561753d0600f9937ce07e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6303187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0963353.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8761135.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
r0865111.exedescription pid process target process PID 2868 set thread context of 1704 2868 r0865111.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1116 1704 WerFault.exe AppLaunch.exe 1976 2868 WerFault.exe r0865111.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
535b505642f561753d0600f9937ce07e.exez6303187.exez0963353.exez8761135.exer0865111.exeAppLaunch.exedescription pid process target process PID 2060 wrote to memory of 3056 2060 535b505642f561753d0600f9937ce07e.exe z6303187.exe PID 2060 wrote to memory of 3056 2060 535b505642f561753d0600f9937ce07e.exe z6303187.exe PID 2060 wrote to memory of 3056 2060 535b505642f561753d0600f9937ce07e.exe z6303187.exe PID 2060 wrote to memory of 3056 2060 535b505642f561753d0600f9937ce07e.exe z6303187.exe PID 2060 wrote to memory of 3056 2060 535b505642f561753d0600f9937ce07e.exe z6303187.exe PID 2060 wrote to memory of 3056 2060 535b505642f561753d0600f9937ce07e.exe z6303187.exe PID 2060 wrote to memory of 3056 2060 535b505642f561753d0600f9937ce07e.exe z6303187.exe PID 3056 wrote to memory of 2740 3056 z6303187.exe z0963353.exe PID 3056 wrote to memory of 2740 3056 z6303187.exe z0963353.exe PID 3056 wrote to memory of 2740 3056 z6303187.exe z0963353.exe PID 3056 wrote to memory of 2740 3056 z6303187.exe z0963353.exe PID 3056 wrote to memory of 2740 3056 z6303187.exe z0963353.exe PID 3056 wrote to memory of 2740 3056 z6303187.exe z0963353.exe PID 3056 wrote to memory of 2740 3056 z6303187.exe z0963353.exe PID 2740 wrote to memory of 2616 2740 z0963353.exe z8761135.exe PID 2740 wrote to memory of 2616 2740 z0963353.exe z8761135.exe PID 2740 wrote to memory of 2616 2740 z0963353.exe z8761135.exe PID 2740 wrote to memory of 2616 2740 z0963353.exe z8761135.exe PID 2740 wrote to memory of 2616 2740 z0963353.exe z8761135.exe PID 2740 wrote to memory of 2616 2740 z0963353.exe z8761135.exe PID 2740 wrote to memory of 2616 2740 z0963353.exe z8761135.exe PID 2616 wrote to memory of 2868 2616 z8761135.exe r0865111.exe PID 2616 wrote to memory of 2868 2616 z8761135.exe r0865111.exe PID 2616 wrote to memory of 2868 2616 z8761135.exe r0865111.exe PID 2616 wrote to memory of 2868 2616 z8761135.exe r0865111.exe PID 2616 wrote to memory of 2868 2616 z8761135.exe r0865111.exe PID 2616 wrote to memory of 2868 2616 z8761135.exe r0865111.exe PID 2616 wrote to memory of 2868 2616 z8761135.exe r0865111.exe PID 2868 wrote to memory of 2996 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 2996 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 2996 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 2996 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 2996 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 2996 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 2996 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1704 2868 r0865111.exe AppLaunch.exe PID 2868 wrote to memory of 1976 2868 r0865111.exe WerFault.exe PID 2868 wrote to memory of 1976 2868 r0865111.exe WerFault.exe PID 2868 wrote to memory of 1976 2868 r0865111.exe WerFault.exe PID 1704 wrote to memory of 1116 1704 AppLaunch.exe WerFault.exe PID 1704 wrote to memory of 1116 1704 AppLaunch.exe WerFault.exe PID 1704 wrote to memory of 1116 1704 AppLaunch.exe WerFault.exe PID 1704 wrote to memory of 1116 1704 AppLaunch.exe WerFault.exe PID 1704 wrote to memory of 1116 1704 AppLaunch.exe WerFault.exe PID 1704 wrote to memory of 1116 1704 AppLaunch.exe WerFault.exe PID 2868 wrote to memory of 1976 2868 r0865111.exe WerFault.exe PID 2868 wrote to memory of 1976 2868 r0865111.exe WerFault.exe PID 2868 wrote to memory of 1976 2868 r0865111.exe WerFault.exe PID 2868 wrote to memory of 1976 2868 r0865111.exe WerFault.exe PID 1704 wrote to memory of 1116 1704 AppLaunch.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\535b505642f561753d0600f9937ce07e.exe"C:\Users\Admin\AppData\Local\Temp\535b505642f561753d0600f9937ce07e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6303187.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6303187.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0963353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0963353.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8761135.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8761135.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0865111.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0865111.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 2687⤵
- Program crash
PID:1116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:1976
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD571e2d748afe94a868688c1c144da320b
SHA1403d08d8a73741d68727e056507b629808f5fd56
SHA2562a093673e0fcf37393cb8fe27e7132ec7f15739d747b613fad187fa5af421dc5
SHA512983456b14c2fc3c64aaa0a15b23538a5f06840426bdd9fda7773f0489886ad8172edd071428bd349b3a5c9ba388f137aed3a554f552f061f03d0e7009e43d737
-
Filesize
764KB
MD571e2d748afe94a868688c1c144da320b
SHA1403d08d8a73741d68727e056507b629808f5fd56
SHA2562a093673e0fcf37393cb8fe27e7132ec7f15739d747b613fad187fa5af421dc5
SHA512983456b14c2fc3c64aaa0a15b23538a5f06840426bdd9fda7773f0489886ad8172edd071428bd349b3a5c9ba388f137aed3a554f552f061f03d0e7009e43d737
-
Filesize
582KB
MD5923dd9e6229be6f2d4afb32d431f8c35
SHA1c91d2622698c65a2755a09a0fddf3aa8254dce79
SHA2569716e44c9ef5d0fed231b68e9ad7cde2aa82473d6939a4c9f1d2933b0568d037
SHA512abe0e82b6f43b3d5822be37a880fab2ac9653aab02eb19ebac3da531554e7407da8f0a2f9e9be909a5e66b97c9cb5a4a6e1b01f1a996eb92a178d1a145486844
-
Filesize
582KB
MD5923dd9e6229be6f2d4afb32d431f8c35
SHA1c91d2622698c65a2755a09a0fddf3aa8254dce79
SHA2569716e44c9ef5d0fed231b68e9ad7cde2aa82473d6939a4c9f1d2933b0568d037
SHA512abe0e82b6f43b3d5822be37a880fab2ac9653aab02eb19ebac3da531554e7407da8f0a2f9e9be909a5e66b97c9cb5a4a6e1b01f1a996eb92a178d1a145486844
-
Filesize
400KB
MD57e08dcb51536ce22ec436566211f9f46
SHA12d0fe790129ed5e7cee439fa7f9189419a8a3f4a
SHA2564412f1c469f349f41342cbba728073045b18f8f056528bd3ce78cbc83936c485
SHA512b05ae7565aedb8f3b79f3e594c31dbd014f60198d2012a9c878bb66bab62fddf2a2cd1a627d258aa0c054d84415e5a6c4600a1420e881e043fc95e789a95c32d
-
Filesize
400KB
MD57e08dcb51536ce22ec436566211f9f46
SHA12d0fe790129ed5e7cee439fa7f9189419a8a3f4a
SHA2564412f1c469f349f41342cbba728073045b18f8f056528bd3ce78cbc83936c485
SHA512b05ae7565aedb8f3b79f3e594c31dbd014f60198d2012a9c878bb66bab62fddf2a2cd1a627d258aa0c054d84415e5a6c4600a1420e881e043fc95e789a95c32d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
764KB
MD571e2d748afe94a868688c1c144da320b
SHA1403d08d8a73741d68727e056507b629808f5fd56
SHA2562a093673e0fcf37393cb8fe27e7132ec7f15739d747b613fad187fa5af421dc5
SHA512983456b14c2fc3c64aaa0a15b23538a5f06840426bdd9fda7773f0489886ad8172edd071428bd349b3a5c9ba388f137aed3a554f552f061f03d0e7009e43d737
-
Filesize
764KB
MD571e2d748afe94a868688c1c144da320b
SHA1403d08d8a73741d68727e056507b629808f5fd56
SHA2562a093673e0fcf37393cb8fe27e7132ec7f15739d747b613fad187fa5af421dc5
SHA512983456b14c2fc3c64aaa0a15b23538a5f06840426bdd9fda7773f0489886ad8172edd071428bd349b3a5c9ba388f137aed3a554f552f061f03d0e7009e43d737
-
Filesize
582KB
MD5923dd9e6229be6f2d4afb32d431f8c35
SHA1c91d2622698c65a2755a09a0fddf3aa8254dce79
SHA2569716e44c9ef5d0fed231b68e9ad7cde2aa82473d6939a4c9f1d2933b0568d037
SHA512abe0e82b6f43b3d5822be37a880fab2ac9653aab02eb19ebac3da531554e7407da8f0a2f9e9be909a5e66b97c9cb5a4a6e1b01f1a996eb92a178d1a145486844
-
Filesize
582KB
MD5923dd9e6229be6f2d4afb32d431f8c35
SHA1c91d2622698c65a2755a09a0fddf3aa8254dce79
SHA2569716e44c9ef5d0fed231b68e9ad7cde2aa82473d6939a4c9f1d2933b0568d037
SHA512abe0e82b6f43b3d5822be37a880fab2ac9653aab02eb19ebac3da531554e7407da8f0a2f9e9be909a5e66b97c9cb5a4a6e1b01f1a996eb92a178d1a145486844
-
Filesize
400KB
MD57e08dcb51536ce22ec436566211f9f46
SHA12d0fe790129ed5e7cee439fa7f9189419a8a3f4a
SHA2564412f1c469f349f41342cbba728073045b18f8f056528bd3ce78cbc83936c485
SHA512b05ae7565aedb8f3b79f3e594c31dbd014f60198d2012a9c878bb66bab62fddf2a2cd1a627d258aa0c054d84415e5a6c4600a1420e881e043fc95e789a95c32d
-
Filesize
400KB
MD57e08dcb51536ce22ec436566211f9f46
SHA12d0fe790129ed5e7cee439fa7f9189419a8a3f4a
SHA2564412f1c469f349f41342cbba728073045b18f8f056528bd3ce78cbc83936c485
SHA512b05ae7565aedb8f3b79f3e594c31dbd014f60198d2012a9c878bb66bab62fddf2a2cd1a627d258aa0c054d84415e5a6c4600a1420e881e043fc95e789a95c32d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d