Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 04:56
Static task
static1
Behavioral task
behavioral1
Sample
7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe
Resource
win10v2004-20230915-en
General
-
Target
7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe
-
Size
867KB
-
MD5
988994571a27ad64fac33a99ad999c48
-
SHA1
62f33be638d0540dcd16ce8f1ae98056b673e7d0
-
SHA256
7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f
-
SHA512
074739fe7d125c62ad2d6fba26c262b24ce36ca351184a2b3d533b210d6492729aca487ad3d205ae52cfcd3e3c96fbd08e8277c46f6197d6b21b509b14952d59
-
SSDEEP
12288:rMrsy90oNON/RkxBBEFpvP9AaF0aOOkXglX3DIJy0chyeXweZaTkQfRFl+cJtAa5:zy3NOPPfO1XglX3DvIDJv+cJtACnf
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2524-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2524-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2524-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2524-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2524-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2524-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
Processes:
z1115149.exez1661285.exez7566859.exer4818123.exepid process 2836 z1115149.exe 2648 z1661285.exe 2708 z7566859.exe 2732 r4818123.exe -
Loads dropped DLL 13 IoCs
Processes:
7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exez1115149.exez1661285.exez7566859.exer4818123.exeWerFault.exepid process 1604 7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe 2836 z1115149.exe 2836 z1115149.exe 2648 z1661285.exe 2648 z1661285.exe 2708 z7566859.exe 2708 z7566859.exe 2708 z7566859.exe 2732 r4818123.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exez1115149.exez1661285.exez7566859.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1115149.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1661285.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7566859.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
r4818123.exedescription pid process target process PID 2732 set thread context of 2524 2732 r4818123.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2616 2732 WerFault.exe r4818123.exe 2496 2524 WerFault.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exez1115149.exez1661285.exez7566859.exer4818123.exeAppLaunch.exedescription pid process target process PID 1604 wrote to memory of 2836 1604 7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe z1115149.exe PID 1604 wrote to memory of 2836 1604 7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe z1115149.exe PID 1604 wrote to memory of 2836 1604 7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe z1115149.exe PID 1604 wrote to memory of 2836 1604 7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe z1115149.exe PID 1604 wrote to memory of 2836 1604 7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe z1115149.exe PID 1604 wrote to memory of 2836 1604 7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe z1115149.exe PID 1604 wrote to memory of 2836 1604 7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe z1115149.exe PID 2836 wrote to memory of 2648 2836 z1115149.exe z1661285.exe PID 2836 wrote to memory of 2648 2836 z1115149.exe z1661285.exe PID 2836 wrote to memory of 2648 2836 z1115149.exe z1661285.exe PID 2836 wrote to memory of 2648 2836 z1115149.exe z1661285.exe PID 2836 wrote to memory of 2648 2836 z1115149.exe z1661285.exe PID 2836 wrote to memory of 2648 2836 z1115149.exe z1661285.exe PID 2836 wrote to memory of 2648 2836 z1115149.exe z1661285.exe PID 2648 wrote to memory of 2708 2648 z1661285.exe z7566859.exe PID 2648 wrote to memory of 2708 2648 z1661285.exe z7566859.exe PID 2648 wrote to memory of 2708 2648 z1661285.exe z7566859.exe PID 2648 wrote to memory of 2708 2648 z1661285.exe z7566859.exe PID 2648 wrote to memory of 2708 2648 z1661285.exe z7566859.exe PID 2648 wrote to memory of 2708 2648 z1661285.exe z7566859.exe PID 2648 wrote to memory of 2708 2648 z1661285.exe z7566859.exe PID 2708 wrote to memory of 2732 2708 z7566859.exe r4818123.exe PID 2708 wrote to memory of 2732 2708 z7566859.exe r4818123.exe PID 2708 wrote to memory of 2732 2708 z7566859.exe r4818123.exe PID 2708 wrote to memory of 2732 2708 z7566859.exe r4818123.exe PID 2708 wrote to memory of 2732 2708 z7566859.exe r4818123.exe PID 2708 wrote to memory of 2732 2708 z7566859.exe r4818123.exe PID 2708 wrote to memory of 2732 2708 z7566859.exe r4818123.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2524 2732 r4818123.exe AppLaunch.exe PID 2732 wrote to memory of 2616 2732 r4818123.exe WerFault.exe PID 2732 wrote to memory of 2616 2732 r4818123.exe WerFault.exe PID 2732 wrote to memory of 2616 2732 r4818123.exe WerFault.exe PID 2732 wrote to memory of 2616 2732 r4818123.exe WerFault.exe PID 2732 wrote to memory of 2616 2732 r4818123.exe WerFault.exe PID 2732 wrote to memory of 2616 2732 r4818123.exe WerFault.exe PID 2732 wrote to memory of 2616 2732 r4818123.exe WerFault.exe PID 2524 wrote to memory of 2496 2524 AppLaunch.exe WerFault.exe PID 2524 wrote to memory of 2496 2524 AppLaunch.exe WerFault.exe PID 2524 wrote to memory of 2496 2524 AppLaunch.exe WerFault.exe PID 2524 wrote to memory of 2496 2524 AppLaunch.exe WerFault.exe PID 2524 wrote to memory of 2496 2524 AppLaunch.exe WerFault.exe PID 2524 wrote to memory of 2496 2524 AppLaunch.exe WerFault.exe PID 2524 wrote to memory of 2496 2524 AppLaunch.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe"C:\Users\Admin\AppData\Local\Temp\7ba3400264a22e6e314babc5d2ee86b66bdc3a377b80a8c86e3fe98653314c0f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1115149.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1115149.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1661285.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1661285.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7566859.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7566859.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r4818123.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r4818123.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 2687⤵
- Program crash
PID:2496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2616
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD5e227f79a1911809e43f8a43b3d01b1c1
SHA193a45936f582a4c4921f280e80fcbd36023f6f15
SHA2563fceee2b499f363b83f5bf6d305ad1693ad3805d0520a9c28a7ded45f5405895
SHA5129475e226943abbfa902c7507b5dab9bc52ca27413e63284e491993826c90ce02b3d2ea63263cada629e678020a87a10d1d9199e6cfc60a4ed1cd88b561592bc9
-
Filesize
764KB
MD5e227f79a1911809e43f8a43b3d01b1c1
SHA193a45936f582a4c4921f280e80fcbd36023f6f15
SHA2563fceee2b499f363b83f5bf6d305ad1693ad3805d0520a9c28a7ded45f5405895
SHA5129475e226943abbfa902c7507b5dab9bc52ca27413e63284e491993826c90ce02b3d2ea63263cada629e678020a87a10d1d9199e6cfc60a4ed1cd88b561592bc9
-
Filesize
581KB
MD5b8070be367cab7acb87e0a6d7ad79faf
SHA16063f2112ad79fabb0685eeba3a85d13a4b76a15
SHA256b4145d0eff3e6ac4945e59434e74f0b2600ab7b92c42ffb0549f1ef27080f854
SHA512f4e35e7bac90fdeda6a2ab9cbed549d89be4311e962a4c5563bcf45374aa66f534d7f6d3ec3d02d21f064d790884dfc975eb0f773780060d820ab66ee1121e80
-
Filesize
581KB
MD5b8070be367cab7acb87e0a6d7ad79faf
SHA16063f2112ad79fabb0685eeba3a85d13a4b76a15
SHA256b4145d0eff3e6ac4945e59434e74f0b2600ab7b92c42ffb0549f1ef27080f854
SHA512f4e35e7bac90fdeda6a2ab9cbed549d89be4311e962a4c5563bcf45374aa66f534d7f6d3ec3d02d21f064d790884dfc975eb0f773780060d820ab66ee1121e80
-
Filesize
399KB
MD5048d15e40c5f8ed51cd16892b67069ac
SHA1cbc6a18358eff74a90c4049fe8c4a25e698c2cc5
SHA256ccbc29db8fcbc8657b444c0f9bc99a0be578e6168956373587f3b731a7a483ee
SHA512ca4730219cca7b336814d6af11f781bbe6438db843b414fe2f2a9ba13d01aea783ec803c40f92b362ec4ba44a24b00896d1d8dc447d007a59d572a4a7d8eb79b
-
Filesize
399KB
MD5048d15e40c5f8ed51cd16892b67069ac
SHA1cbc6a18358eff74a90c4049fe8c4a25e698c2cc5
SHA256ccbc29db8fcbc8657b444c0f9bc99a0be578e6168956373587f3b731a7a483ee
SHA512ca4730219cca7b336814d6af11f781bbe6438db843b414fe2f2a9ba13d01aea783ec803c40f92b362ec4ba44a24b00896d1d8dc447d007a59d572a4a7d8eb79b
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2
-
Filesize
764KB
MD5e227f79a1911809e43f8a43b3d01b1c1
SHA193a45936f582a4c4921f280e80fcbd36023f6f15
SHA2563fceee2b499f363b83f5bf6d305ad1693ad3805d0520a9c28a7ded45f5405895
SHA5129475e226943abbfa902c7507b5dab9bc52ca27413e63284e491993826c90ce02b3d2ea63263cada629e678020a87a10d1d9199e6cfc60a4ed1cd88b561592bc9
-
Filesize
764KB
MD5e227f79a1911809e43f8a43b3d01b1c1
SHA193a45936f582a4c4921f280e80fcbd36023f6f15
SHA2563fceee2b499f363b83f5bf6d305ad1693ad3805d0520a9c28a7ded45f5405895
SHA5129475e226943abbfa902c7507b5dab9bc52ca27413e63284e491993826c90ce02b3d2ea63263cada629e678020a87a10d1d9199e6cfc60a4ed1cd88b561592bc9
-
Filesize
581KB
MD5b8070be367cab7acb87e0a6d7ad79faf
SHA16063f2112ad79fabb0685eeba3a85d13a4b76a15
SHA256b4145d0eff3e6ac4945e59434e74f0b2600ab7b92c42ffb0549f1ef27080f854
SHA512f4e35e7bac90fdeda6a2ab9cbed549d89be4311e962a4c5563bcf45374aa66f534d7f6d3ec3d02d21f064d790884dfc975eb0f773780060d820ab66ee1121e80
-
Filesize
581KB
MD5b8070be367cab7acb87e0a6d7ad79faf
SHA16063f2112ad79fabb0685eeba3a85d13a4b76a15
SHA256b4145d0eff3e6ac4945e59434e74f0b2600ab7b92c42ffb0549f1ef27080f854
SHA512f4e35e7bac90fdeda6a2ab9cbed549d89be4311e962a4c5563bcf45374aa66f534d7f6d3ec3d02d21f064d790884dfc975eb0f773780060d820ab66ee1121e80
-
Filesize
399KB
MD5048d15e40c5f8ed51cd16892b67069ac
SHA1cbc6a18358eff74a90c4049fe8c4a25e698c2cc5
SHA256ccbc29db8fcbc8657b444c0f9bc99a0be578e6168956373587f3b731a7a483ee
SHA512ca4730219cca7b336814d6af11f781bbe6438db843b414fe2f2a9ba13d01aea783ec803c40f92b362ec4ba44a24b00896d1d8dc447d007a59d572a4a7d8eb79b
-
Filesize
399KB
MD5048d15e40c5f8ed51cd16892b67069ac
SHA1cbc6a18358eff74a90c4049fe8c4a25e698c2cc5
SHA256ccbc29db8fcbc8657b444c0f9bc99a0be578e6168956373587f3b731a7a483ee
SHA512ca4730219cca7b336814d6af11f781bbe6438db843b414fe2f2a9ba13d01aea783ec803c40f92b362ec4ba44a24b00896d1d8dc447d007a59d572a4a7d8eb79b
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2
-
Filesize
356KB
MD501ab2455f7795896e98e7b2872a60882
SHA191ed306c479b647fd11782d4ae23c9e7a3583ae2
SHA25641f51fad3435291aca3c2c1d1d67155e090d4da7befa01ade2b5ef1f61355d18
SHA512abcf04b280959f598d65f0fec031e6bcd6a9aedbebbd40436b0f54a19df387c2fae9bea65b33840bbcd32fbaf39018a3ec443767c8342b20abf81ba0ac5567d2