Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 04:57
Static task
static1
Behavioral task
behavioral1
Sample
e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe
Resource
win10v2004-20230915-en
General
-
Target
e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe
-
Size
866KB
-
MD5
535b505642f561753d0600f9937ce07e
-
SHA1
6c234f6baa3a4b88ae608feb2b21cd6961f48a97
-
SHA256
e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e
-
SHA512
7136e6863d9bd346858f4dcb1f4ffd48df4bfee93c7822c0592724f8aa07a930334ac231ed50f7294f5c965558c6b1fb1fa4b5a3773803532f7b34cd88cb4342
-
SSDEEP
24576:syADpUa/4ZhoiiLPm+MvOBj1E7hrAVpAizxRi:bWuLZaiAPAmZ14FAIizx
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2716-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2716-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2716-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2716-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2716-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2716-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
Processes:
z6303187.exez0963353.exez8761135.exer0865111.exepid process 2256 z6303187.exe 2624 z0963353.exe 2708 z8761135.exe 2504 r0865111.exe -
Loads dropped DLL 13 IoCs
Processes:
e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exez6303187.exez0963353.exez8761135.exer0865111.exeWerFault.exepid process 1304 e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe 2256 z6303187.exe 2256 z6303187.exe 2624 z0963353.exe 2624 z0963353.exe 2708 z8761135.exe 2708 z8761135.exe 2708 z8761135.exe 2504 r0865111.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exez6303187.exez0963353.exez8761135.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6303187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0963353.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8761135.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
r0865111.exedescription pid process target process PID 2504 set thread context of 2716 2504 r0865111.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2516 2716 WerFault.exe AppLaunch.exe 2552 2504 WerFault.exe r0865111.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exez6303187.exez0963353.exez8761135.exer0865111.exeAppLaunch.exedescription pid process target process PID 1304 wrote to memory of 2256 1304 e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe z6303187.exe PID 1304 wrote to memory of 2256 1304 e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe z6303187.exe PID 1304 wrote to memory of 2256 1304 e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe z6303187.exe PID 1304 wrote to memory of 2256 1304 e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe z6303187.exe PID 1304 wrote to memory of 2256 1304 e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe z6303187.exe PID 1304 wrote to memory of 2256 1304 e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe z6303187.exe PID 1304 wrote to memory of 2256 1304 e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe z6303187.exe PID 2256 wrote to memory of 2624 2256 z6303187.exe z0963353.exe PID 2256 wrote to memory of 2624 2256 z6303187.exe z0963353.exe PID 2256 wrote to memory of 2624 2256 z6303187.exe z0963353.exe PID 2256 wrote to memory of 2624 2256 z6303187.exe z0963353.exe PID 2256 wrote to memory of 2624 2256 z6303187.exe z0963353.exe PID 2256 wrote to memory of 2624 2256 z6303187.exe z0963353.exe PID 2256 wrote to memory of 2624 2256 z6303187.exe z0963353.exe PID 2624 wrote to memory of 2708 2624 z0963353.exe z8761135.exe PID 2624 wrote to memory of 2708 2624 z0963353.exe z8761135.exe PID 2624 wrote to memory of 2708 2624 z0963353.exe z8761135.exe PID 2624 wrote to memory of 2708 2624 z0963353.exe z8761135.exe PID 2624 wrote to memory of 2708 2624 z0963353.exe z8761135.exe PID 2624 wrote to memory of 2708 2624 z0963353.exe z8761135.exe PID 2624 wrote to memory of 2708 2624 z0963353.exe z8761135.exe PID 2708 wrote to memory of 2504 2708 z8761135.exe r0865111.exe PID 2708 wrote to memory of 2504 2708 z8761135.exe r0865111.exe PID 2708 wrote to memory of 2504 2708 z8761135.exe r0865111.exe PID 2708 wrote to memory of 2504 2708 z8761135.exe r0865111.exe PID 2708 wrote to memory of 2504 2708 z8761135.exe r0865111.exe PID 2708 wrote to memory of 2504 2708 z8761135.exe r0865111.exe PID 2708 wrote to memory of 2504 2708 z8761135.exe r0865111.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2716 2504 r0865111.exe AppLaunch.exe PID 2504 wrote to memory of 2552 2504 r0865111.exe WerFault.exe PID 2716 wrote to memory of 2516 2716 AppLaunch.exe WerFault.exe PID 2504 wrote to memory of 2552 2504 r0865111.exe WerFault.exe PID 2504 wrote to memory of 2552 2504 r0865111.exe WerFault.exe PID 2716 wrote to memory of 2516 2716 AppLaunch.exe WerFault.exe PID 2716 wrote to memory of 2516 2716 AppLaunch.exe WerFault.exe PID 2504 wrote to memory of 2552 2504 r0865111.exe WerFault.exe PID 2716 wrote to memory of 2516 2716 AppLaunch.exe WerFault.exe PID 2716 wrote to memory of 2516 2716 AppLaunch.exe WerFault.exe PID 2716 wrote to memory of 2516 2716 AppLaunch.exe WerFault.exe PID 2716 wrote to memory of 2516 2716 AppLaunch.exe WerFault.exe PID 2504 wrote to memory of 2552 2504 r0865111.exe WerFault.exe PID 2504 wrote to memory of 2552 2504 r0865111.exe WerFault.exe PID 2504 wrote to memory of 2552 2504 r0865111.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe"C:\Users\Admin\AppData\Local\Temp\e8d9168072dd63b984e2f2113ddb1988efea60c9cc037aacde8723823088c59e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6303187.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6303187.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0963353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0963353.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8761135.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8761135.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0865111.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0865111.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 2687⤵
- Program crash
PID:2516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2552
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD571e2d748afe94a868688c1c144da320b
SHA1403d08d8a73741d68727e056507b629808f5fd56
SHA2562a093673e0fcf37393cb8fe27e7132ec7f15739d747b613fad187fa5af421dc5
SHA512983456b14c2fc3c64aaa0a15b23538a5f06840426bdd9fda7773f0489886ad8172edd071428bd349b3a5c9ba388f137aed3a554f552f061f03d0e7009e43d737
-
Filesize
764KB
MD571e2d748afe94a868688c1c144da320b
SHA1403d08d8a73741d68727e056507b629808f5fd56
SHA2562a093673e0fcf37393cb8fe27e7132ec7f15739d747b613fad187fa5af421dc5
SHA512983456b14c2fc3c64aaa0a15b23538a5f06840426bdd9fda7773f0489886ad8172edd071428bd349b3a5c9ba388f137aed3a554f552f061f03d0e7009e43d737
-
Filesize
582KB
MD5923dd9e6229be6f2d4afb32d431f8c35
SHA1c91d2622698c65a2755a09a0fddf3aa8254dce79
SHA2569716e44c9ef5d0fed231b68e9ad7cde2aa82473d6939a4c9f1d2933b0568d037
SHA512abe0e82b6f43b3d5822be37a880fab2ac9653aab02eb19ebac3da531554e7407da8f0a2f9e9be909a5e66b97c9cb5a4a6e1b01f1a996eb92a178d1a145486844
-
Filesize
582KB
MD5923dd9e6229be6f2d4afb32d431f8c35
SHA1c91d2622698c65a2755a09a0fddf3aa8254dce79
SHA2569716e44c9ef5d0fed231b68e9ad7cde2aa82473d6939a4c9f1d2933b0568d037
SHA512abe0e82b6f43b3d5822be37a880fab2ac9653aab02eb19ebac3da531554e7407da8f0a2f9e9be909a5e66b97c9cb5a4a6e1b01f1a996eb92a178d1a145486844
-
Filesize
400KB
MD57e08dcb51536ce22ec436566211f9f46
SHA12d0fe790129ed5e7cee439fa7f9189419a8a3f4a
SHA2564412f1c469f349f41342cbba728073045b18f8f056528bd3ce78cbc83936c485
SHA512b05ae7565aedb8f3b79f3e594c31dbd014f60198d2012a9c878bb66bab62fddf2a2cd1a627d258aa0c054d84415e5a6c4600a1420e881e043fc95e789a95c32d
-
Filesize
400KB
MD57e08dcb51536ce22ec436566211f9f46
SHA12d0fe790129ed5e7cee439fa7f9189419a8a3f4a
SHA2564412f1c469f349f41342cbba728073045b18f8f056528bd3ce78cbc83936c485
SHA512b05ae7565aedb8f3b79f3e594c31dbd014f60198d2012a9c878bb66bab62fddf2a2cd1a627d258aa0c054d84415e5a6c4600a1420e881e043fc95e789a95c32d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
764KB
MD571e2d748afe94a868688c1c144da320b
SHA1403d08d8a73741d68727e056507b629808f5fd56
SHA2562a093673e0fcf37393cb8fe27e7132ec7f15739d747b613fad187fa5af421dc5
SHA512983456b14c2fc3c64aaa0a15b23538a5f06840426bdd9fda7773f0489886ad8172edd071428bd349b3a5c9ba388f137aed3a554f552f061f03d0e7009e43d737
-
Filesize
764KB
MD571e2d748afe94a868688c1c144da320b
SHA1403d08d8a73741d68727e056507b629808f5fd56
SHA2562a093673e0fcf37393cb8fe27e7132ec7f15739d747b613fad187fa5af421dc5
SHA512983456b14c2fc3c64aaa0a15b23538a5f06840426bdd9fda7773f0489886ad8172edd071428bd349b3a5c9ba388f137aed3a554f552f061f03d0e7009e43d737
-
Filesize
582KB
MD5923dd9e6229be6f2d4afb32d431f8c35
SHA1c91d2622698c65a2755a09a0fddf3aa8254dce79
SHA2569716e44c9ef5d0fed231b68e9ad7cde2aa82473d6939a4c9f1d2933b0568d037
SHA512abe0e82b6f43b3d5822be37a880fab2ac9653aab02eb19ebac3da531554e7407da8f0a2f9e9be909a5e66b97c9cb5a4a6e1b01f1a996eb92a178d1a145486844
-
Filesize
582KB
MD5923dd9e6229be6f2d4afb32d431f8c35
SHA1c91d2622698c65a2755a09a0fddf3aa8254dce79
SHA2569716e44c9ef5d0fed231b68e9ad7cde2aa82473d6939a4c9f1d2933b0568d037
SHA512abe0e82b6f43b3d5822be37a880fab2ac9653aab02eb19ebac3da531554e7407da8f0a2f9e9be909a5e66b97c9cb5a4a6e1b01f1a996eb92a178d1a145486844
-
Filesize
400KB
MD57e08dcb51536ce22ec436566211f9f46
SHA12d0fe790129ed5e7cee439fa7f9189419a8a3f4a
SHA2564412f1c469f349f41342cbba728073045b18f8f056528bd3ce78cbc83936c485
SHA512b05ae7565aedb8f3b79f3e594c31dbd014f60198d2012a9c878bb66bab62fddf2a2cd1a627d258aa0c054d84415e5a6c4600a1420e881e043fc95e789a95c32d
-
Filesize
400KB
MD57e08dcb51536ce22ec436566211f9f46
SHA12d0fe790129ed5e7cee439fa7f9189419a8a3f4a
SHA2564412f1c469f349f41342cbba728073045b18f8f056528bd3ce78cbc83936c485
SHA512b05ae7565aedb8f3b79f3e594c31dbd014f60198d2012a9c878bb66bab62fddf2a2cd1a627d258aa0c054d84415e5a6c4600a1420e881e043fc95e789a95c32d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d
-
Filesize
356KB
MD5700c486dca314e0e78390f97fe075e12
SHA1442dc8660016df822922bad2e675817feb3bf07b
SHA256a66bf8694187265ad5159e0beddeb023f9e160e71d1daa7023dc643a320b88a1
SHA512a7c1f513dd2abf312a0e716fd4147e044a60132926897fd126c23449cacc5112ec523611eb837697b1cd5287974aedf3f9852ed8698da484995007c0451e007d