Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 04:57

General

  • Target

    4f3cba69b3d1e7b1752691f9d3e60b8e6a682469118db59d94a4ead27b98f55e.exe

  • Size

    866KB

  • MD5

    11248999fadaf8e95380b9597467cc81

  • SHA1

    ac00a2818c5512c10ba05f560007601a09270506

  • SHA256

    4f3cba69b3d1e7b1752691f9d3e60b8e6a682469118db59d94a4ead27b98f55e

  • SHA512

    f6cdb1c3f03e001fed44ad00f037801a84105eebca95c632bcc3cb7e63af73cb80dd3b9b34a4158d705774d1afa5a7fa533a53eb9e341c739fd19d520b49b34f

  • SSDEEP

    12288:DMrcy90Xj9CS4b8bS6rZbIl0ORsX78W3Ob9nUwk7rsGQ6YYfssQdsss1Xmxm:HyC9C8trSzRsJ3Ob9nUVOXhdsbXp

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f3cba69b3d1e7b1752691f9d3e60b8e6a682469118db59d94a4ead27b98f55e.exe
    "C:\Users\Admin\AppData\Local\Temp\4f3cba69b3d1e7b1752691f9d3e60b8e6a682469118db59d94a4ead27b98f55e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4914331.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4914331.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7146608.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7146608.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7632334.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7632334.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2608
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 268
                7⤵
                • Program crash
                PID:2456
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 276
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2516

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4914331.exe
    Filesize

    764KB

    MD5

    7b1c780f69d389b0c2baef53571edaf6

    SHA1

    fb29d6e37c407dc506938d077d8756be77dc8023

    SHA256

    4f6e4f01f25f59f5a14b51fc015d8604e24af8355875cc8c20843d1f76468808

    SHA512

    5e193a641ae587aa29bef6d967d87c9b5a8be77a58628425ec1b86fdeee6f71e31260166f730b6ad8432b2118592676e2bebbdc2bf3148c86ad32fb016bb5efc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4914331.exe
    Filesize

    764KB

    MD5

    7b1c780f69d389b0c2baef53571edaf6

    SHA1

    fb29d6e37c407dc506938d077d8756be77dc8023

    SHA256

    4f6e4f01f25f59f5a14b51fc015d8604e24af8355875cc8c20843d1f76468808

    SHA512

    5e193a641ae587aa29bef6d967d87c9b5a8be77a58628425ec1b86fdeee6f71e31260166f730b6ad8432b2118592676e2bebbdc2bf3148c86ad32fb016bb5efc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7146608.exe
    Filesize

    581KB

    MD5

    989a2206e28f5feebecc2a57ce54c8b6

    SHA1

    b9c10062da8899a881356b207907373619c25db8

    SHA256

    83a5002a1b255be4d065a2237cf8a43f154a4681bd33a45ebb78c2a62cf0d583

    SHA512

    92605f0d4273126ba2df4c43e5148621e50b40ad53cd36f69e4e12e25684410d9fcc6ee5b0526414b2f040d21fcfac44e86df6cd0a962e69644f4e48d41a379a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7146608.exe
    Filesize

    581KB

    MD5

    989a2206e28f5feebecc2a57ce54c8b6

    SHA1

    b9c10062da8899a881356b207907373619c25db8

    SHA256

    83a5002a1b255be4d065a2237cf8a43f154a4681bd33a45ebb78c2a62cf0d583

    SHA512

    92605f0d4273126ba2df4c43e5148621e50b40ad53cd36f69e4e12e25684410d9fcc6ee5b0526414b2f040d21fcfac44e86df6cd0a962e69644f4e48d41a379a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7632334.exe
    Filesize

    399KB

    MD5

    f3c1faa83dfe7bee08f6c5fb724723df

    SHA1

    2ce7c1a11602cd51e0191b03196de58f03051ab0

    SHA256

    1118feaa5650a7728dd14ac0d9649e990268c84192e0095761a1c43e7f1f85ed

    SHA512

    eb4b1c90a0090da0971f70313e251e021efa0d5d7b87c32adbf06f3197daf77c508823857a8baa855ce4c72c298782975619ba8e4f89b0038715eba0157f1d6d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7632334.exe
    Filesize

    399KB

    MD5

    f3c1faa83dfe7bee08f6c5fb724723df

    SHA1

    2ce7c1a11602cd51e0191b03196de58f03051ab0

    SHA256

    1118feaa5650a7728dd14ac0d9649e990268c84192e0095761a1c43e7f1f85ed

    SHA512

    eb4b1c90a0090da0971f70313e251e021efa0d5d7b87c32adbf06f3197daf77c508823857a8baa855ce4c72c298782975619ba8e4f89b0038715eba0157f1d6d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4914331.exe
    Filesize

    764KB

    MD5

    7b1c780f69d389b0c2baef53571edaf6

    SHA1

    fb29d6e37c407dc506938d077d8756be77dc8023

    SHA256

    4f6e4f01f25f59f5a14b51fc015d8604e24af8355875cc8c20843d1f76468808

    SHA512

    5e193a641ae587aa29bef6d967d87c9b5a8be77a58628425ec1b86fdeee6f71e31260166f730b6ad8432b2118592676e2bebbdc2bf3148c86ad32fb016bb5efc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4914331.exe
    Filesize

    764KB

    MD5

    7b1c780f69d389b0c2baef53571edaf6

    SHA1

    fb29d6e37c407dc506938d077d8756be77dc8023

    SHA256

    4f6e4f01f25f59f5a14b51fc015d8604e24af8355875cc8c20843d1f76468808

    SHA512

    5e193a641ae587aa29bef6d967d87c9b5a8be77a58628425ec1b86fdeee6f71e31260166f730b6ad8432b2118592676e2bebbdc2bf3148c86ad32fb016bb5efc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7146608.exe
    Filesize

    581KB

    MD5

    989a2206e28f5feebecc2a57ce54c8b6

    SHA1

    b9c10062da8899a881356b207907373619c25db8

    SHA256

    83a5002a1b255be4d065a2237cf8a43f154a4681bd33a45ebb78c2a62cf0d583

    SHA512

    92605f0d4273126ba2df4c43e5148621e50b40ad53cd36f69e4e12e25684410d9fcc6ee5b0526414b2f040d21fcfac44e86df6cd0a962e69644f4e48d41a379a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7146608.exe
    Filesize

    581KB

    MD5

    989a2206e28f5feebecc2a57ce54c8b6

    SHA1

    b9c10062da8899a881356b207907373619c25db8

    SHA256

    83a5002a1b255be4d065a2237cf8a43f154a4681bd33a45ebb78c2a62cf0d583

    SHA512

    92605f0d4273126ba2df4c43e5148621e50b40ad53cd36f69e4e12e25684410d9fcc6ee5b0526414b2f040d21fcfac44e86df6cd0a962e69644f4e48d41a379a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7632334.exe
    Filesize

    399KB

    MD5

    f3c1faa83dfe7bee08f6c5fb724723df

    SHA1

    2ce7c1a11602cd51e0191b03196de58f03051ab0

    SHA256

    1118feaa5650a7728dd14ac0d9649e990268c84192e0095761a1c43e7f1f85ed

    SHA512

    eb4b1c90a0090da0971f70313e251e021efa0d5d7b87c32adbf06f3197daf77c508823857a8baa855ce4c72c298782975619ba8e4f89b0038715eba0157f1d6d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z7632334.exe
    Filesize

    399KB

    MD5

    f3c1faa83dfe7bee08f6c5fb724723df

    SHA1

    2ce7c1a11602cd51e0191b03196de58f03051ab0

    SHA256

    1118feaa5650a7728dd14ac0d9649e990268c84192e0095761a1c43e7f1f85ed

    SHA512

    eb4b1c90a0090da0971f70313e251e021efa0d5d7b87c32adbf06f3197daf77c508823857a8baa855ce4c72c298782975619ba8e4f89b0038715eba0157f1d6d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r0556785.exe
    Filesize

    356KB

    MD5

    423c6a32a7c72cc36aaaa82cafbfaf59

    SHA1

    017ecb66b0ee6150121f946d44803f98a55c8609

    SHA256

    ffe2f31a7e807841adf9588c2f09a02c5efcbad3aa54a502ed95cfeda0e69f5e

    SHA512

    e83a0d522d0c076f9b894169a2dcc30c8915f7dfb6412e88c094feb64aa9b79fe10b0754a7bacf421c6305871654729f79ded63b720bf3f133d03ed82c257670

  • memory/2608-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2608-48-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2608-43-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2608-50-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2608-52-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2608-54-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2608-47-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2608-45-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2608-46-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2608-44-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB