Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 04:58

General

  • Target

    493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe

  • Size

    866KB

  • MD5

    78a2ac81f2d8c4b6144fed2884650b7f

  • SHA1

    508b05f74ac652040aee983eee929f2fc1a6cf2d

  • SHA256

    493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1

  • SHA512

    8649a47953793e42e2e71f5ea5624030833846b308aa91c65ab6b1332f31b216f2ae9053245365464cbe130c9c59c171d2c8aa59209d1c0915adff2e589b75c2

  • SSDEEP

    12288:cMrLy90gaUez5WlGEOEgC+Ncc18EHo4DQgb0RzObDre8VFRMNfvsg2eyYplqKF:HyfaU/rOA+qQb0pMR3kbyCnF

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe
    "C:\Users\Admin\AppData\Local\Temp\493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2416
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2268
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 268
                7⤵
                • Program crash
                PID:2420
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 276
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
    Filesize

    764KB

    MD5

    af7a90d89e6a8403a25ae6c0e2bd4655

    SHA1

    2afb5989688e6dbf7316c7afdec4f71619bf0260

    SHA256

    f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d

    SHA512

    727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
    Filesize

    764KB

    MD5

    af7a90d89e6a8403a25ae6c0e2bd4655

    SHA1

    2afb5989688e6dbf7316c7afdec4f71619bf0260

    SHA256

    f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d

    SHA512

    727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
    Filesize

    581KB

    MD5

    f1ff3c611da99fbff62910a5298bcad2

    SHA1

    d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec

    SHA256

    cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836

    SHA512

    3b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
    Filesize

    581KB

    MD5

    f1ff3c611da99fbff62910a5298bcad2

    SHA1

    d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec

    SHA256

    cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836

    SHA512

    3b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
    Filesize

    399KB

    MD5

    2f1d19f90db1a28d3c016371b2827e80

    SHA1

    978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13

    SHA256

    9bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce

    SHA512

    3b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
    Filesize

    399KB

    MD5

    2f1d19f90db1a28d3c016371b2827e80

    SHA1

    978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13

    SHA256

    9bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce

    SHA512

    3b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
    Filesize

    764KB

    MD5

    af7a90d89e6a8403a25ae6c0e2bd4655

    SHA1

    2afb5989688e6dbf7316c7afdec4f71619bf0260

    SHA256

    f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d

    SHA512

    727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
    Filesize

    764KB

    MD5

    af7a90d89e6a8403a25ae6c0e2bd4655

    SHA1

    2afb5989688e6dbf7316c7afdec4f71619bf0260

    SHA256

    f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d

    SHA512

    727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
    Filesize

    581KB

    MD5

    f1ff3c611da99fbff62910a5298bcad2

    SHA1

    d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec

    SHA256

    cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836

    SHA512

    3b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
    Filesize

    581KB

    MD5

    f1ff3c611da99fbff62910a5298bcad2

    SHA1

    d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec

    SHA256

    cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836

    SHA512

    3b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
    Filesize

    399KB

    MD5

    2f1d19f90db1a28d3c016371b2827e80

    SHA1

    978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13

    SHA256

    9bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce

    SHA512

    3b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
    Filesize

    399KB

    MD5

    2f1d19f90db1a28d3c016371b2827e80

    SHA1

    978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13

    SHA256

    9bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce

    SHA512

    3b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
    Filesize

    356KB

    MD5

    d0632a606309fdafdefb6725df4b365f

    SHA1

    0bb18d5be8302a4841987de5c903556d5bdc73ce

    SHA256

    a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

    SHA512

    8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

  • memory/2268-50-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2268-54-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2268-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2268-48-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2268-47-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2268-46-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2268-45-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2268-44-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2268-43-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2268-52-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB