Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe
Resource
win10v2004-20230915-en
General
-
Target
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe
-
Size
928KB
-
MD5
3b0702d6a6ef1940e5c745a3cd6a9a41
-
SHA1
3b7ecc2c01ead9014d827c368fc197059a0e3200
-
SHA256
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba
-
SHA512
80ae9454fd2bb945daa256dbd29571c528f068a23c9475e3a2ef6c0bcce8522f5caa48bff633905f3cf91bd71c85d7af5449c0a023bb69d7566bb2b88b45f76a
-
SSDEEP
12288:rMrey90rAt8kShe4IudlvYsyoiip6vR/3aaxGk4+/9U4lIxBsx4ShHZ+XV5Eq8qv:JycdVZo5/ddfuBpSHwV5E5emBQX
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2600-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2684 x6526259.exe 2628 x6572699.exe 2700 x6858340.exe 2264 g0448141.exe -
Loads dropped DLL 13 IoCs
pid Process 2176 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 2684 x6526259.exe 2684 x6526259.exe 2628 x6572699.exe 2628 x6572699.exe 2700 x6858340.exe 2700 x6858340.exe 2700 x6858340.exe 2264 g0448141.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6526259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6572699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6858340.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 2600 2264 g0448141.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2612 2264 WerFault.exe 31 2492 2600 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2684 2176 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 28 PID 2176 wrote to memory of 2684 2176 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 28 PID 2176 wrote to memory of 2684 2176 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 28 PID 2176 wrote to memory of 2684 2176 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 28 PID 2176 wrote to memory of 2684 2176 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 28 PID 2176 wrote to memory of 2684 2176 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 28 PID 2176 wrote to memory of 2684 2176 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 28 PID 2684 wrote to memory of 2628 2684 x6526259.exe 29 PID 2684 wrote to memory of 2628 2684 x6526259.exe 29 PID 2684 wrote to memory of 2628 2684 x6526259.exe 29 PID 2684 wrote to memory of 2628 2684 x6526259.exe 29 PID 2684 wrote to memory of 2628 2684 x6526259.exe 29 PID 2684 wrote to memory of 2628 2684 x6526259.exe 29 PID 2684 wrote to memory of 2628 2684 x6526259.exe 29 PID 2628 wrote to memory of 2700 2628 x6572699.exe 30 PID 2628 wrote to memory of 2700 2628 x6572699.exe 30 PID 2628 wrote to memory of 2700 2628 x6572699.exe 30 PID 2628 wrote to memory of 2700 2628 x6572699.exe 30 PID 2628 wrote to memory of 2700 2628 x6572699.exe 30 PID 2628 wrote to memory of 2700 2628 x6572699.exe 30 PID 2628 wrote to memory of 2700 2628 x6572699.exe 30 PID 2700 wrote to memory of 2264 2700 x6858340.exe 31 PID 2700 wrote to memory of 2264 2700 x6858340.exe 31 PID 2700 wrote to memory of 2264 2700 x6858340.exe 31 PID 2700 wrote to memory of 2264 2700 x6858340.exe 31 PID 2700 wrote to memory of 2264 2700 x6858340.exe 31 PID 2700 wrote to memory of 2264 2700 x6858340.exe 31 PID 2700 wrote to memory of 2264 2700 x6858340.exe 31 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2600 2264 g0448141.exe 33 PID 2264 wrote to memory of 2612 2264 g0448141.exe 34 PID 2264 wrote to memory of 2612 2264 g0448141.exe 34 PID 2264 wrote to memory of 2612 2264 g0448141.exe 34 PID 2264 wrote to memory of 2612 2264 g0448141.exe 34 PID 2264 wrote to memory of 2612 2264 g0448141.exe 34 PID 2264 wrote to memory of 2612 2264 g0448141.exe 34 PID 2264 wrote to memory of 2612 2264 g0448141.exe 34 PID 2600 wrote to memory of 2492 2600 AppLaunch.exe 35 PID 2600 wrote to memory of 2492 2600 AppLaunch.exe 35 PID 2600 wrote to memory of 2492 2600 AppLaunch.exe 35 PID 2600 wrote to memory of 2492 2600 AppLaunch.exe 35 PID 2600 wrote to memory of 2492 2600 AppLaunch.exe 35 PID 2600 wrote to memory of 2492 2600 AppLaunch.exe 35 PID 2600 wrote to memory of 2492 2600 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe"C:\Users\Admin\AppData\Local\Temp\6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6526259.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6526259.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6572699.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6572699.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6858340.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6858340.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0448141.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0448141.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 2687⤵
- Program crash
PID:2492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2612
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD56d368034064f4aec421b17f47f6ab9f6
SHA1c5cecdd9aae0ae1ef4150e41f6667a79d31cc98d
SHA256c893a0de68f5da325b89b7fd9217c61cee835fe27b7d9aec72e49c7c2feec88d
SHA5120abf44ae84e4d790996ae0e13197043854bf33e6eb75e566e23784d85ea024bb5c9fe667b5c74ddb804a05bbbb1dc280a9ce89d2b0cda50d6adf0ac27e9b3d8b
-
Filesize
826KB
MD56d368034064f4aec421b17f47f6ab9f6
SHA1c5cecdd9aae0ae1ef4150e41f6667a79d31cc98d
SHA256c893a0de68f5da325b89b7fd9217c61cee835fe27b7d9aec72e49c7c2feec88d
SHA5120abf44ae84e4d790996ae0e13197043854bf33e6eb75e566e23784d85ea024bb5c9fe667b5c74ddb804a05bbbb1dc280a9ce89d2b0cda50d6adf0ac27e9b3d8b
-
Filesize
555KB
MD5332c5201b49536e5009b836de1cf871f
SHA10455d521fd075d1da39bd67694ee544876490053
SHA256b670547008ac27039f970cf706a77a85aa048226e6390f3499b5e4fc847d5c6a
SHA5128811998ed67dfd4000b79901a6d57b82acd1a8116f470b0d259f99ddff5fc6d929e53ba6e01f963ff869074f288a38d9c9193d67a93eebea5f91f31e846630ea
-
Filesize
555KB
MD5332c5201b49536e5009b836de1cf871f
SHA10455d521fd075d1da39bd67694ee544876490053
SHA256b670547008ac27039f970cf706a77a85aa048226e6390f3499b5e4fc847d5c6a
SHA5128811998ed67dfd4000b79901a6d57b82acd1a8116f470b0d259f99ddff5fc6d929e53ba6e01f963ff869074f288a38d9c9193d67a93eebea5f91f31e846630ea
-
Filesize
390KB
MD5559a684b443f9e536c88bff0fee1f391
SHA1032fc9af866425f80d32b8ba866adde044a6c65c
SHA256ccfa9d671b3bd152015ed1809647d31a05c697c10994bcf57387bd02bdfc03ce
SHA5127fd64d632ff1695dc4ae4dba89ce6f87c89381f2efc1ad63a896b4e3cc4a9e77766d0ab10f576cff7e2fe19427d81218911c136f8d037e28de42721d95185d02
-
Filesize
390KB
MD5559a684b443f9e536c88bff0fee1f391
SHA1032fc9af866425f80d32b8ba866adde044a6c65c
SHA256ccfa9d671b3bd152015ed1809647d31a05c697c10994bcf57387bd02bdfc03ce
SHA5127fd64d632ff1695dc4ae4dba89ce6f87c89381f2efc1ad63a896b4e3cc4a9e77766d0ab10f576cff7e2fe19427d81218911c136f8d037e28de42721d95185d02
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
826KB
MD56d368034064f4aec421b17f47f6ab9f6
SHA1c5cecdd9aae0ae1ef4150e41f6667a79d31cc98d
SHA256c893a0de68f5da325b89b7fd9217c61cee835fe27b7d9aec72e49c7c2feec88d
SHA5120abf44ae84e4d790996ae0e13197043854bf33e6eb75e566e23784d85ea024bb5c9fe667b5c74ddb804a05bbbb1dc280a9ce89d2b0cda50d6adf0ac27e9b3d8b
-
Filesize
826KB
MD56d368034064f4aec421b17f47f6ab9f6
SHA1c5cecdd9aae0ae1ef4150e41f6667a79d31cc98d
SHA256c893a0de68f5da325b89b7fd9217c61cee835fe27b7d9aec72e49c7c2feec88d
SHA5120abf44ae84e4d790996ae0e13197043854bf33e6eb75e566e23784d85ea024bb5c9fe667b5c74ddb804a05bbbb1dc280a9ce89d2b0cda50d6adf0ac27e9b3d8b
-
Filesize
555KB
MD5332c5201b49536e5009b836de1cf871f
SHA10455d521fd075d1da39bd67694ee544876490053
SHA256b670547008ac27039f970cf706a77a85aa048226e6390f3499b5e4fc847d5c6a
SHA5128811998ed67dfd4000b79901a6d57b82acd1a8116f470b0d259f99ddff5fc6d929e53ba6e01f963ff869074f288a38d9c9193d67a93eebea5f91f31e846630ea
-
Filesize
555KB
MD5332c5201b49536e5009b836de1cf871f
SHA10455d521fd075d1da39bd67694ee544876490053
SHA256b670547008ac27039f970cf706a77a85aa048226e6390f3499b5e4fc847d5c6a
SHA5128811998ed67dfd4000b79901a6d57b82acd1a8116f470b0d259f99ddff5fc6d929e53ba6e01f963ff869074f288a38d9c9193d67a93eebea5f91f31e846630ea
-
Filesize
390KB
MD5559a684b443f9e536c88bff0fee1f391
SHA1032fc9af866425f80d32b8ba866adde044a6c65c
SHA256ccfa9d671b3bd152015ed1809647d31a05c697c10994bcf57387bd02bdfc03ce
SHA5127fd64d632ff1695dc4ae4dba89ce6f87c89381f2efc1ad63a896b4e3cc4a9e77766d0ab10f576cff7e2fe19427d81218911c136f8d037e28de42721d95185d02
-
Filesize
390KB
MD5559a684b443f9e536c88bff0fee1f391
SHA1032fc9af866425f80d32b8ba866adde044a6c65c
SHA256ccfa9d671b3bd152015ed1809647d31a05c697c10994bcf57387bd02bdfc03ce
SHA5127fd64d632ff1695dc4ae4dba89ce6f87c89381f2efc1ad63a896b4e3cc4a9e77766d0ab10f576cff7e2fe19427d81218911c136f8d037e28de42721d95185d02
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4