Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe
Resource
win10v2004-20230915-en
General
-
Target
6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe
-
Size
928KB
-
MD5
dcfcad691a152d5e647216c62be2f5f8
-
SHA1
8d0c7f4b05b104382b360cf7380528cb6491b9cb
-
SHA256
6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192
-
SHA512
11b64cfbe54783f202e61ff60aa5b372d8c2c78d1b9acb698037843e87eef3d05e17a9d3efe030b140b3d17ffec3b5df8791013c9e68607272932d4d62d18705
-
SSDEEP
24576:myR1EjH6b0vxRY4w0bOo9Ese6JlnWks6EU:1zMawpunwOove6JlnWks
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2960-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2960-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2960-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2960-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2960-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2960-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 240 x3272903.exe 3036 x2885063.exe 2632 x7752782.exe 2976 g5950784.exe -
Loads dropped DLL 13 IoCs
pid Process 1564 6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe 240 x3272903.exe 240 x3272903.exe 3036 x2885063.exe 3036 x2885063.exe 2632 x7752782.exe 2632 x7752782.exe 2632 x7752782.exe 2976 g5950784.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3272903.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2885063.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7752782.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2976 set thread context of 2960 2976 g5950784.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2864 2976 WerFault.exe 31 1740 2960 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1564 wrote to memory of 240 1564 6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe 28 PID 1564 wrote to memory of 240 1564 6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe 28 PID 1564 wrote to memory of 240 1564 6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe 28 PID 1564 wrote to memory of 240 1564 6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe 28 PID 1564 wrote to memory of 240 1564 6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe 28 PID 1564 wrote to memory of 240 1564 6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe 28 PID 1564 wrote to memory of 240 1564 6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe 28 PID 240 wrote to memory of 3036 240 x3272903.exe 29 PID 240 wrote to memory of 3036 240 x3272903.exe 29 PID 240 wrote to memory of 3036 240 x3272903.exe 29 PID 240 wrote to memory of 3036 240 x3272903.exe 29 PID 240 wrote to memory of 3036 240 x3272903.exe 29 PID 240 wrote to memory of 3036 240 x3272903.exe 29 PID 240 wrote to memory of 3036 240 x3272903.exe 29 PID 3036 wrote to memory of 2632 3036 x2885063.exe 30 PID 3036 wrote to memory of 2632 3036 x2885063.exe 30 PID 3036 wrote to memory of 2632 3036 x2885063.exe 30 PID 3036 wrote to memory of 2632 3036 x2885063.exe 30 PID 3036 wrote to memory of 2632 3036 x2885063.exe 30 PID 3036 wrote to memory of 2632 3036 x2885063.exe 30 PID 3036 wrote to memory of 2632 3036 x2885063.exe 30 PID 2632 wrote to memory of 2976 2632 x7752782.exe 31 PID 2632 wrote to memory of 2976 2632 x7752782.exe 31 PID 2632 wrote to memory of 2976 2632 x7752782.exe 31 PID 2632 wrote to memory of 2976 2632 x7752782.exe 31 PID 2632 wrote to memory of 2976 2632 x7752782.exe 31 PID 2632 wrote to memory of 2976 2632 x7752782.exe 31 PID 2632 wrote to memory of 2976 2632 x7752782.exe 31 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2960 2976 g5950784.exe 33 PID 2976 wrote to memory of 2864 2976 g5950784.exe 34 PID 2976 wrote to memory of 2864 2976 g5950784.exe 34 PID 2976 wrote to memory of 2864 2976 g5950784.exe 34 PID 2976 wrote to memory of 2864 2976 g5950784.exe 34 PID 2976 wrote to memory of 2864 2976 g5950784.exe 34 PID 2976 wrote to memory of 2864 2976 g5950784.exe 34 PID 2976 wrote to memory of 2864 2976 g5950784.exe 34 PID 2960 wrote to memory of 1740 2960 AppLaunch.exe 35 PID 2960 wrote to memory of 1740 2960 AppLaunch.exe 35 PID 2960 wrote to memory of 1740 2960 AppLaunch.exe 35 PID 2960 wrote to memory of 1740 2960 AppLaunch.exe 35 PID 2960 wrote to memory of 1740 2960 AppLaunch.exe 35 PID 2960 wrote to memory of 1740 2960 AppLaunch.exe 35 PID 2960 wrote to memory of 1740 2960 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe"C:\Users\Admin\AppData\Local\Temp\6ef19bda70bacdba164ed285f321520d9d0db63dafbd6669d6f66eed1b723192.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3272903.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3272903.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2885063.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2885063.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7752782.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7752782.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950784.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5950784.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 2687⤵
- Program crash
PID:1740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2864
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD50ade78b147982d5fa1243787603b1990
SHA164768993f9fe16923621608854d4a8f4bbd2e7df
SHA2560237686b5f4d0c96bc1a0f4b11c4ef241cd606b6b9f916e81399d6ce9b13320e
SHA5121f0ba3e20b17979f611466eb78b70b67f26eee7cd22306ae4b35609ec91b5548771ee827ebc70a1eda99412a92c9836d9bf861761f101562b3f9dccc83dc235f
-
Filesize
826KB
MD50ade78b147982d5fa1243787603b1990
SHA164768993f9fe16923621608854d4a8f4bbd2e7df
SHA2560237686b5f4d0c96bc1a0f4b11c4ef241cd606b6b9f916e81399d6ce9b13320e
SHA5121f0ba3e20b17979f611466eb78b70b67f26eee7cd22306ae4b35609ec91b5548771ee827ebc70a1eda99412a92c9836d9bf861761f101562b3f9dccc83dc235f
-
Filesize
555KB
MD5c0d9832ebd91609ee3816eaa85c19080
SHA1132105de23e524a55268250a5627c978edfec85f
SHA25621cb45d3271200c1ed102bbcc17771a9afe9bb4279f8e27d7da8564be2fa7754
SHA51206eca355d02a9b681f98668e39d5f52d999ec6b45c302fd3d896bdc680486a4d22192816abd88f7486ec3b058da246cfb12d429338930259b623f524483aa712
-
Filesize
555KB
MD5c0d9832ebd91609ee3816eaa85c19080
SHA1132105de23e524a55268250a5627c978edfec85f
SHA25621cb45d3271200c1ed102bbcc17771a9afe9bb4279f8e27d7da8564be2fa7754
SHA51206eca355d02a9b681f98668e39d5f52d999ec6b45c302fd3d896bdc680486a4d22192816abd88f7486ec3b058da246cfb12d429338930259b623f524483aa712
-
Filesize
389KB
MD533265241bf38320d39a74fed2babdaf3
SHA15ce57dd0333f7b060247ac68e24ef6a2a2d7b6d5
SHA2565a4d7bc05f6a7669ebc5ec0099b1007c389ca7669aef1e313e8a5da1fece90c0
SHA5122e3674e516229630cc60b60939f319c2689c379bfbf75b8218bc57f6aba4ffff8c38fbea3f16cae8645158b15fb551bd1a56667835ad5befb3a0ddd21512b4da
-
Filesize
389KB
MD533265241bf38320d39a74fed2babdaf3
SHA15ce57dd0333f7b060247ac68e24ef6a2a2d7b6d5
SHA2565a4d7bc05f6a7669ebc5ec0099b1007c389ca7669aef1e313e8a5da1fece90c0
SHA5122e3674e516229630cc60b60939f319c2689c379bfbf75b8218bc57f6aba4ffff8c38fbea3f16cae8645158b15fb551bd1a56667835ad5befb3a0ddd21512b4da
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b
-
Filesize
826KB
MD50ade78b147982d5fa1243787603b1990
SHA164768993f9fe16923621608854d4a8f4bbd2e7df
SHA2560237686b5f4d0c96bc1a0f4b11c4ef241cd606b6b9f916e81399d6ce9b13320e
SHA5121f0ba3e20b17979f611466eb78b70b67f26eee7cd22306ae4b35609ec91b5548771ee827ebc70a1eda99412a92c9836d9bf861761f101562b3f9dccc83dc235f
-
Filesize
826KB
MD50ade78b147982d5fa1243787603b1990
SHA164768993f9fe16923621608854d4a8f4bbd2e7df
SHA2560237686b5f4d0c96bc1a0f4b11c4ef241cd606b6b9f916e81399d6ce9b13320e
SHA5121f0ba3e20b17979f611466eb78b70b67f26eee7cd22306ae4b35609ec91b5548771ee827ebc70a1eda99412a92c9836d9bf861761f101562b3f9dccc83dc235f
-
Filesize
555KB
MD5c0d9832ebd91609ee3816eaa85c19080
SHA1132105de23e524a55268250a5627c978edfec85f
SHA25621cb45d3271200c1ed102bbcc17771a9afe9bb4279f8e27d7da8564be2fa7754
SHA51206eca355d02a9b681f98668e39d5f52d999ec6b45c302fd3d896bdc680486a4d22192816abd88f7486ec3b058da246cfb12d429338930259b623f524483aa712
-
Filesize
555KB
MD5c0d9832ebd91609ee3816eaa85c19080
SHA1132105de23e524a55268250a5627c978edfec85f
SHA25621cb45d3271200c1ed102bbcc17771a9afe9bb4279f8e27d7da8564be2fa7754
SHA51206eca355d02a9b681f98668e39d5f52d999ec6b45c302fd3d896bdc680486a4d22192816abd88f7486ec3b058da246cfb12d429338930259b623f524483aa712
-
Filesize
389KB
MD533265241bf38320d39a74fed2babdaf3
SHA15ce57dd0333f7b060247ac68e24ef6a2a2d7b6d5
SHA2565a4d7bc05f6a7669ebc5ec0099b1007c389ca7669aef1e313e8a5da1fece90c0
SHA5122e3674e516229630cc60b60939f319c2689c379bfbf75b8218bc57f6aba4ffff8c38fbea3f16cae8645158b15fb551bd1a56667835ad5befb3a0ddd21512b4da
-
Filesize
389KB
MD533265241bf38320d39a74fed2babdaf3
SHA15ce57dd0333f7b060247ac68e24ef6a2a2d7b6d5
SHA2565a4d7bc05f6a7669ebc5ec0099b1007c389ca7669aef1e313e8a5da1fece90c0
SHA5122e3674e516229630cc60b60939f319c2689c379bfbf75b8218bc57f6aba4ffff8c38fbea3f16cae8645158b15fb551bd1a56667835ad5befb3a0ddd21512b4da
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b
-
Filesize
356KB
MD561516fb54b2c040496fee49857258d2f
SHA14ed4716ac34d99729fde6da11fe40292d791c170
SHA2566e58f4748798659a09c7ad4c67e429cbbbf8b7b356f0a1a326c86c635e4394a2
SHA51201c38c659ed3c8bbdaebe6aa9c308417402f4d801348dbe27d95813398d1e2ecde05e8b8a478ccdb14cfacdeda41827afd83f3c2345531cf5a023488ac15ce3b