Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:16

General

  • Target

    1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe

  • Size

    1.1MB

  • MD5

    c950b18ebc6ae5c21fecb0636a2c8dc9

  • SHA1

    cdda4b3641169d68c3aa43ba69b81c0bf39ddd74

  • SHA256

    1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736

  • SHA512

    1b7a40f3c941f5aad8b23fcc5dd11a839bd7f47218702ff7c7dd5154fbfbf5a2d2430ef22daff3728fca9260ccccbdd3e53e38cd3952fdaf39f8bd14e9b4d16f

  • SSDEEP

    24576:Vy1CjMtIxQaliYA3hyJlsgdt7FA8BtScx:w1qMi2HTim4tS8

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe
    "C:\Users\Admin\AppData\Local\Temp\1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6211296.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6211296.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4170473.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4170473.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9646728.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9646728.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2908
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2680
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 268
                7⤵
                • Program crash
                PID:2580
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6211296.exe

    Filesize

    1.0MB

    MD5

    9385f6f1acb94c2dbb2832a27e0e6d30

    SHA1

    e451fc87bbefb0bef92eecfb71dda4fce00a4b9b

    SHA256

    163d9e5ad1c77fc4271e87da25ff698c099326c1591970d4768d704158af2d73

    SHA512

    73159abc24ea2d51d15d893becd8d3e411359b02f3dd1b87c298a059ef14789c1690b694bde25080b6df1bbf9e3b6b713acbbe3adf81d6a3fad524ec79e01707

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6211296.exe

    Filesize

    1.0MB

    MD5

    9385f6f1acb94c2dbb2832a27e0e6d30

    SHA1

    e451fc87bbefb0bef92eecfb71dda4fce00a4b9b

    SHA256

    163d9e5ad1c77fc4271e87da25ff698c099326c1591970d4768d704158af2d73

    SHA512

    73159abc24ea2d51d15d893becd8d3e411359b02f3dd1b87c298a059ef14789c1690b694bde25080b6df1bbf9e3b6b713acbbe3adf81d6a3fad524ec79e01707

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4170473.exe

    Filesize

    675KB

    MD5

    b82d16df74f98edb4f79c3acc52c8798

    SHA1

    09c3b79bc4029f6d917b6a8a78a9c922135f167a

    SHA256

    6d30857b84efa6270b941e8ffad76dd94511bace9ba0ce1e31c314c5911400d5

    SHA512

    95d58defe224f5cb758944468f6d357f67df2ae72c6b91b83b876c3e39182ce0d7796fb04a00e1d1532496af0678209f361948f61fd6fb4d9356b65fb5cfe479

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4170473.exe

    Filesize

    675KB

    MD5

    b82d16df74f98edb4f79c3acc52c8798

    SHA1

    09c3b79bc4029f6d917b6a8a78a9c922135f167a

    SHA256

    6d30857b84efa6270b941e8ffad76dd94511bace9ba0ce1e31c314c5911400d5

    SHA512

    95d58defe224f5cb758944468f6d357f67df2ae72c6b91b83b876c3e39182ce0d7796fb04a00e1d1532496af0678209f361948f61fd6fb4d9356b65fb5cfe479

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9646728.exe

    Filesize

    509KB

    MD5

    3e0c333ed134ba6892b9979a11bb74fc

    SHA1

    041369264f3ea172d1ef862b6f176c48eac0d9c9

    SHA256

    d46bbc48dc68fda891faf6570a413a1c4dbb12d2b6db4db900d9e56e2dcbd825

    SHA512

    a8ec70a06626df780c0728ce0d7d79eec9873c849b6bfd26363bc1ac708f0e1f8222083545ac55c5cee645f23caa76d3c09f14198aa37f9fe2a4e920f591e3a8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9646728.exe

    Filesize

    509KB

    MD5

    3e0c333ed134ba6892b9979a11bb74fc

    SHA1

    041369264f3ea172d1ef862b6f176c48eac0d9c9

    SHA256

    d46bbc48dc68fda891faf6570a413a1c4dbb12d2b6db4db900d9e56e2dcbd825

    SHA512

    a8ec70a06626df780c0728ce0d7d79eec9873c849b6bfd26363bc1ac708f0e1f8222083545ac55c5cee645f23caa76d3c09f14198aa37f9fe2a4e920f591e3a8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x6211296.exe

    Filesize

    1.0MB

    MD5

    9385f6f1acb94c2dbb2832a27e0e6d30

    SHA1

    e451fc87bbefb0bef92eecfb71dda4fce00a4b9b

    SHA256

    163d9e5ad1c77fc4271e87da25ff698c099326c1591970d4768d704158af2d73

    SHA512

    73159abc24ea2d51d15d893becd8d3e411359b02f3dd1b87c298a059ef14789c1690b694bde25080b6df1bbf9e3b6b713acbbe3adf81d6a3fad524ec79e01707

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x6211296.exe

    Filesize

    1.0MB

    MD5

    9385f6f1acb94c2dbb2832a27e0e6d30

    SHA1

    e451fc87bbefb0bef92eecfb71dda4fce00a4b9b

    SHA256

    163d9e5ad1c77fc4271e87da25ff698c099326c1591970d4768d704158af2d73

    SHA512

    73159abc24ea2d51d15d893becd8d3e411359b02f3dd1b87c298a059ef14789c1690b694bde25080b6df1bbf9e3b6b713acbbe3adf81d6a3fad524ec79e01707

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4170473.exe

    Filesize

    675KB

    MD5

    b82d16df74f98edb4f79c3acc52c8798

    SHA1

    09c3b79bc4029f6d917b6a8a78a9c922135f167a

    SHA256

    6d30857b84efa6270b941e8ffad76dd94511bace9ba0ce1e31c314c5911400d5

    SHA512

    95d58defe224f5cb758944468f6d357f67df2ae72c6b91b83b876c3e39182ce0d7796fb04a00e1d1532496af0678209f361948f61fd6fb4d9356b65fb5cfe479

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4170473.exe

    Filesize

    675KB

    MD5

    b82d16df74f98edb4f79c3acc52c8798

    SHA1

    09c3b79bc4029f6d917b6a8a78a9c922135f167a

    SHA256

    6d30857b84efa6270b941e8ffad76dd94511bace9ba0ce1e31c314c5911400d5

    SHA512

    95d58defe224f5cb758944468f6d357f67df2ae72c6b91b83b876c3e39182ce0d7796fb04a00e1d1532496af0678209f361948f61fd6fb4d9356b65fb5cfe479

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9646728.exe

    Filesize

    509KB

    MD5

    3e0c333ed134ba6892b9979a11bb74fc

    SHA1

    041369264f3ea172d1ef862b6f176c48eac0d9c9

    SHA256

    d46bbc48dc68fda891faf6570a413a1c4dbb12d2b6db4db900d9e56e2dcbd825

    SHA512

    a8ec70a06626df780c0728ce0d7d79eec9873c849b6bfd26363bc1ac708f0e1f8222083545ac55c5cee645f23caa76d3c09f14198aa37f9fe2a4e920f591e3a8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9646728.exe

    Filesize

    509KB

    MD5

    3e0c333ed134ba6892b9979a11bb74fc

    SHA1

    041369264f3ea172d1ef862b6f176c48eac0d9c9

    SHA256

    d46bbc48dc68fda891faf6570a413a1c4dbb12d2b6db4db900d9e56e2dcbd825

    SHA512

    a8ec70a06626df780c0728ce0d7d79eec9873c849b6bfd26363bc1ac708f0e1f8222083545ac55c5cee645f23caa76d3c09f14198aa37f9fe2a4e920f591e3a8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe

    Filesize

    1016KB

    MD5

    d8566b9b323c85d2ebd3245cc6ee060b

    SHA1

    ad3c6a2904a10363578ec3e71111c1989aebf9d3

    SHA256

    cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4

    SHA512

    4fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e

  • memory/2680-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2680-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB