Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 07:16
Static task
static1
Behavioral task
behavioral1
Sample
1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe
Resource
win10v2004-20230915-en
General
-
Target
1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe
-
Size
1.1MB
-
MD5
c950b18ebc6ae5c21fecb0636a2c8dc9
-
SHA1
cdda4b3641169d68c3aa43ba69b81c0bf39ddd74
-
SHA256
1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736
-
SHA512
1b7a40f3c941f5aad8b23fcc5dd11a839bd7f47218702ff7c7dd5154fbfbf5a2d2430ef22daff3728fca9260ccccbdd3e53e38cd3952fdaf39f8bd14e9b4d16f
-
SSDEEP
24576:Vy1CjMtIxQaliYA3hyJlsgdt7FA8BtScx:w1qMi2HTim4tS8
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2680-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2312 x6211296.exe 2612 x4170473.exe 2920 x9646728.exe 2908 g5303443.exe -
Loads dropped DLL 13 IoCs
pid Process 1068 1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe 2312 x6211296.exe 2312 x6211296.exe 2612 x4170473.exe 2612 x4170473.exe 2920 x9646728.exe 2920 x9646728.exe 2920 x9646728.exe 2908 g5303443.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6211296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4170473.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9646728.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2908 set thread context of 2680 2908 g5303443.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2552 2908 WerFault.exe 31 2580 2680 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1068 wrote to memory of 2312 1068 1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe 28 PID 1068 wrote to memory of 2312 1068 1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe 28 PID 1068 wrote to memory of 2312 1068 1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe 28 PID 1068 wrote to memory of 2312 1068 1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe 28 PID 1068 wrote to memory of 2312 1068 1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe 28 PID 1068 wrote to memory of 2312 1068 1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe 28 PID 1068 wrote to memory of 2312 1068 1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe 28 PID 2312 wrote to memory of 2612 2312 x6211296.exe 29 PID 2312 wrote to memory of 2612 2312 x6211296.exe 29 PID 2312 wrote to memory of 2612 2312 x6211296.exe 29 PID 2312 wrote to memory of 2612 2312 x6211296.exe 29 PID 2312 wrote to memory of 2612 2312 x6211296.exe 29 PID 2312 wrote to memory of 2612 2312 x6211296.exe 29 PID 2312 wrote to memory of 2612 2312 x6211296.exe 29 PID 2612 wrote to memory of 2920 2612 x4170473.exe 30 PID 2612 wrote to memory of 2920 2612 x4170473.exe 30 PID 2612 wrote to memory of 2920 2612 x4170473.exe 30 PID 2612 wrote to memory of 2920 2612 x4170473.exe 30 PID 2612 wrote to memory of 2920 2612 x4170473.exe 30 PID 2612 wrote to memory of 2920 2612 x4170473.exe 30 PID 2612 wrote to memory of 2920 2612 x4170473.exe 30 PID 2920 wrote to memory of 2908 2920 x9646728.exe 31 PID 2920 wrote to memory of 2908 2920 x9646728.exe 31 PID 2920 wrote to memory of 2908 2920 x9646728.exe 31 PID 2920 wrote to memory of 2908 2920 x9646728.exe 31 PID 2920 wrote to memory of 2908 2920 x9646728.exe 31 PID 2920 wrote to memory of 2908 2920 x9646728.exe 31 PID 2920 wrote to memory of 2908 2920 x9646728.exe 31 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2680 2908 g5303443.exe 33 PID 2908 wrote to memory of 2552 2908 g5303443.exe 35 PID 2908 wrote to memory of 2552 2908 g5303443.exe 35 PID 2908 wrote to memory of 2552 2908 g5303443.exe 35 PID 2908 wrote to memory of 2552 2908 g5303443.exe 35 PID 2908 wrote to memory of 2552 2908 g5303443.exe 35 PID 2908 wrote to memory of 2552 2908 g5303443.exe 35 PID 2908 wrote to memory of 2552 2908 g5303443.exe 35 PID 2680 wrote to memory of 2580 2680 AppLaunch.exe 36 PID 2680 wrote to memory of 2580 2680 AppLaunch.exe 36 PID 2680 wrote to memory of 2580 2680 AppLaunch.exe 36 PID 2680 wrote to memory of 2580 2680 AppLaunch.exe 36 PID 2680 wrote to memory of 2580 2680 AppLaunch.exe 36 PID 2680 wrote to memory of 2580 2680 AppLaunch.exe 36 PID 2680 wrote to memory of 2580 2680 AppLaunch.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe"C:\Users\Admin\AppData\Local\Temp\1787a1fa6e7758008391e962b6911100817801e799b4752c50879de555b5e736.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6211296.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6211296.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4170473.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4170473.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9646728.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9646728.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5303443.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2687⤵
- Program crash
PID:2580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2552
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD59385f6f1acb94c2dbb2832a27e0e6d30
SHA1e451fc87bbefb0bef92eecfb71dda4fce00a4b9b
SHA256163d9e5ad1c77fc4271e87da25ff698c099326c1591970d4768d704158af2d73
SHA51273159abc24ea2d51d15d893becd8d3e411359b02f3dd1b87c298a059ef14789c1690b694bde25080b6df1bbf9e3b6b713acbbe3adf81d6a3fad524ec79e01707
-
Filesize
1.0MB
MD59385f6f1acb94c2dbb2832a27e0e6d30
SHA1e451fc87bbefb0bef92eecfb71dda4fce00a4b9b
SHA256163d9e5ad1c77fc4271e87da25ff698c099326c1591970d4768d704158af2d73
SHA51273159abc24ea2d51d15d893becd8d3e411359b02f3dd1b87c298a059ef14789c1690b694bde25080b6df1bbf9e3b6b713acbbe3adf81d6a3fad524ec79e01707
-
Filesize
675KB
MD5b82d16df74f98edb4f79c3acc52c8798
SHA109c3b79bc4029f6d917b6a8a78a9c922135f167a
SHA2566d30857b84efa6270b941e8ffad76dd94511bace9ba0ce1e31c314c5911400d5
SHA51295d58defe224f5cb758944468f6d357f67df2ae72c6b91b83b876c3e39182ce0d7796fb04a00e1d1532496af0678209f361948f61fd6fb4d9356b65fb5cfe479
-
Filesize
675KB
MD5b82d16df74f98edb4f79c3acc52c8798
SHA109c3b79bc4029f6d917b6a8a78a9c922135f167a
SHA2566d30857b84efa6270b941e8ffad76dd94511bace9ba0ce1e31c314c5911400d5
SHA51295d58defe224f5cb758944468f6d357f67df2ae72c6b91b83b876c3e39182ce0d7796fb04a00e1d1532496af0678209f361948f61fd6fb4d9356b65fb5cfe479
-
Filesize
509KB
MD53e0c333ed134ba6892b9979a11bb74fc
SHA1041369264f3ea172d1ef862b6f176c48eac0d9c9
SHA256d46bbc48dc68fda891faf6570a413a1c4dbb12d2b6db4db900d9e56e2dcbd825
SHA512a8ec70a06626df780c0728ce0d7d79eec9873c849b6bfd26363bc1ac708f0e1f8222083545ac55c5cee645f23caa76d3c09f14198aa37f9fe2a4e920f591e3a8
-
Filesize
509KB
MD53e0c333ed134ba6892b9979a11bb74fc
SHA1041369264f3ea172d1ef862b6f176c48eac0d9c9
SHA256d46bbc48dc68fda891faf6570a413a1c4dbb12d2b6db4db900d9e56e2dcbd825
SHA512a8ec70a06626df780c0728ce0d7d79eec9873c849b6bfd26363bc1ac708f0e1f8222083545ac55c5cee645f23caa76d3c09f14198aa37f9fe2a4e920f591e3a8
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e
-
Filesize
1.0MB
MD59385f6f1acb94c2dbb2832a27e0e6d30
SHA1e451fc87bbefb0bef92eecfb71dda4fce00a4b9b
SHA256163d9e5ad1c77fc4271e87da25ff698c099326c1591970d4768d704158af2d73
SHA51273159abc24ea2d51d15d893becd8d3e411359b02f3dd1b87c298a059ef14789c1690b694bde25080b6df1bbf9e3b6b713acbbe3adf81d6a3fad524ec79e01707
-
Filesize
1.0MB
MD59385f6f1acb94c2dbb2832a27e0e6d30
SHA1e451fc87bbefb0bef92eecfb71dda4fce00a4b9b
SHA256163d9e5ad1c77fc4271e87da25ff698c099326c1591970d4768d704158af2d73
SHA51273159abc24ea2d51d15d893becd8d3e411359b02f3dd1b87c298a059ef14789c1690b694bde25080b6df1bbf9e3b6b713acbbe3adf81d6a3fad524ec79e01707
-
Filesize
675KB
MD5b82d16df74f98edb4f79c3acc52c8798
SHA109c3b79bc4029f6d917b6a8a78a9c922135f167a
SHA2566d30857b84efa6270b941e8ffad76dd94511bace9ba0ce1e31c314c5911400d5
SHA51295d58defe224f5cb758944468f6d357f67df2ae72c6b91b83b876c3e39182ce0d7796fb04a00e1d1532496af0678209f361948f61fd6fb4d9356b65fb5cfe479
-
Filesize
675KB
MD5b82d16df74f98edb4f79c3acc52c8798
SHA109c3b79bc4029f6d917b6a8a78a9c922135f167a
SHA2566d30857b84efa6270b941e8ffad76dd94511bace9ba0ce1e31c314c5911400d5
SHA51295d58defe224f5cb758944468f6d357f67df2ae72c6b91b83b876c3e39182ce0d7796fb04a00e1d1532496af0678209f361948f61fd6fb4d9356b65fb5cfe479
-
Filesize
509KB
MD53e0c333ed134ba6892b9979a11bb74fc
SHA1041369264f3ea172d1ef862b6f176c48eac0d9c9
SHA256d46bbc48dc68fda891faf6570a413a1c4dbb12d2b6db4db900d9e56e2dcbd825
SHA512a8ec70a06626df780c0728ce0d7d79eec9873c849b6bfd26363bc1ac708f0e1f8222083545ac55c5cee645f23caa76d3c09f14198aa37f9fe2a4e920f591e3a8
-
Filesize
509KB
MD53e0c333ed134ba6892b9979a11bb74fc
SHA1041369264f3ea172d1ef862b6f176c48eac0d9c9
SHA256d46bbc48dc68fda891faf6570a413a1c4dbb12d2b6db4db900d9e56e2dcbd825
SHA512a8ec70a06626df780c0728ce0d7d79eec9873c849b6bfd26363bc1ac708f0e1f8222083545ac55c5cee645f23caa76d3c09f14198aa37f9fe2a4e920f591e3a8
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e
-
Filesize
1016KB
MD5d8566b9b323c85d2ebd3245cc6ee060b
SHA1ad3c6a2904a10363578ec3e71111c1989aebf9d3
SHA256cca845f3b1196393f92375454d622f4e0d6c8737e7acf37f534bd90b25eba1b4
SHA5124fcb8fc53e3d275da6d46a1520a12369413e61221f0e5a0f66e0dfb783be9f26acb4fc3abbfe75bff0a4de96b9916e608b4dcaf0c14d1f192618e720c9b5b04e