Analysis
-
max time kernel
118s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe
Resource
win10v2004-20230915-en
General
-
Target
3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe
-
Size
1.1MB
-
MD5
f8b72f71b78b3be1cb9611b57c571cc9
-
SHA1
4182b9b97934a425d04386ad7191af8631052b89
-
SHA256
3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae
-
SHA512
d153621db692f983c24054d443984afa2952779311236238c829fe020e3271dcde2e317c760f40c28529c4cfa9a09ce4591a7fbc003ac0f58a88fb61801e24d0
-
SSDEEP
24576:kybu4il+lbGbsAj4g6Guk4DrpMc/A0Quxzum9EkJLcdy:zb0+VGIAj45vDqcIxuBlL
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2660-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2660-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2660-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2660-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2660-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2660-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2328 x4149482.exe 2720 x3820111.exe 2760 x9987361.exe 2652 g8886487.exe -
Loads dropped DLL 13 IoCs
pid Process 1648 3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe 2328 x4149482.exe 2328 x4149482.exe 2720 x3820111.exe 2720 x3820111.exe 2760 x9987361.exe 2760 x9987361.exe 2760 x9987361.exe 2652 g8886487.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9987361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4149482.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3820111.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2652 set thread context of 2660 2652 g8886487.exe 34 -
Program crash 2 IoCs
pid pid_target Process procid_target 2508 2652 WerFault.exe 32 2564 2660 WerFault.exe 34 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2328 1648 3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe 29 PID 1648 wrote to memory of 2328 1648 3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe 29 PID 1648 wrote to memory of 2328 1648 3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe 29 PID 1648 wrote to memory of 2328 1648 3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe 29 PID 1648 wrote to memory of 2328 1648 3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe 29 PID 1648 wrote to memory of 2328 1648 3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe 29 PID 1648 wrote to memory of 2328 1648 3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe 29 PID 2328 wrote to memory of 2720 2328 x4149482.exe 30 PID 2328 wrote to memory of 2720 2328 x4149482.exe 30 PID 2328 wrote to memory of 2720 2328 x4149482.exe 30 PID 2328 wrote to memory of 2720 2328 x4149482.exe 30 PID 2328 wrote to memory of 2720 2328 x4149482.exe 30 PID 2328 wrote to memory of 2720 2328 x4149482.exe 30 PID 2328 wrote to memory of 2720 2328 x4149482.exe 30 PID 2720 wrote to memory of 2760 2720 x3820111.exe 31 PID 2720 wrote to memory of 2760 2720 x3820111.exe 31 PID 2720 wrote to memory of 2760 2720 x3820111.exe 31 PID 2720 wrote to memory of 2760 2720 x3820111.exe 31 PID 2720 wrote to memory of 2760 2720 x3820111.exe 31 PID 2720 wrote to memory of 2760 2720 x3820111.exe 31 PID 2720 wrote to memory of 2760 2720 x3820111.exe 31 PID 2760 wrote to memory of 2652 2760 x9987361.exe 32 PID 2760 wrote to memory of 2652 2760 x9987361.exe 32 PID 2760 wrote to memory of 2652 2760 x9987361.exe 32 PID 2760 wrote to memory of 2652 2760 x9987361.exe 32 PID 2760 wrote to memory of 2652 2760 x9987361.exe 32 PID 2760 wrote to memory of 2652 2760 x9987361.exe 32 PID 2760 wrote to memory of 2652 2760 x9987361.exe 32 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2660 2652 g8886487.exe 34 PID 2652 wrote to memory of 2508 2652 g8886487.exe 35 PID 2652 wrote to memory of 2508 2652 g8886487.exe 35 PID 2652 wrote to memory of 2508 2652 g8886487.exe 35 PID 2652 wrote to memory of 2508 2652 g8886487.exe 35 PID 2652 wrote to memory of 2508 2652 g8886487.exe 35 PID 2652 wrote to memory of 2508 2652 g8886487.exe 35 PID 2652 wrote to memory of 2508 2652 g8886487.exe 35 PID 2660 wrote to memory of 2564 2660 AppLaunch.exe 36 PID 2660 wrote to memory of 2564 2660 AppLaunch.exe 36 PID 2660 wrote to memory of 2564 2660 AppLaunch.exe 36 PID 2660 wrote to memory of 2564 2660 AppLaunch.exe 36 PID 2660 wrote to memory of 2564 2660 AppLaunch.exe 36 PID 2660 wrote to memory of 2564 2660 AppLaunch.exe 36 PID 2660 wrote to memory of 2564 2660 AppLaunch.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe"C:\Users\Admin\AppData\Local\Temp\3c335667e5e9253b75b25917c01fba299331883503ec6c91e23416e6f63ec8ae.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4149482.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4149482.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3820111.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3820111.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9987361.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9987361.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8886487.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8886487.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 2687⤵
- Program crash
PID:2564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2508
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5bedede96a6435f15aa351e33d98a2398
SHA150f8614b41095b4d9de2c191654b4f7fe09f65e5
SHA256bfd7ec34f4a494bfbde4ab611c763f8b8bee90b79317ccd7dd2d86dde1ad15af
SHA512b4c3882a4ff1bb7c0913197d5bce47070555b3b8e66b80cb439defd6aa116522ef6339718f66b5086d5369ff819bc57817f44593ebdb53a6afc77b80fc30e4ec
-
Filesize
1.0MB
MD5bedede96a6435f15aa351e33d98a2398
SHA150f8614b41095b4d9de2c191654b4f7fe09f65e5
SHA256bfd7ec34f4a494bfbde4ab611c763f8b8bee90b79317ccd7dd2d86dde1ad15af
SHA512b4c3882a4ff1bb7c0913197d5bce47070555b3b8e66b80cb439defd6aa116522ef6339718f66b5086d5369ff819bc57817f44593ebdb53a6afc77b80fc30e4ec
-
Filesize
674KB
MD58a5644d71304ac6c79c173b8331434da
SHA1742f22e85665522e9eb0e2226351dc68510a0f92
SHA256663b51632a71f556a5406f021f43ab875edd31c35c1bc08329374146f14c8934
SHA51244b24ac7856552e4aed8f4113f5e7ab3bb1a29dc0c5861a8046a97b3a752eb4f8d284eb75b012a88207bf56a810531c349e9bc83b64399c99cacc9597c8912e0
-
Filesize
674KB
MD58a5644d71304ac6c79c173b8331434da
SHA1742f22e85665522e9eb0e2226351dc68510a0f92
SHA256663b51632a71f556a5406f021f43ab875edd31c35c1bc08329374146f14c8934
SHA51244b24ac7856552e4aed8f4113f5e7ab3bb1a29dc0c5861a8046a97b3a752eb4f8d284eb75b012a88207bf56a810531c349e9bc83b64399c99cacc9597c8912e0
-
Filesize
509KB
MD5cfc689b789fa70de543538dc7a104761
SHA17b89142443244b17c45f9705f38e7b287b4ccc98
SHA25624c4de5087ebc369bcdb674083ce3914bba94f83d0bb361883a1f34486cdbff4
SHA512b71fb3a3f0315ce419bdccae2c9923b065ee539418a06ba10f4bc762a73c55c71fcbc94ddede27e0d744fdf09f43ca4c5b60edce7f0e9fd177ce133c5766cd3f
-
Filesize
509KB
MD5cfc689b789fa70de543538dc7a104761
SHA17b89142443244b17c45f9705f38e7b287b4ccc98
SHA25624c4de5087ebc369bcdb674083ce3914bba94f83d0bb361883a1f34486cdbff4
SHA512b71fb3a3f0315ce419bdccae2c9923b065ee539418a06ba10f4bc762a73c55c71fcbc94ddede27e0d744fdf09f43ca4c5b60edce7f0e9fd177ce133c5766cd3f
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1.0MB
MD5bedede96a6435f15aa351e33d98a2398
SHA150f8614b41095b4d9de2c191654b4f7fe09f65e5
SHA256bfd7ec34f4a494bfbde4ab611c763f8b8bee90b79317ccd7dd2d86dde1ad15af
SHA512b4c3882a4ff1bb7c0913197d5bce47070555b3b8e66b80cb439defd6aa116522ef6339718f66b5086d5369ff819bc57817f44593ebdb53a6afc77b80fc30e4ec
-
Filesize
1.0MB
MD5bedede96a6435f15aa351e33d98a2398
SHA150f8614b41095b4d9de2c191654b4f7fe09f65e5
SHA256bfd7ec34f4a494bfbde4ab611c763f8b8bee90b79317ccd7dd2d86dde1ad15af
SHA512b4c3882a4ff1bb7c0913197d5bce47070555b3b8e66b80cb439defd6aa116522ef6339718f66b5086d5369ff819bc57817f44593ebdb53a6afc77b80fc30e4ec
-
Filesize
674KB
MD58a5644d71304ac6c79c173b8331434da
SHA1742f22e85665522e9eb0e2226351dc68510a0f92
SHA256663b51632a71f556a5406f021f43ab875edd31c35c1bc08329374146f14c8934
SHA51244b24ac7856552e4aed8f4113f5e7ab3bb1a29dc0c5861a8046a97b3a752eb4f8d284eb75b012a88207bf56a810531c349e9bc83b64399c99cacc9597c8912e0
-
Filesize
674KB
MD58a5644d71304ac6c79c173b8331434da
SHA1742f22e85665522e9eb0e2226351dc68510a0f92
SHA256663b51632a71f556a5406f021f43ab875edd31c35c1bc08329374146f14c8934
SHA51244b24ac7856552e4aed8f4113f5e7ab3bb1a29dc0c5861a8046a97b3a752eb4f8d284eb75b012a88207bf56a810531c349e9bc83b64399c99cacc9597c8912e0
-
Filesize
509KB
MD5cfc689b789fa70de543538dc7a104761
SHA17b89142443244b17c45f9705f38e7b287b4ccc98
SHA25624c4de5087ebc369bcdb674083ce3914bba94f83d0bb361883a1f34486cdbff4
SHA512b71fb3a3f0315ce419bdccae2c9923b065ee539418a06ba10f4bc762a73c55c71fcbc94ddede27e0d744fdf09f43ca4c5b60edce7f0e9fd177ce133c5766cd3f
-
Filesize
509KB
MD5cfc689b789fa70de543538dc7a104761
SHA17b89142443244b17c45f9705f38e7b287b4ccc98
SHA25624c4de5087ebc369bcdb674083ce3914bba94f83d0bb361883a1f34486cdbff4
SHA512b71fb3a3f0315ce419bdccae2c9923b065ee539418a06ba10f4bc762a73c55c71fcbc94ddede27e0d744fdf09f43ca4c5b60edce7f0e9fd177ce133c5766cd3f
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d