Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe
Resource
win10v2004-20230915-en
General
-
Target
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe
-
Size
1.1MB
-
MD5
7f391f9bd79aad9469fe2e03f8f7b81d
-
SHA1
d2d873edebc27b2a0ffc36a3fc24dd2996885694
-
SHA256
ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1
-
SHA512
0af548fa45286a0ba2515167eccafd3f572696dda77967235a5779c6c307d33b863d16c42ed24b6acc0a0210491c39c7babae15dd5829fa629022c22a060745b
-
SSDEEP
24576:wy4kBPcrb04MJ3hCNmrHU5NIctnBb8lZ2rJEVWZpO13VZkJ:34nf04GRzrAImkZWZpMlZ
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2640-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2632 x6757315.exe 2808 x5295115.exe 2844 x0998520.exe 2564 g4366694.exe -
Loads dropped DLL 13 IoCs
pid Process 2620 ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe 2632 x6757315.exe 2632 x6757315.exe 2808 x5295115.exe 2808 x5295115.exe 2844 x0998520.exe 2844 x0998520.exe 2844 x0998520.exe 2564 g4366694.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6757315.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5295115.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0998520.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2564 set thread context of 2640 2564 g4366694.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 1948 2640 WerFault.exe 33 2604 2564 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2632 2620 ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe 28 PID 2620 wrote to memory of 2632 2620 ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe 28 PID 2620 wrote to memory of 2632 2620 ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe 28 PID 2620 wrote to memory of 2632 2620 ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe 28 PID 2620 wrote to memory of 2632 2620 ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe 28 PID 2620 wrote to memory of 2632 2620 ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe 28 PID 2620 wrote to memory of 2632 2620 ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe 28 PID 2632 wrote to memory of 2808 2632 x6757315.exe 29 PID 2632 wrote to memory of 2808 2632 x6757315.exe 29 PID 2632 wrote to memory of 2808 2632 x6757315.exe 29 PID 2632 wrote to memory of 2808 2632 x6757315.exe 29 PID 2632 wrote to memory of 2808 2632 x6757315.exe 29 PID 2632 wrote to memory of 2808 2632 x6757315.exe 29 PID 2632 wrote to memory of 2808 2632 x6757315.exe 29 PID 2808 wrote to memory of 2844 2808 x5295115.exe 30 PID 2808 wrote to memory of 2844 2808 x5295115.exe 30 PID 2808 wrote to memory of 2844 2808 x5295115.exe 30 PID 2808 wrote to memory of 2844 2808 x5295115.exe 30 PID 2808 wrote to memory of 2844 2808 x5295115.exe 30 PID 2808 wrote to memory of 2844 2808 x5295115.exe 30 PID 2808 wrote to memory of 2844 2808 x5295115.exe 30 PID 2844 wrote to memory of 2564 2844 x0998520.exe 31 PID 2844 wrote to memory of 2564 2844 x0998520.exe 31 PID 2844 wrote to memory of 2564 2844 x0998520.exe 31 PID 2844 wrote to memory of 2564 2844 x0998520.exe 31 PID 2844 wrote to memory of 2564 2844 x0998520.exe 31 PID 2844 wrote to memory of 2564 2844 x0998520.exe 31 PID 2844 wrote to memory of 2564 2844 x0998520.exe 31 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2640 2564 g4366694.exe 33 PID 2564 wrote to memory of 2604 2564 g4366694.exe 35 PID 2564 wrote to memory of 2604 2564 g4366694.exe 35 PID 2564 wrote to memory of 2604 2564 g4366694.exe 35 PID 2564 wrote to memory of 2604 2564 g4366694.exe 35 PID 2564 wrote to memory of 2604 2564 g4366694.exe 35 PID 2564 wrote to memory of 2604 2564 g4366694.exe 35 PID 2564 wrote to memory of 2604 2564 g4366694.exe 35 PID 2640 wrote to memory of 1948 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 1948 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 1948 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 1948 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 1948 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 1948 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 1948 2640 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe"C:\Users\Admin\AppData\Local\Temp\ab7993aa21e2f1ffe0919f32d40cd0a500c3e29b501b747b6ddcc491430c7be1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6757315.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6757315.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5295115.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5295115.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0998520.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0998520.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4366694.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4366694.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 2687⤵
- Program crash
PID:1948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2604
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5699ab19b07a85d1872212ee62d62bbf8
SHA1e81dfb33c3b0d955ed1bb9e1b914e143b2cd2b1c
SHA2569a22fe9be35eadb0788df91624a232a92da90a09f7a331f01cad14862d266e2a
SHA51272e7e10d4d1be7e57e28bac459ca3c38ac4978c2efa9b668d8ea943fc36ff621cbdf23e9b6e8cb22c2c3a9811eb45c906d2ed3fe68fe2d0b3202469af7104578
-
Filesize
1.0MB
MD5699ab19b07a85d1872212ee62d62bbf8
SHA1e81dfb33c3b0d955ed1bb9e1b914e143b2cd2b1c
SHA2569a22fe9be35eadb0788df91624a232a92da90a09f7a331f01cad14862d266e2a
SHA51272e7e10d4d1be7e57e28bac459ca3c38ac4978c2efa9b668d8ea943fc36ff621cbdf23e9b6e8cb22c2c3a9811eb45c906d2ed3fe68fe2d0b3202469af7104578
-
Filesize
674KB
MD51d6d620d42db00caba7f7742de1b7c21
SHA177827c6e93dc5a1c81675979f40426b75852d8d0
SHA256f1cdd88457672428233295f067d7227169d9579acf8be8d8333c1295533a9934
SHA51241d4d4b34a71cf0a483d6fbd4bfa9de35ac0a4d5c6f4354f1568fe1224a1db7333912c1ee72c05ea479e73d4f1c6ec55084371bd4757f7e54e2f74cd8fbcd0c4
-
Filesize
674KB
MD51d6d620d42db00caba7f7742de1b7c21
SHA177827c6e93dc5a1c81675979f40426b75852d8d0
SHA256f1cdd88457672428233295f067d7227169d9579acf8be8d8333c1295533a9934
SHA51241d4d4b34a71cf0a483d6fbd4bfa9de35ac0a4d5c6f4354f1568fe1224a1db7333912c1ee72c05ea479e73d4f1c6ec55084371bd4757f7e54e2f74cd8fbcd0c4
-
Filesize
509KB
MD5510e93660a1ece1c104d82a19e4c370f
SHA19820a234d5448af6008d42a4e1ec9c6021282225
SHA25683c57e1c90a2f5090afb489a756400de3043164e1cf2f4db7f8c83eabce36835
SHA51291c158b60d14aed42d8836c16706bfdb4fff7a439203cf9ad1b64453f46c200663282c5f500fa5bdc972f21f8292c6a6a30cfdd51944dda521253185d0dce7d1
-
Filesize
509KB
MD5510e93660a1ece1c104d82a19e4c370f
SHA19820a234d5448af6008d42a4e1ec9c6021282225
SHA25683c57e1c90a2f5090afb489a756400de3043164e1cf2f4db7f8c83eabce36835
SHA51291c158b60d14aed42d8836c16706bfdb4fff7a439203cf9ad1b64453f46c200663282c5f500fa5bdc972f21f8292c6a6a30cfdd51944dda521253185d0dce7d1
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478
-
Filesize
1.0MB
MD5699ab19b07a85d1872212ee62d62bbf8
SHA1e81dfb33c3b0d955ed1bb9e1b914e143b2cd2b1c
SHA2569a22fe9be35eadb0788df91624a232a92da90a09f7a331f01cad14862d266e2a
SHA51272e7e10d4d1be7e57e28bac459ca3c38ac4978c2efa9b668d8ea943fc36ff621cbdf23e9b6e8cb22c2c3a9811eb45c906d2ed3fe68fe2d0b3202469af7104578
-
Filesize
1.0MB
MD5699ab19b07a85d1872212ee62d62bbf8
SHA1e81dfb33c3b0d955ed1bb9e1b914e143b2cd2b1c
SHA2569a22fe9be35eadb0788df91624a232a92da90a09f7a331f01cad14862d266e2a
SHA51272e7e10d4d1be7e57e28bac459ca3c38ac4978c2efa9b668d8ea943fc36ff621cbdf23e9b6e8cb22c2c3a9811eb45c906d2ed3fe68fe2d0b3202469af7104578
-
Filesize
674KB
MD51d6d620d42db00caba7f7742de1b7c21
SHA177827c6e93dc5a1c81675979f40426b75852d8d0
SHA256f1cdd88457672428233295f067d7227169d9579acf8be8d8333c1295533a9934
SHA51241d4d4b34a71cf0a483d6fbd4bfa9de35ac0a4d5c6f4354f1568fe1224a1db7333912c1ee72c05ea479e73d4f1c6ec55084371bd4757f7e54e2f74cd8fbcd0c4
-
Filesize
674KB
MD51d6d620d42db00caba7f7742de1b7c21
SHA177827c6e93dc5a1c81675979f40426b75852d8d0
SHA256f1cdd88457672428233295f067d7227169d9579acf8be8d8333c1295533a9934
SHA51241d4d4b34a71cf0a483d6fbd4bfa9de35ac0a4d5c6f4354f1568fe1224a1db7333912c1ee72c05ea479e73d4f1c6ec55084371bd4757f7e54e2f74cd8fbcd0c4
-
Filesize
509KB
MD5510e93660a1ece1c104d82a19e4c370f
SHA19820a234d5448af6008d42a4e1ec9c6021282225
SHA25683c57e1c90a2f5090afb489a756400de3043164e1cf2f4db7f8c83eabce36835
SHA51291c158b60d14aed42d8836c16706bfdb4fff7a439203cf9ad1b64453f46c200663282c5f500fa5bdc972f21f8292c6a6a30cfdd51944dda521253185d0dce7d1
-
Filesize
509KB
MD5510e93660a1ece1c104d82a19e4c370f
SHA19820a234d5448af6008d42a4e1ec9c6021282225
SHA25683c57e1c90a2f5090afb489a756400de3043164e1cf2f4db7f8c83eabce36835
SHA51291c158b60d14aed42d8836c16706bfdb4fff7a439203cf9ad1b64453f46c200663282c5f500fa5bdc972f21f8292c6a6a30cfdd51944dda521253185d0dce7d1
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478
-
Filesize
1016KB
MD5ed91820de0085c9ce0a120e6ef4fed4b
SHA167418476c54add10b5136a05a8ee6cdcfdded12e
SHA256d289acfba69488cf00a2a6147a0a1d46734b1105ce1276de1c3f8e12956d512c
SHA5128663addc79006da309223faef86df38063b19647253a6aaaaa0dc8ad4988774291406f0fec97f17dfdf100cfe98edeaf3639f7b81d2d75643d0076a864b3e478