Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 07:22
Static task
static1
Behavioral task
behavioral1
Sample
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe
Resource
win10v2004-20230915-en
General
-
Target
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe
-
Size
1.1MB
-
MD5
822349336a1533f98fb3ce01d7075a6a
-
SHA1
911690599c8f7b1f7e904110d6d28a63fafeafd0
-
SHA256
a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc
-
SHA512
56e9e0a24cba99f4e563c15b7546545e7238d9e20d66409ca1e011f5b0a06495d813c3ccfb29dc6cf3966ad730d420f00780789a018a088a34b9c95722565906
-
SSDEEP
24576:ryAUnMn6XTw4x69hD0cJNYuH8cMxtquD4EMrbmETcKxbE:eAYX8f99NH8cMeHrbmsxb
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 8 IoCs
resource yara_rule behavioral1/memory/2640-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-57-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-62-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 3068 x3278374.exe 2764 x5052510.exe 2576 x4935405.exe 2632 g4204654.exe -
Loads dropped DLL 13 IoCs
pid Process 2092 a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe 3068 x3278374.exe 3068 x3278374.exe 2764 x5052510.exe 2764 x5052510.exe 2576 x4935405.exe 2576 x4935405.exe 2576 x4935405.exe 2632 g4204654.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe 2492 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5052510.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4935405.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3278374.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2632 set thread context of 2640 2632 g4204654.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 2492 2632 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2092 wrote to memory of 3068 2092 a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe 28 PID 2092 wrote to memory of 3068 2092 a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe 28 PID 2092 wrote to memory of 3068 2092 a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe 28 PID 2092 wrote to memory of 3068 2092 a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe 28 PID 2092 wrote to memory of 3068 2092 a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe 28 PID 2092 wrote to memory of 3068 2092 a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe 28 PID 2092 wrote to memory of 3068 2092 a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe 28 PID 3068 wrote to memory of 2764 3068 x3278374.exe 29 PID 3068 wrote to memory of 2764 3068 x3278374.exe 29 PID 3068 wrote to memory of 2764 3068 x3278374.exe 29 PID 3068 wrote to memory of 2764 3068 x3278374.exe 29 PID 3068 wrote to memory of 2764 3068 x3278374.exe 29 PID 3068 wrote to memory of 2764 3068 x3278374.exe 29 PID 3068 wrote to memory of 2764 3068 x3278374.exe 29 PID 2764 wrote to memory of 2576 2764 x5052510.exe 30 PID 2764 wrote to memory of 2576 2764 x5052510.exe 30 PID 2764 wrote to memory of 2576 2764 x5052510.exe 30 PID 2764 wrote to memory of 2576 2764 x5052510.exe 30 PID 2764 wrote to memory of 2576 2764 x5052510.exe 30 PID 2764 wrote to memory of 2576 2764 x5052510.exe 30 PID 2764 wrote to memory of 2576 2764 x5052510.exe 30 PID 2576 wrote to memory of 2632 2576 x4935405.exe 31 PID 2576 wrote to memory of 2632 2576 x4935405.exe 31 PID 2576 wrote to memory of 2632 2576 x4935405.exe 31 PID 2576 wrote to memory of 2632 2576 x4935405.exe 31 PID 2576 wrote to memory of 2632 2576 x4935405.exe 31 PID 2576 wrote to memory of 2632 2576 x4935405.exe 31 PID 2576 wrote to memory of 2632 2576 x4935405.exe 31 PID 2632 wrote to memory of 2704 2632 g4204654.exe 33 PID 2632 wrote to memory of 2704 2632 g4204654.exe 33 PID 2632 wrote to memory of 2704 2632 g4204654.exe 33 PID 2632 wrote to memory of 2704 2632 g4204654.exe 33 PID 2632 wrote to memory of 2704 2632 g4204654.exe 33 PID 2632 wrote to memory of 2704 2632 g4204654.exe 33 PID 2632 wrote to memory of 2704 2632 g4204654.exe 33 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2640 2632 g4204654.exe 34 PID 2632 wrote to memory of 2492 2632 g4204654.exe 35 PID 2632 wrote to memory of 2492 2632 g4204654.exe 35 PID 2632 wrote to memory of 2492 2632 g4204654.exe 35 PID 2632 wrote to memory of 2492 2632 g4204654.exe 35 PID 2632 wrote to memory of 2492 2632 g4204654.exe 35 PID 2632 wrote to memory of 2492 2632 g4204654.exe 35 PID 2632 wrote to memory of 2492 2632 g4204654.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe"C:\Users\Admin\AppData\Local\Temp\a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3278374.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3278374.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5052510.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5052510.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4935405.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4935405.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:2492
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD541cb0e4dbe6af65917784c86da81145d
SHA17d53dcb4e4f1ecb2a356255738d532da77199dff
SHA256eb7d4eabd79d34d3491cca4433c36e0834557b1fb3dbbdeaecf47c0923d7bebf
SHA512cccdf30e7ddc3557e7b2bafedd1752f5a6ad3f7e18de87565f7fd3733a19c7daa3c4828ec19bc858d825f19fc6e9e26ac6ed97745c061573edc59456e2505cad
-
Filesize
1.0MB
MD541cb0e4dbe6af65917784c86da81145d
SHA17d53dcb4e4f1ecb2a356255738d532da77199dff
SHA256eb7d4eabd79d34d3491cca4433c36e0834557b1fb3dbbdeaecf47c0923d7bebf
SHA512cccdf30e7ddc3557e7b2bafedd1752f5a6ad3f7e18de87565f7fd3733a19c7daa3c4828ec19bc858d825f19fc6e9e26ac6ed97745c061573edc59456e2505cad
-
Filesize
675KB
MD594fc5256b9a629cb03d3c36cd41bd383
SHA18c5db756a17308cab9963cd03251e75f9ac46bd7
SHA2565fe28bf92d80d3a0a12573ad9761961fed8b7a3f1ecc8253f0b31a5b153862f9
SHA512ecab9f93687b2055c7572c513de7bd166ec7888a7e7d782898d3d757fa80747466579c696efbe03eff65970d03150daa5b48a311de1e964204019ecda851a235
-
Filesize
675KB
MD594fc5256b9a629cb03d3c36cd41bd383
SHA18c5db756a17308cab9963cd03251e75f9ac46bd7
SHA2565fe28bf92d80d3a0a12573ad9761961fed8b7a3f1ecc8253f0b31a5b153862f9
SHA512ecab9f93687b2055c7572c513de7bd166ec7888a7e7d782898d3d757fa80747466579c696efbe03eff65970d03150daa5b48a311de1e964204019ecda851a235
-
Filesize
509KB
MD5fdb98b2ca8e2498543f41c1afff06625
SHA12bac8cab94c21e67c7a49ca68fb2fe4b4204a844
SHA256f3263739cb6d3ff4df6f2bb12e146b96ae1ac87feec4176b9883ec23531da365
SHA512a2e2fb7ce279586b2281cac3d9a0361a2b98795ec9f216c082ee500032dd1dd55f4c9190243fed244113bce11cc8a8a39291cf7b2d985223ba2cd8bb92a80d5c
-
Filesize
509KB
MD5fdb98b2ca8e2498543f41c1afff06625
SHA12bac8cab94c21e67c7a49ca68fb2fe4b4204a844
SHA256f3263739cb6d3ff4df6f2bb12e146b96ae1ac87feec4176b9883ec23531da365
SHA512a2e2fb7ce279586b2281cac3d9a0361a2b98795ec9f216c082ee500032dd1dd55f4c9190243fed244113bce11cc8a8a39291cf7b2d985223ba2cd8bb92a80d5c
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464
-
Filesize
1.0MB
MD541cb0e4dbe6af65917784c86da81145d
SHA17d53dcb4e4f1ecb2a356255738d532da77199dff
SHA256eb7d4eabd79d34d3491cca4433c36e0834557b1fb3dbbdeaecf47c0923d7bebf
SHA512cccdf30e7ddc3557e7b2bafedd1752f5a6ad3f7e18de87565f7fd3733a19c7daa3c4828ec19bc858d825f19fc6e9e26ac6ed97745c061573edc59456e2505cad
-
Filesize
1.0MB
MD541cb0e4dbe6af65917784c86da81145d
SHA17d53dcb4e4f1ecb2a356255738d532da77199dff
SHA256eb7d4eabd79d34d3491cca4433c36e0834557b1fb3dbbdeaecf47c0923d7bebf
SHA512cccdf30e7ddc3557e7b2bafedd1752f5a6ad3f7e18de87565f7fd3733a19c7daa3c4828ec19bc858d825f19fc6e9e26ac6ed97745c061573edc59456e2505cad
-
Filesize
675KB
MD594fc5256b9a629cb03d3c36cd41bd383
SHA18c5db756a17308cab9963cd03251e75f9ac46bd7
SHA2565fe28bf92d80d3a0a12573ad9761961fed8b7a3f1ecc8253f0b31a5b153862f9
SHA512ecab9f93687b2055c7572c513de7bd166ec7888a7e7d782898d3d757fa80747466579c696efbe03eff65970d03150daa5b48a311de1e964204019ecda851a235
-
Filesize
675KB
MD594fc5256b9a629cb03d3c36cd41bd383
SHA18c5db756a17308cab9963cd03251e75f9ac46bd7
SHA2565fe28bf92d80d3a0a12573ad9761961fed8b7a3f1ecc8253f0b31a5b153862f9
SHA512ecab9f93687b2055c7572c513de7bd166ec7888a7e7d782898d3d757fa80747466579c696efbe03eff65970d03150daa5b48a311de1e964204019ecda851a235
-
Filesize
509KB
MD5fdb98b2ca8e2498543f41c1afff06625
SHA12bac8cab94c21e67c7a49ca68fb2fe4b4204a844
SHA256f3263739cb6d3ff4df6f2bb12e146b96ae1ac87feec4176b9883ec23531da365
SHA512a2e2fb7ce279586b2281cac3d9a0361a2b98795ec9f216c082ee500032dd1dd55f4c9190243fed244113bce11cc8a8a39291cf7b2d985223ba2cd8bb92a80d5c
-
Filesize
509KB
MD5fdb98b2ca8e2498543f41c1afff06625
SHA12bac8cab94c21e67c7a49ca68fb2fe4b4204a844
SHA256f3263739cb6d3ff4df6f2bb12e146b96ae1ac87feec4176b9883ec23531da365
SHA512a2e2fb7ce279586b2281cac3d9a0361a2b98795ec9f216c082ee500032dd1dd55f4c9190243fed244113bce11cc8a8a39291cf7b2d985223ba2cd8bb92a80d5c
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464
-
Filesize
1016KB
MD5393345f665a4329b49df2e18bfc2ab1c
SHA13b19343b788271ce46b98c88aeb9ca76c4fb2061
SHA256ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e
SHA512532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464