Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe
Resource
win10v2004-20230915-en
General
-
Target
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe
-
Size
928KB
-
MD5
bacef800a1cc6524cb7a72a1bfb940e1
-
SHA1
ade0039895a1d0e6179127b9c6cc63df35bfac4c
-
SHA256
d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d
-
SHA512
676d3c90763804eb44579ee144a11eb482a9030fe4e57345e4fb67ef679aeaf9a1a411e58939d998b1c20bfa00c1d49c6889c171cc6be4d022a253daf3547c41
-
SSDEEP
12288:pMrSy90j08aZHByNsyIhKiRxDk5KEwC/L2F2gAtwVmN+LT9eMVsRoDGtWYIE:byd8oBcsySK4x1zCL2Mg1mGpVsSDGYu
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 8 IoCs
resource yara_rule behavioral1/memory/112-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/112-51-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/112-53-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/112-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/112-58-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/112-60-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/112-61-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/112-65-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2284 x9581551.exe 2652 x6191232.exe 2660 x9947503.exe 1664 g2887451.exe -
Loads dropped DLL 13 IoCs
pid Process 2240 d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe 2284 x9581551.exe 2284 x9581551.exe 2652 x6191232.exe 2652 x6191232.exe 2660 x9947503.exe 2660 x9947503.exe 2660 x9947503.exe 1664 g2887451.exe 2564 WerFault.exe 2564 WerFault.exe 2564 WerFault.exe 2564 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9581551.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6191232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9947503.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 112 1664 g2887451.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2564 1664 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2284 2240 d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe 27 PID 2240 wrote to memory of 2284 2240 d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe 27 PID 2240 wrote to memory of 2284 2240 d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe 27 PID 2240 wrote to memory of 2284 2240 d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe 27 PID 2240 wrote to memory of 2284 2240 d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe 27 PID 2240 wrote to memory of 2284 2240 d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe 27 PID 2240 wrote to memory of 2284 2240 d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe 27 PID 2284 wrote to memory of 2652 2284 x9581551.exe 28 PID 2284 wrote to memory of 2652 2284 x9581551.exe 28 PID 2284 wrote to memory of 2652 2284 x9581551.exe 28 PID 2284 wrote to memory of 2652 2284 x9581551.exe 28 PID 2284 wrote to memory of 2652 2284 x9581551.exe 28 PID 2284 wrote to memory of 2652 2284 x9581551.exe 28 PID 2284 wrote to memory of 2652 2284 x9581551.exe 28 PID 2652 wrote to memory of 2660 2652 x6191232.exe 29 PID 2652 wrote to memory of 2660 2652 x6191232.exe 29 PID 2652 wrote to memory of 2660 2652 x6191232.exe 29 PID 2652 wrote to memory of 2660 2652 x6191232.exe 29 PID 2652 wrote to memory of 2660 2652 x6191232.exe 29 PID 2652 wrote to memory of 2660 2652 x6191232.exe 29 PID 2652 wrote to memory of 2660 2652 x6191232.exe 29 PID 2660 wrote to memory of 1664 2660 x9947503.exe 30 PID 2660 wrote to memory of 1664 2660 x9947503.exe 30 PID 2660 wrote to memory of 1664 2660 x9947503.exe 30 PID 2660 wrote to memory of 1664 2660 x9947503.exe 30 PID 2660 wrote to memory of 1664 2660 x9947503.exe 30 PID 2660 wrote to memory of 1664 2660 x9947503.exe 30 PID 2660 wrote to memory of 1664 2660 x9947503.exe 30 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 112 1664 g2887451.exe 32 PID 1664 wrote to memory of 2564 1664 g2887451.exe 33 PID 1664 wrote to memory of 2564 1664 g2887451.exe 33 PID 1664 wrote to memory of 2564 1664 g2887451.exe 33 PID 1664 wrote to memory of 2564 1664 g2887451.exe 33 PID 1664 wrote to memory of 2564 1664 g2887451.exe 33 PID 1664 wrote to memory of 2564 1664 g2887451.exe 33 PID 1664 wrote to memory of 2564 1664 g2887451.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe"C:\Users\Admin\AppData\Local\Temp\d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9581551.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9581551.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6191232.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6191232.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9947503.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9947503.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2564
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD5cfb67fe0aafa7a9463441907387e97f7
SHA12a17d149b955de7e556a386f35a8e03ad57e76e9
SHA256a4f7ab595d230aa7e65d21c42bc5cc1d365bb274ebfcbf8d0b5e3cd500f016cf
SHA5126553bb7a2281d153e491b02c622f8fcb29729c54e394b1aa4228fffed6849e917bdc47935fd89500d154c58fd8819c1fe1d0a6001d6e344a66b7740cf7b6363f
-
Filesize
826KB
MD5cfb67fe0aafa7a9463441907387e97f7
SHA12a17d149b955de7e556a386f35a8e03ad57e76e9
SHA256a4f7ab595d230aa7e65d21c42bc5cc1d365bb274ebfcbf8d0b5e3cd500f016cf
SHA5126553bb7a2281d153e491b02c622f8fcb29729c54e394b1aa4228fffed6849e917bdc47935fd89500d154c58fd8819c1fe1d0a6001d6e344a66b7740cf7b6363f
-
Filesize
556KB
MD54bdef36f1bae62eae961fdcc6c187f40
SHA1750bb61c3d73fbdff40ba8d4f5090f4a4f1830b7
SHA256f858721439a30e8d494b19099f9fb24584a93523d2bd01c66acce8d1ca31317c
SHA512cec644ff86fe77812fbd579a1316d16d3dc11dd45acd73257fa8340ab895361746ae1ab2ce2d2ee630179da89bc6da9cb25fc518e46bbc0b85137e952467e509
-
Filesize
556KB
MD54bdef36f1bae62eae961fdcc6c187f40
SHA1750bb61c3d73fbdff40ba8d4f5090f4a4f1830b7
SHA256f858721439a30e8d494b19099f9fb24584a93523d2bd01c66acce8d1ca31317c
SHA512cec644ff86fe77812fbd579a1316d16d3dc11dd45acd73257fa8340ab895361746ae1ab2ce2d2ee630179da89bc6da9cb25fc518e46bbc0b85137e952467e509
-
Filesize
390KB
MD567e188b5a3aa2c0ed96bb3b30ac7686f
SHA19dbab52158381915abf29d4029096e43633dd295
SHA2560424828e7ade27f996f4ffd1d0458113b48b38023a55569bbddbc84949efb352
SHA512cd787f9e0e36c7bc0e08883c0b044ca526121a140e88d38bcb77ec888e0d84ae1070b3d2f277ba9f5b732be9fcb4f2d7c4185680669bc0ddf700dd36ca76cd16
-
Filesize
390KB
MD567e188b5a3aa2c0ed96bb3b30ac7686f
SHA19dbab52158381915abf29d4029096e43633dd295
SHA2560424828e7ade27f996f4ffd1d0458113b48b38023a55569bbddbc84949efb352
SHA512cd787f9e0e36c7bc0e08883c0b044ca526121a140e88d38bcb77ec888e0d84ae1070b3d2f277ba9f5b732be9fcb4f2d7c4185680669bc0ddf700dd36ca76cd16
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
826KB
MD5cfb67fe0aafa7a9463441907387e97f7
SHA12a17d149b955de7e556a386f35a8e03ad57e76e9
SHA256a4f7ab595d230aa7e65d21c42bc5cc1d365bb274ebfcbf8d0b5e3cd500f016cf
SHA5126553bb7a2281d153e491b02c622f8fcb29729c54e394b1aa4228fffed6849e917bdc47935fd89500d154c58fd8819c1fe1d0a6001d6e344a66b7740cf7b6363f
-
Filesize
826KB
MD5cfb67fe0aafa7a9463441907387e97f7
SHA12a17d149b955de7e556a386f35a8e03ad57e76e9
SHA256a4f7ab595d230aa7e65d21c42bc5cc1d365bb274ebfcbf8d0b5e3cd500f016cf
SHA5126553bb7a2281d153e491b02c622f8fcb29729c54e394b1aa4228fffed6849e917bdc47935fd89500d154c58fd8819c1fe1d0a6001d6e344a66b7740cf7b6363f
-
Filesize
556KB
MD54bdef36f1bae62eae961fdcc6c187f40
SHA1750bb61c3d73fbdff40ba8d4f5090f4a4f1830b7
SHA256f858721439a30e8d494b19099f9fb24584a93523d2bd01c66acce8d1ca31317c
SHA512cec644ff86fe77812fbd579a1316d16d3dc11dd45acd73257fa8340ab895361746ae1ab2ce2d2ee630179da89bc6da9cb25fc518e46bbc0b85137e952467e509
-
Filesize
556KB
MD54bdef36f1bae62eae961fdcc6c187f40
SHA1750bb61c3d73fbdff40ba8d4f5090f4a4f1830b7
SHA256f858721439a30e8d494b19099f9fb24584a93523d2bd01c66acce8d1ca31317c
SHA512cec644ff86fe77812fbd579a1316d16d3dc11dd45acd73257fa8340ab895361746ae1ab2ce2d2ee630179da89bc6da9cb25fc518e46bbc0b85137e952467e509
-
Filesize
390KB
MD567e188b5a3aa2c0ed96bb3b30ac7686f
SHA19dbab52158381915abf29d4029096e43633dd295
SHA2560424828e7ade27f996f4ffd1d0458113b48b38023a55569bbddbc84949efb352
SHA512cd787f9e0e36c7bc0e08883c0b044ca526121a140e88d38bcb77ec888e0d84ae1070b3d2f277ba9f5b732be9fcb4f2d7c4185680669bc0ddf700dd36ca76cd16
-
Filesize
390KB
MD567e188b5a3aa2c0ed96bb3b30ac7686f
SHA19dbab52158381915abf29d4029096e43633dd295
SHA2560424828e7ade27f996f4ffd1d0458113b48b38023a55569bbddbc84949efb352
SHA512cd787f9e0e36c7bc0e08883c0b044ca526121a140e88d38bcb77ec888e0d84ae1070b3d2f277ba9f5b732be9fcb4f2d7c4185680669bc0ddf700dd36ca76cd16
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359