Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 07:31
Static task
static1
Behavioral task
behavioral1
Sample
f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe
Resource
win10v2004-20230915-en
General
-
Target
f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe
-
Size
912KB
-
MD5
d543b9735c540cc6703db59e7cdc901b
-
SHA1
afe133337f5a4e369a6ea0b1b343396877deb4ee
-
SHA256
f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb
-
SHA512
753e225c1cb2e201f1ce9e9dbcd872ff8973dd6f5e0b3cf29e9d7185c7faaebaae12fb573f182d57d0715432ec7c6d74eae872dbab9a5c01f0d989fc772335f0
-
SSDEEP
24576:6y/N4VI3ja2E40UXN7eKmsqV1B7Aj5Pv:BVg0a3UXdeKm93B7Aj
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2520-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2520-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2520-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2520-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2520-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2520-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 3052 x1645971.exe 2712 x3889697.exe 2660 x5554897.exe 2784 g5814111.exe -
Loads dropped DLL 13 IoCs
pid Process 2792 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 3052 x1645971.exe 3052 x1645971.exe 2712 x3889697.exe 2712 x3889697.exe 2660 x5554897.exe 2660 x5554897.exe 2660 x5554897.exe 2784 g5814111.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1645971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3889697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5554897.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2784 set thread context of 2520 2784 g5814111.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2536 2784 WerFault.exe 31 2680 2520 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2792 wrote to memory of 3052 2792 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 28 PID 2792 wrote to memory of 3052 2792 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 28 PID 2792 wrote to memory of 3052 2792 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 28 PID 2792 wrote to memory of 3052 2792 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 28 PID 2792 wrote to memory of 3052 2792 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 28 PID 2792 wrote to memory of 3052 2792 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 28 PID 2792 wrote to memory of 3052 2792 f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe 28 PID 3052 wrote to memory of 2712 3052 x1645971.exe 29 PID 3052 wrote to memory of 2712 3052 x1645971.exe 29 PID 3052 wrote to memory of 2712 3052 x1645971.exe 29 PID 3052 wrote to memory of 2712 3052 x1645971.exe 29 PID 3052 wrote to memory of 2712 3052 x1645971.exe 29 PID 3052 wrote to memory of 2712 3052 x1645971.exe 29 PID 3052 wrote to memory of 2712 3052 x1645971.exe 29 PID 2712 wrote to memory of 2660 2712 x3889697.exe 30 PID 2712 wrote to memory of 2660 2712 x3889697.exe 30 PID 2712 wrote to memory of 2660 2712 x3889697.exe 30 PID 2712 wrote to memory of 2660 2712 x3889697.exe 30 PID 2712 wrote to memory of 2660 2712 x3889697.exe 30 PID 2712 wrote to memory of 2660 2712 x3889697.exe 30 PID 2712 wrote to memory of 2660 2712 x3889697.exe 30 PID 2660 wrote to memory of 2784 2660 x5554897.exe 31 PID 2660 wrote to memory of 2784 2660 x5554897.exe 31 PID 2660 wrote to memory of 2784 2660 x5554897.exe 31 PID 2660 wrote to memory of 2784 2660 x5554897.exe 31 PID 2660 wrote to memory of 2784 2660 x5554897.exe 31 PID 2660 wrote to memory of 2784 2660 x5554897.exe 31 PID 2660 wrote to memory of 2784 2660 x5554897.exe 31 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2520 2784 g5814111.exe 33 PID 2784 wrote to memory of 2536 2784 g5814111.exe 34 PID 2784 wrote to memory of 2536 2784 g5814111.exe 34 PID 2784 wrote to memory of 2536 2784 g5814111.exe 34 PID 2784 wrote to memory of 2536 2784 g5814111.exe 34 PID 2784 wrote to memory of 2536 2784 g5814111.exe 34 PID 2784 wrote to memory of 2536 2784 g5814111.exe 34 PID 2784 wrote to memory of 2536 2784 g5814111.exe 34 PID 2520 wrote to memory of 2680 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2680 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2680 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2680 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2680 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2680 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2680 2520 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe"C:\Users\Admin\AppData\Local\Temp\f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 2687⤵
- Program crash
PID:2680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2536
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810KB
MD5547bde822515107c33b466b8f698fbff
SHA12b859679fe3c1177cb8e539680525e30c4294083
SHA25651f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679
SHA512f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab
-
Filesize
810KB
MD5547bde822515107c33b466b8f698fbff
SHA12b859679fe3c1177cb8e539680525e30c4294083
SHA25651f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679
SHA512f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab
-
Filesize
547KB
MD5c1095508e8fabac0fc8e7cbe847ef1ba
SHA1bb98031602538985e71476aa4acc5e329c2060dc
SHA2567e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8
SHA5121e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f
-
Filesize
547KB
MD5c1095508e8fabac0fc8e7cbe847ef1ba
SHA1bb98031602538985e71476aa4acc5e329c2060dc
SHA2567e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8
SHA5121e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f
-
Filesize
381KB
MD59b9a1df7abee3c46c609d68ec66954b3
SHA1616e616ae8662aa9afc08b6e2a8d45b0d627959f
SHA2566075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e
SHA51208ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d
-
Filesize
381KB
MD59b9a1df7abee3c46c609d68ec66954b3
SHA1616e616ae8662aa9afc08b6e2a8d45b0d627959f
SHA2566075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e
SHA51208ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
810KB
MD5547bde822515107c33b466b8f698fbff
SHA12b859679fe3c1177cb8e539680525e30c4294083
SHA25651f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679
SHA512f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab
-
Filesize
810KB
MD5547bde822515107c33b466b8f698fbff
SHA12b859679fe3c1177cb8e539680525e30c4294083
SHA25651f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679
SHA512f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab
-
Filesize
547KB
MD5c1095508e8fabac0fc8e7cbe847ef1ba
SHA1bb98031602538985e71476aa4acc5e329c2060dc
SHA2567e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8
SHA5121e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f
-
Filesize
547KB
MD5c1095508e8fabac0fc8e7cbe847ef1ba
SHA1bb98031602538985e71476aa4acc5e329c2060dc
SHA2567e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8
SHA5121e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f
-
Filesize
381KB
MD59b9a1df7abee3c46c609d68ec66954b3
SHA1616e616ae8662aa9afc08b6e2a8d45b0d627959f
SHA2566075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e
SHA51208ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d
-
Filesize
381KB
MD59b9a1df7abee3c46c609d68ec66954b3
SHA1616e616ae8662aa9afc08b6e2a8d45b0d627959f
SHA2566075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e
SHA51208ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068
-
Filesize
346KB
MD5f572c4533829a2d11c18004f78ad430c
SHA1e858322f98d14be47a66280df11dfd774a730b1b
SHA256b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4
SHA5124c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068