Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:31

General

  • Target

    f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe

  • Size

    912KB

  • MD5

    d543b9735c540cc6703db59e7cdc901b

  • SHA1

    afe133337f5a4e369a6ea0b1b343396877deb4ee

  • SHA256

    f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb

  • SHA512

    753e225c1cb2e201f1ce9e9dbcd872ff8973dd6f5e0b3cf29e9d7185c7faaebaae12fb573f182d57d0715432ec7c6d74eae872dbab9a5c01f0d989fc772335f0

  • SSDEEP

    24576:6y/N4VI3ja2E40UXN7eKmsqV1B7Aj5Pv:BVg0a3UXdeKm93B7Aj

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe
    "C:\Users\Admin\AppData\Local\Temp\f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2520
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 268
                7⤵
                • Program crash
                PID:2680
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exe

    Filesize

    810KB

    MD5

    547bde822515107c33b466b8f698fbff

    SHA1

    2b859679fe3c1177cb8e539680525e30c4294083

    SHA256

    51f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679

    SHA512

    f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exe

    Filesize

    810KB

    MD5

    547bde822515107c33b466b8f698fbff

    SHA1

    2b859679fe3c1177cb8e539680525e30c4294083

    SHA256

    51f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679

    SHA512

    f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exe

    Filesize

    547KB

    MD5

    c1095508e8fabac0fc8e7cbe847ef1ba

    SHA1

    bb98031602538985e71476aa4acc5e329c2060dc

    SHA256

    7e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8

    SHA512

    1e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exe

    Filesize

    547KB

    MD5

    c1095508e8fabac0fc8e7cbe847ef1ba

    SHA1

    bb98031602538985e71476aa4acc5e329c2060dc

    SHA256

    7e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8

    SHA512

    1e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exe

    Filesize

    381KB

    MD5

    9b9a1df7abee3c46c609d68ec66954b3

    SHA1

    616e616ae8662aa9afc08b6e2a8d45b0d627959f

    SHA256

    6075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e

    SHA512

    08ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exe

    Filesize

    381KB

    MD5

    9b9a1df7abee3c46c609d68ec66954b3

    SHA1

    616e616ae8662aa9afc08b6e2a8d45b0d627959f

    SHA256

    6075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e

    SHA512

    08ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exe

    Filesize

    810KB

    MD5

    547bde822515107c33b466b8f698fbff

    SHA1

    2b859679fe3c1177cb8e539680525e30c4294083

    SHA256

    51f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679

    SHA512

    f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1645971.exe

    Filesize

    810KB

    MD5

    547bde822515107c33b466b8f698fbff

    SHA1

    2b859679fe3c1177cb8e539680525e30c4294083

    SHA256

    51f465eb390bdb8fbaea777cd78f73b28171ec5c346c1fb4727a1063f5733679

    SHA512

    f21836af01a281ecba382ed3e95a964985f508899b674bf6535ca4e47ae20a1276effde88586e384a0e4873aa59a2be4f8690e335100f82d66dc737f2371b6ab

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exe

    Filesize

    547KB

    MD5

    c1095508e8fabac0fc8e7cbe847ef1ba

    SHA1

    bb98031602538985e71476aa4acc5e329c2060dc

    SHA256

    7e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8

    SHA512

    1e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3889697.exe

    Filesize

    547KB

    MD5

    c1095508e8fabac0fc8e7cbe847ef1ba

    SHA1

    bb98031602538985e71476aa4acc5e329c2060dc

    SHA256

    7e0910d3c3574b3b5acec323ae58f5731163daad09566005014d87beff065cd8

    SHA512

    1e28e4b8771cd2f74ae5443dd1ecb318c7f3c92947275d43d5d1d3b8a6ddb6458c1a3909ce6a69d2deba235c7ab74abb59401499a15b7b5ad672c6d030e4b36f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exe

    Filesize

    381KB

    MD5

    9b9a1df7abee3c46c609d68ec66954b3

    SHA1

    616e616ae8662aa9afc08b6e2a8d45b0d627959f

    SHA256

    6075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e

    SHA512

    08ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5554897.exe

    Filesize

    381KB

    MD5

    9b9a1df7abee3c46c609d68ec66954b3

    SHA1

    616e616ae8662aa9afc08b6e2a8d45b0d627959f

    SHA256

    6075fb89d167b6281db22143d17248f948335c6cbee1ac3a1960a8a7ff8a0c4e

    SHA512

    08ce0e0e3ae8d98847b25dc5c278f0dd7bbca540c97808dffb8d3b1027078eeb01b54ef424c13accda8e08dd9865c34dcc9c39d433c53c357d704e5c39145f0d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5814111.exe

    Filesize

    346KB

    MD5

    f572c4533829a2d11c18004f78ad430c

    SHA1

    e858322f98d14be47a66280df11dfd774a730b1b

    SHA256

    b468397524db0d5b344cd6bde3e52b9545937f84998f43f62a867f693714bcd4

    SHA512

    4c90d171b2bc71f807fcdececcb602768f8bfbafaf8d85bde41af0b5b50fe43f8eef558cfdf341b4efd82bb9fa97f39929a4881375d7ab770a3b252011de8068

  • memory/2520-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2520-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB