Analysis

  • max time kernel
    121s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:57

General

  • Target

    83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe

  • Size

    1.1MB

  • MD5

    4c7092414c3ba90d7e5dbec284dd7b54

  • SHA1

    4343a3b4a2dd4ef5b0446a59239d648df1ea9fcf

  • SHA256

    83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5

  • SHA512

    a35f11a97a1bf3442490841b58b9ae0070ad472a55f3e9962344b896aff511a931d91b5c217e77ec387314c7f27a55aec9b23c4d8191ee39d7cffb5b01010623

  • SSDEEP

    24576:8yW54f9AF2JNZYeckpBS6WJfAMw5KOT8D24niyL0P3:rWWiFYjYgpI6EfNMag

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe
    "C:\Users\Admin\AppData\Local\Temp\83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7325605.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7325605.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6972765.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6972765.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3542589.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3542589.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2320
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2228
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 268
                7⤵
                • Program crash
                PID:2576
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7325605.exe

    Filesize

    1.0MB

    MD5

    449e02f3602ecff95089be896cdfb2d4

    SHA1

    a1cf0f6f251efceb380a29768ad83159131c2076

    SHA256

    5d75794aa43599c7ea45d3d1f54878e767f6da99117d12d60c94ae9c93c21137

    SHA512

    1e9936de8175a862353941aaaa2f7763845f856a285a203df5e4a1c771dda32cbd96fcbd6736602aa4cf2aad62b66fa3a6343c258b3a7ae3d73ccdb808996926

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7325605.exe

    Filesize

    1.0MB

    MD5

    449e02f3602ecff95089be896cdfb2d4

    SHA1

    a1cf0f6f251efceb380a29768ad83159131c2076

    SHA256

    5d75794aa43599c7ea45d3d1f54878e767f6da99117d12d60c94ae9c93c21137

    SHA512

    1e9936de8175a862353941aaaa2f7763845f856a285a203df5e4a1c771dda32cbd96fcbd6736602aa4cf2aad62b66fa3a6343c258b3a7ae3d73ccdb808996926

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6972765.exe

    Filesize

    675KB

    MD5

    f9c1096f0c9901d6911e87c315e75f26

    SHA1

    2af6dcb3db808d81baa3db17d1180bd779673889

    SHA256

    45b5eddd24c1c06576925c78e4ab42b18c7ea1f986e408f72662dce61120ea7e

    SHA512

    f16db40778301a9096a0eee3849685f91e14feed4d139f9a2943ca2ebd2c9ae100dbdfdfe165e59de17b6ded7740d94051d2d3cfe22bc1ffc2ab3c27c1f6adef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6972765.exe

    Filesize

    675KB

    MD5

    f9c1096f0c9901d6911e87c315e75f26

    SHA1

    2af6dcb3db808d81baa3db17d1180bd779673889

    SHA256

    45b5eddd24c1c06576925c78e4ab42b18c7ea1f986e408f72662dce61120ea7e

    SHA512

    f16db40778301a9096a0eee3849685f91e14feed4d139f9a2943ca2ebd2c9ae100dbdfdfe165e59de17b6ded7740d94051d2d3cfe22bc1ffc2ab3c27c1f6adef

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3542589.exe

    Filesize

    509KB

    MD5

    a7ca398f0219e7acc6c11ea89b08fd87

    SHA1

    e29e22e7c865e25c81c2d17ae407fc6787aea826

    SHA256

    e1dd3944a1b31cc997e5e1d37dea7af0fb3d2f68e5227f328b6251ba855c3fd2

    SHA512

    bd5ae75191e632d0e3ba04941e513305e165df54eed60970dee78009bdd3ac1a88f3242722cc81630056758a1bca6ca77c1df0915d43878b9695228981c384bc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3542589.exe

    Filesize

    509KB

    MD5

    a7ca398f0219e7acc6c11ea89b08fd87

    SHA1

    e29e22e7c865e25c81c2d17ae407fc6787aea826

    SHA256

    e1dd3944a1b31cc997e5e1d37dea7af0fb3d2f68e5227f328b6251ba855c3fd2

    SHA512

    bd5ae75191e632d0e3ba04941e513305e165df54eed60970dee78009bdd3ac1a88f3242722cc81630056758a1bca6ca77c1df0915d43878b9695228981c384bc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7325605.exe

    Filesize

    1.0MB

    MD5

    449e02f3602ecff95089be896cdfb2d4

    SHA1

    a1cf0f6f251efceb380a29768ad83159131c2076

    SHA256

    5d75794aa43599c7ea45d3d1f54878e767f6da99117d12d60c94ae9c93c21137

    SHA512

    1e9936de8175a862353941aaaa2f7763845f856a285a203df5e4a1c771dda32cbd96fcbd6736602aa4cf2aad62b66fa3a6343c258b3a7ae3d73ccdb808996926

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7325605.exe

    Filesize

    1.0MB

    MD5

    449e02f3602ecff95089be896cdfb2d4

    SHA1

    a1cf0f6f251efceb380a29768ad83159131c2076

    SHA256

    5d75794aa43599c7ea45d3d1f54878e767f6da99117d12d60c94ae9c93c21137

    SHA512

    1e9936de8175a862353941aaaa2f7763845f856a285a203df5e4a1c771dda32cbd96fcbd6736602aa4cf2aad62b66fa3a6343c258b3a7ae3d73ccdb808996926

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6972765.exe

    Filesize

    675KB

    MD5

    f9c1096f0c9901d6911e87c315e75f26

    SHA1

    2af6dcb3db808d81baa3db17d1180bd779673889

    SHA256

    45b5eddd24c1c06576925c78e4ab42b18c7ea1f986e408f72662dce61120ea7e

    SHA512

    f16db40778301a9096a0eee3849685f91e14feed4d139f9a2943ca2ebd2c9ae100dbdfdfe165e59de17b6ded7740d94051d2d3cfe22bc1ffc2ab3c27c1f6adef

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6972765.exe

    Filesize

    675KB

    MD5

    f9c1096f0c9901d6911e87c315e75f26

    SHA1

    2af6dcb3db808d81baa3db17d1180bd779673889

    SHA256

    45b5eddd24c1c06576925c78e4ab42b18c7ea1f986e408f72662dce61120ea7e

    SHA512

    f16db40778301a9096a0eee3849685f91e14feed4d139f9a2943ca2ebd2c9ae100dbdfdfe165e59de17b6ded7740d94051d2d3cfe22bc1ffc2ab3c27c1f6adef

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3542589.exe

    Filesize

    509KB

    MD5

    a7ca398f0219e7acc6c11ea89b08fd87

    SHA1

    e29e22e7c865e25c81c2d17ae407fc6787aea826

    SHA256

    e1dd3944a1b31cc997e5e1d37dea7af0fb3d2f68e5227f328b6251ba855c3fd2

    SHA512

    bd5ae75191e632d0e3ba04941e513305e165df54eed60970dee78009bdd3ac1a88f3242722cc81630056758a1bca6ca77c1df0915d43878b9695228981c384bc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3542589.exe

    Filesize

    509KB

    MD5

    a7ca398f0219e7acc6c11ea89b08fd87

    SHA1

    e29e22e7c865e25c81c2d17ae407fc6787aea826

    SHA256

    e1dd3944a1b31cc997e5e1d37dea7af0fb3d2f68e5227f328b6251ba855c3fd2

    SHA512

    bd5ae75191e632d0e3ba04941e513305e165df54eed60970dee78009bdd3ac1a88f3242722cc81630056758a1bca6ca77c1df0915d43878b9695228981c384bc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe

    Filesize

    1016KB

    MD5

    26fee660f72c2edb8cc36cb5f65f6736

    SHA1

    b02afed7c54aa4221ae710632ed7023f35c2c93d

    SHA256

    9e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20

    SHA512

    9db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4

  • memory/2228-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2228-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2228-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2228-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2228-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2228-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2228-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2228-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2228-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2228-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB