Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 07:57
Static task
static1
Behavioral task
behavioral1
Sample
83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe
Resource
win10v2004-20230915-en
General
-
Target
83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe
-
Size
1.1MB
-
MD5
4c7092414c3ba90d7e5dbec284dd7b54
-
SHA1
4343a3b4a2dd4ef5b0446a59239d648df1ea9fcf
-
SHA256
83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5
-
SHA512
a35f11a97a1bf3442490841b58b9ae0070ad472a55f3e9962344b896aff511a931d91b5c217e77ec387314c7f27a55aec9b23c4d8191ee39d7cffb5b01010623
-
SSDEEP
24576:8yW54f9AF2JNZYeckpBS6WJfAMw5KOT8D24niyL0P3:rWWiFYjYgpI6EfNMag
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2228-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2228-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2228-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2228-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2228-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2228-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
Processes:
x7325605.exex6972765.exex3542589.exeg6096620.exepid process 2804 x7325605.exe 2592 x6972765.exe 2748 x3542589.exe 2320 g6096620.exe -
Loads dropped DLL 13 IoCs
Processes:
83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exex7325605.exex6972765.exex3542589.exeg6096620.exeWerFault.exepid process 1732 83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe 2804 x7325605.exe 2804 x7325605.exe 2592 x6972765.exe 2592 x6972765.exe 2748 x3542589.exe 2748 x3542589.exe 2748 x3542589.exe 2320 g6096620.exe 1328 WerFault.exe 1328 WerFault.exe 1328 WerFault.exe 1328 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
x3542589.exe83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exex7325605.exex6972765.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3542589.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7325605.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6972765.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g6096620.exedescription pid process target process PID 2320 set thread context of 2228 2320 g6096620.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1328 2320 WerFault.exe g6096620.exe 2576 2228 WerFault.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exex7325605.exex6972765.exex3542589.exeg6096620.exeAppLaunch.exedescription pid process target process PID 1732 wrote to memory of 2804 1732 83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe x7325605.exe PID 1732 wrote to memory of 2804 1732 83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe x7325605.exe PID 1732 wrote to memory of 2804 1732 83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe x7325605.exe PID 1732 wrote to memory of 2804 1732 83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe x7325605.exe PID 1732 wrote to memory of 2804 1732 83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe x7325605.exe PID 1732 wrote to memory of 2804 1732 83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe x7325605.exe PID 1732 wrote to memory of 2804 1732 83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe x7325605.exe PID 2804 wrote to memory of 2592 2804 x7325605.exe x6972765.exe PID 2804 wrote to memory of 2592 2804 x7325605.exe x6972765.exe PID 2804 wrote to memory of 2592 2804 x7325605.exe x6972765.exe PID 2804 wrote to memory of 2592 2804 x7325605.exe x6972765.exe PID 2804 wrote to memory of 2592 2804 x7325605.exe x6972765.exe PID 2804 wrote to memory of 2592 2804 x7325605.exe x6972765.exe PID 2804 wrote to memory of 2592 2804 x7325605.exe x6972765.exe PID 2592 wrote to memory of 2748 2592 x6972765.exe x3542589.exe PID 2592 wrote to memory of 2748 2592 x6972765.exe x3542589.exe PID 2592 wrote to memory of 2748 2592 x6972765.exe x3542589.exe PID 2592 wrote to memory of 2748 2592 x6972765.exe x3542589.exe PID 2592 wrote to memory of 2748 2592 x6972765.exe x3542589.exe PID 2592 wrote to memory of 2748 2592 x6972765.exe x3542589.exe PID 2592 wrote to memory of 2748 2592 x6972765.exe x3542589.exe PID 2748 wrote to memory of 2320 2748 x3542589.exe g6096620.exe PID 2748 wrote to memory of 2320 2748 x3542589.exe g6096620.exe PID 2748 wrote to memory of 2320 2748 x3542589.exe g6096620.exe PID 2748 wrote to memory of 2320 2748 x3542589.exe g6096620.exe PID 2748 wrote to memory of 2320 2748 x3542589.exe g6096620.exe PID 2748 wrote to memory of 2320 2748 x3542589.exe g6096620.exe PID 2748 wrote to memory of 2320 2748 x3542589.exe g6096620.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 2228 2320 g6096620.exe AppLaunch.exe PID 2320 wrote to memory of 1328 2320 g6096620.exe WerFault.exe PID 2320 wrote to memory of 1328 2320 g6096620.exe WerFault.exe PID 2320 wrote to memory of 1328 2320 g6096620.exe WerFault.exe PID 2320 wrote to memory of 1328 2320 g6096620.exe WerFault.exe PID 2320 wrote to memory of 1328 2320 g6096620.exe WerFault.exe PID 2320 wrote to memory of 1328 2320 g6096620.exe WerFault.exe PID 2320 wrote to memory of 1328 2320 g6096620.exe WerFault.exe PID 2228 wrote to memory of 2576 2228 AppLaunch.exe WerFault.exe PID 2228 wrote to memory of 2576 2228 AppLaunch.exe WerFault.exe PID 2228 wrote to memory of 2576 2228 AppLaunch.exe WerFault.exe PID 2228 wrote to memory of 2576 2228 AppLaunch.exe WerFault.exe PID 2228 wrote to memory of 2576 2228 AppLaunch.exe WerFault.exe PID 2228 wrote to memory of 2576 2228 AppLaunch.exe WerFault.exe PID 2228 wrote to memory of 2576 2228 AppLaunch.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe"C:\Users\Admin\AppData\Local\Temp\83bb9757e5712811fbc18c52bde663b1fc8bf76d2ce7d983a9865373407b5bd5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7325605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7325605.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6972765.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6972765.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3542589.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3542589.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6096620.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 2687⤵
- Program crash
PID:2576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:1328
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5449e02f3602ecff95089be896cdfb2d4
SHA1a1cf0f6f251efceb380a29768ad83159131c2076
SHA2565d75794aa43599c7ea45d3d1f54878e767f6da99117d12d60c94ae9c93c21137
SHA5121e9936de8175a862353941aaaa2f7763845f856a285a203df5e4a1c771dda32cbd96fcbd6736602aa4cf2aad62b66fa3a6343c258b3a7ae3d73ccdb808996926
-
Filesize
1.0MB
MD5449e02f3602ecff95089be896cdfb2d4
SHA1a1cf0f6f251efceb380a29768ad83159131c2076
SHA2565d75794aa43599c7ea45d3d1f54878e767f6da99117d12d60c94ae9c93c21137
SHA5121e9936de8175a862353941aaaa2f7763845f856a285a203df5e4a1c771dda32cbd96fcbd6736602aa4cf2aad62b66fa3a6343c258b3a7ae3d73ccdb808996926
-
Filesize
675KB
MD5f9c1096f0c9901d6911e87c315e75f26
SHA12af6dcb3db808d81baa3db17d1180bd779673889
SHA25645b5eddd24c1c06576925c78e4ab42b18c7ea1f986e408f72662dce61120ea7e
SHA512f16db40778301a9096a0eee3849685f91e14feed4d139f9a2943ca2ebd2c9ae100dbdfdfe165e59de17b6ded7740d94051d2d3cfe22bc1ffc2ab3c27c1f6adef
-
Filesize
675KB
MD5f9c1096f0c9901d6911e87c315e75f26
SHA12af6dcb3db808d81baa3db17d1180bd779673889
SHA25645b5eddd24c1c06576925c78e4ab42b18c7ea1f986e408f72662dce61120ea7e
SHA512f16db40778301a9096a0eee3849685f91e14feed4d139f9a2943ca2ebd2c9ae100dbdfdfe165e59de17b6ded7740d94051d2d3cfe22bc1ffc2ab3c27c1f6adef
-
Filesize
509KB
MD5a7ca398f0219e7acc6c11ea89b08fd87
SHA1e29e22e7c865e25c81c2d17ae407fc6787aea826
SHA256e1dd3944a1b31cc997e5e1d37dea7af0fb3d2f68e5227f328b6251ba855c3fd2
SHA512bd5ae75191e632d0e3ba04941e513305e165df54eed60970dee78009bdd3ac1a88f3242722cc81630056758a1bca6ca77c1df0915d43878b9695228981c384bc
-
Filesize
509KB
MD5a7ca398f0219e7acc6c11ea89b08fd87
SHA1e29e22e7c865e25c81c2d17ae407fc6787aea826
SHA256e1dd3944a1b31cc997e5e1d37dea7af0fb3d2f68e5227f328b6251ba855c3fd2
SHA512bd5ae75191e632d0e3ba04941e513305e165df54eed60970dee78009bdd3ac1a88f3242722cc81630056758a1bca6ca77c1df0915d43878b9695228981c384bc
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4
-
Filesize
1.0MB
MD5449e02f3602ecff95089be896cdfb2d4
SHA1a1cf0f6f251efceb380a29768ad83159131c2076
SHA2565d75794aa43599c7ea45d3d1f54878e767f6da99117d12d60c94ae9c93c21137
SHA5121e9936de8175a862353941aaaa2f7763845f856a285a203df5e4a1c771dda32cbd96fcbd6736602aa4cf2aad62b66fa3a6343c258b3a7ae3d73ccdb808996926
-
Filesize
1.0MB
MD5449e02f3602ecff95089be896cdfb2d4
SHA1a1cf0f6f251efceb380a29768ad83159131c2076
SHA2565d75794aa43599c7ea45d3d1f54878e767f6da99117d12d60c94ae9c93c21137
SHA5121e9936de8175a862353941aaaa2f7763845f856a285a203df5e4a1c771dda32cbd96fcbd6736602aa4cf2aad62b66fa3a6343c258b3a7ae3d73ccdb808996926
-
Filesize
675KB
MD5f9c1096f0c9901d6911e87c315e75f26
SHA12af6dcb3db808d81baa3db17d1180bd779673889
SHA25645b5eddd24c1c06576925c78e4ab42b18c7ea1f986e408f72662dce61120ea7e
SHA512f16db40778301a9096a0eee3849685f91e14feed4d139f9a2943ca2ebd2c9ae100dbdfdfe165e59de17b6ded7740d94051d2d3cfe22bc1ffc2ab3c27c1f6adef
-
Filesize
675KB
MD5f9c1096f0c9901d6911e87c315e75f26
SHA12af6dcb3db808d81baa3db17d1180bd779673889
SHA25645b5eddd24c1c06576925c78e4ab42b18c7ea1f986e408f72662dce61120ea7e
SHA512f16db40778301a9096a0eee3849685f91e14feed4d139f9a2943ca2ebd2c9ae100dbdfdfe165e59de17b6ded7740d94051d2d3cfe22bc1ffc2ab3c27c1f6adef
-
Filesize
509KB
MD5a7ca398f0219e7acc6c11ea89b08fd87
SHA1e29e22e7c865e25c81c2d17ae407fc6787aea826
SHA256e1dd3944a1b31cc997e5e1d37dea7af0fb3d2f68e5227f328b6251ba855c3fd2
SHA512bd5ae75191e632d0e3ba04941e513305e165df54eed60970dee78009bdd3ac1a88f3242722cc81630056758a1bca6ca77c1df0915d43878b9695228981c384bc
-
Filesize
509KB
MD5a7ca398f0219e7acc6c11ea89b08fd87
SHA1e29e22e7c865e25c81c2d17ae407fc6787aea826
SHA256e1dd3944a1b31cc997e5e1d37dea7af0fb3d2f68e5227f328b6251ba855c3fd2
SHA512bd5ae75191e632d0e3ba04941e513305e165df54eed60970dee78009bdd3ac1a88f3242722cc81630056758a1bca6ca77c1df0915d43878b9695228981c384bc
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4
-
Filesize
1016KB
MD526fee660f72c2edb8cc36cb5f65f6736
SHA1b02afed7c54aa4221ae710632ed7023f35c2c93d
SHA2569e57e604b313a744ee4a1e4ef1b966c35a1bf599c4232d01da162b925dd8fe20
SHA5129db7eb286e54b10592b748bb9b08e05a2028353abf8c9f5147107da11477ef0645e0aeb53d15da426dd6df9895247c101d5cd603af1d804408cb4110e119fde4