Analysis
-
max time kernel
240s -
max time network
282s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe
Resource
win10v2004-20230915-en
General
-
Target
1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe
-
Size
1.1MB
-
MD5
11dd5eeddd1c5a8eae4258a5ce11588b
-
SHA1
4d173b5e48d2a74cc63695b5f7bd1933285aea5d
-
SHA256
1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb
-
SHA512
c710bcf98a10285644d500f5b77257a4db745877ae1c79dd6ea877e8e49130ffdf21e0c947e3ac2c8742b163773d32deab6032fdf1ac47beb19f258d5d3db671
-
SSDEEP
24576:qyBkB3trTW4dv8USxrbXeB7MtzK4ZhpnjZDxDgL7u+qitIc:xBs3tra4dk1/Xi7MtGkhpnjZWL1qQI
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 8 IoCs
resource yara_rule behavioral1/memory/1324-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1324-51-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1324-53-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1324-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1324-58-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1324-60-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1324-64-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1324-66-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2592 x4835485.exe 1400 x5615539.exe 2468 x1377404.exe 2392 g8676483.exe -
Loads dropped DLL 13 IoCs
pid Process 2748 1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe 2592 x4835485.exe 2592 x4835485.exe 1400 x5615539.exe 1400 x5615539.exe 2468 x1377404.exe 2468 x1377404.exe 2468 x1377404.exe 2392 g8676483.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4835485.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5615539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1377404.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2392 set thread context of 1324 2392 g8676483.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 2704 2392 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2592 2748 1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe 28 PID 2748 wrote to memory of 2592 2748 1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe 28 PID 2748 wrote to memory of 2592 2748 1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe 28 PID 2748 wrote to memory of 2592 2748 1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe 28 PID 2748 wrote to memory of 2592 2748 1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe 28 PID 2748 wrote to memory of 2592 2748 1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe 28 PID 2748 wrote to memory of 2592 2748 1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe 28 PID 2592 wrote to memory of 1400 2592 x4835485.exe 29 PID 2592 wrote to memory of 1400 2592 x4835485.exe 29 PID 2592 wrote to memory of 1400 2592 x4835485.exe 29 PID 2592 wrote to memory of 1400 2592 x4835485.exe 29 PID 2592 wrote to memory of 1400 2592 x4835485.exe 29 PID 2592 wrote to memory of 1400 2592 x4835485.exe 29 PID 2592 wrote to memory of 1400 2592 x4835485.exe 29 PID 1400 wrote to memory of 2468 1400 x5615539.exe 30 PID 1400 wrote to memory of 2468 1400 x5615539.exe 30 PID 1400 wrote to memory of 2468 1400 x5615539.exe 30 PID 1400 wrote to memory of 2468 1400 x5615539.exe 30 PID 1400 wrote to memory of 2468 1400 x5615539.exe 30 PID 1400 wrote to memory of 2468 1400 x5615539.exe 30 PID 1400 wrote to memory of 2468 1400 x5615539.exe 30 PID 2468 wrote to memory of 2392 2468 x1377404.exe 31 PID 2468 wrote to memory of 2392 2468 x1377404.exe 31 PID 2468 wrote to memory of 2392 2468 x1377404.exe 31 PID 2468 wrote to memory of 2392 2468 x1377404.exe 31 PID 2468 wrote to memory of 2392 2468 x1377404.exe 31 PID 2468 wrote to memory of 2392 2468 x1377404.exe 31 PID 2468 wrote to memory of 2392 2468 x1377404.exe 31 PID 2392 wrote to memory of 2012 2392 g8676483.exe 33 PID 2392 wrote to memory of 2012 2392 g8676483.exe 33 PID 2392 wrote to memory of 2012 2392 g8676483.exe 33 PID 2392 wrote to memory of 2012 2392 g8676483.exe 33 PID 2392 wrote to memory of 2012 2392 g8676483.exe 33 PID 2392 wrote to memory of 2012 2392 g8676483.exe 33 PID 2392 wrote to memory of 2012 2392 g8676483.exe 33 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 1324 2392 g8676483.exe 34 PID 2392 wrote to memory of 2704 2392 g8676483.exe 35 PID 2392 wrote to memory of 2704 2392 g8676483.exe 35 PID 2392 wrote to memory of 2704 2392 g8676483.exe 35 PID 2392 wrote to memory of 2704 2392 g8676483.exe 35 PID 2392 wrote to memory of 2704 2392 g8676483.exe 35 PID 2392 wrote to memory of 2704 2392 g8676483.exe 35 PID 2392 wrote to memory of 2704 2392 g8676483.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe"C:\Users\Admin\AppData\Local\Temp\1cf0b6eb2f9c3e4d6260a541e3834d243a3247f2ec2610d955b75f94beb197fb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4835485.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4835485.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5615539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5615539.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1377404.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1377404.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8676483.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8676483.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:2704
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD52070369b448cae3833a28d0cbc099123
SHA1be0e0c90bd1f6b764b0be2b10eb47a4fd1d3d623
SHA2568763824be645d79f08f5c788c52e0ee02676024f70488791fc79e91875108f77
SHA512d868206ca468ba46eafc3575ad7ef4815211aad5ce3d0658b097878fddbf8c33fd6b5443d23232e8ce568c35b33e0a6f29f714da911324b8b91f809e2b49479d
-
Filesize
1.0MB
MD52070369b448cae3833a28d0cbc099123
SHA1be0e0c90bd1f6b764b0be2b10eb47a4fd1d3d623
SHA2568763824be645d79f08f5c788c52e0ee02676024f70488791fc79e91875108f77
SHA512d868206ca468ba46eafc3575ad7ef4815211aad5ce3d0658b097878fddbf8c33fd6b5443d23232e8ce568c35b33e0a6f29f714da911324b8b91f809e2b49479d
-
Filesize
675KB
MD56b4e32f26ea7058ca96e0864081ca6c8
SHA18242f15d37ce2f148871ca512f37a3ea960f2455
SHA2563d87dbb059f2c6c808715784b0419e88373d2af5e4e6b85211b1b0cffaa9f910
SHA512f1d3b4183d311a5c8662f618f20e38b7818459131ababcfc590b58a26d51f17396e538333728958a2aa1973dc3ce1cbaa9dadbfc8c2ac4c7c293c0f536ebba45
-
Filesize
675KB
MD56b4e32f26ea7058ca96e0864081ca6c8
SHA18242f15d37ce2f148871ca512f37a3ea960f2455
SHA2563d87dbb059f2c6c808715784b0419e88373d2af5e4e6b85211b1b0cffaa9f910
SHA512f1d3b4183d311a5c8662f618f20e38b7818459131ababcfc590b58a26d51f17396e538333728958a2aa1973dc3ce1cbaa9dadbfc8c2ac4c7c293c0f536ebba45
-
Filesize
509KB
MD5aa9fbc8bd6bb361cddf31396a6ce068d
SHA1f7e40930b9112f97ab1a621628528cbd7c8af4fd
SHA256865ae94a056ef600f73c201a68dc4b98f1ef0729c3d17abd406d46a250bd811d
SHA51211755cd5c2d396fd109b64db809eb9c23d2d8251ae2971f02554eda2e66041342090968ab4b49587210943514e2daf4950be2b0a409251d3d30e59a432df651c
-
Filesize
509KB
MD5aa9fbc8bd6bb361cddf31396a6ce068d
SHA1f7e40930b9112f97ab1a621628528cbd7c8af4fd
SHA256865ae94a056ef600f73c201a68dc4b98f1ef0729c3d17abd406d46a250bd811d
SHA51211755cd5c2d396fd109b64db809eb9c23d2d8251ae2971f02554eda2e66041342090968ab4b49587210943514e2daf4950be2b0a409251d3d30e59a432df651c
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff
-
Filesize
1.0MB
MD52070369b448cae3833a28d0cbc099123
SHA1be0e0c90bd1f6b764b0be2b10eb47a4fd1d3d623
SHA2568763824be645d79f08f5c788c52e0ee02676024f70488791fc79e91875108f77
SHA512d868206ca468ba46eafc3575ad7ef4815211aad5ce3d0658b097878fddbf8c33fd6b5443d23232e8ce568c35b33e0a6f29f714da911324b8b91f809e2b49479d
-
Filesize
1.0MB
MD52070369b448cae3833a28d0cbc099123
SHA1be0e0c90bd1f6b764b0be2b10eb47a4fd1d3d623
SHA2568763824be645d79f08f5c788c52e0ee02676024f70488791fc79e91875108f77
SHA512d868206ca468ba46eafc3575ad7ef4815211aad5ce3d0658b097878fddbf8c33fd6b5443d23232e8ce568c35b33e0a6f29f714da911324b8b91f809e2b49479d
-
Filesize
675KB
MD56b4e32f26ea7058ca96e0864081ca6c8
SHA18242f15d37ce2f148871ca512f37a3ea960f2455
SHA2563d87dbb059f2c6c808715784b0419e88373d2af5e4e6b85211b1b0cffaa9f910
SHA512f1d3b4183d311a5c8662f618f20e38b7818459131ababcfc590b58a26d51f17396e538333728958a2aa1973dc3ce1cbaa9dadbfc8c2ac4c7c293c0f536ebba45
-
Filesize
675KB
MD56b4e32f26ea7058ca96e0864081ca6c8
SHA18242f15d37ce2f148871ca512f37a3ea960f2455
SHA2563d87dbb059f2c6c808715784b0419e88373d2af5e4e6b85211b1b0cffaa9f910
SHA512f1d3b4183d311a5c8662f618f20e38b7818459131ababcfc590b58a26d51f17396e538333728958a2aa1973dc3ce1cbaa9dadbfc8c2ac4c7c293c0f536ebba45
-
Filesize
509KB
MD5aa9fbc8bd6bb361cddf31396a6ce068d
SHA1f7e40930b9112f97ab1a621628528cbd7c8af4fd
SHA256865ae94a056ef600f73c201a68dc4b98f1ef0729c3d17abd406d46a250bd811d
SHA51211755cd5c2d396fd109b64db809eb9c23d2d8251ae2971f02554eda2e66041342090968ab4b49587210943514e2daf4950be2b0a409251d3d30e59a432df651c
-
Filesize
509KB
MD5aa9fbc8bd6bb361cddf31396a6ce068d
SHA1f7e40930b9112f97ab1a621628528cbd7c8af4fd
SHA256865ae94a056ef600f73c201a68dc4b98f1ef0729c3d17abd406d46a250bd811d
SHA51211755cd5c2d396fd109b64db809eb9c23d2d8251ae2971f02554eda2e66041342090968ab4b49587210943514e2daf4950be2b0a409251d3d30e59a432df651c
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff
-
Filesize
1016KB
MD5f6dd0acbd8878a7733fe9406c640dae7
SHA113d258d04038e91059aceb86a024e25c426ffa26
SHA256584cc7470b9cbbf5045d7e2bee8d6d535e4f50a509eaa2eb34409a5bb1ab89f9
SHA5121a9ade14b6e99956a01fb3c0f21e92341a9f878ee51ae774dfe701f835a6c94c17cd444d78808afec84ce0ddca6e9bcd2981677f0ce3746d400b32e344117bff