Analysis

  • max time kernel
    120s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 08:34

General

  • Target

    75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe

  • Size

    1.1MB

  • MD5

    4d4ab373da2d7170b2ebb5789fe1b8c5

  • SHA1

    a67d00f36345463fb8c2f30596ef601b620f7683

  • SHA256

    75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5

  • SHA512

    83f84d41d7de0849d0fdaccca78c384cffa4fb679659dec4c65b285f3d592898ad16d77ef7fbebedf5525cd5a233a4a517363989a2743dbccd564c668ade2242

  • SSDEEP

    24576:nyljaxBG7KCicvm+3Vg9DZcCXKwvbOOtNXM84V519rtf:yljabG7KCflg9DZFvbjtNa59R

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe
    "C:\Users\Admin\AppData\Local\Temp\75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7433626.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7433626.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022475.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022475.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2529638.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2529638.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2640
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2532
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 268
                7⤵
                • Program crash
                PID:2528
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7433626.exe

    Filesize

    1.0MB

    MD5

    15924b11d2d2c455bc656e12d48be0bc

    SHA1

    eb47c1492fe6a8a71e51f40b6fadb7933d96c717

    SHA256

    35f474e21be0196a239bef9e2c4457abde03a2e1ec05da62ec7bdeed2a919012

    SHA512

    f509d1fd2a5c424eb05362ec2e62df996be9173fb346e4913552461c4fee92a47e5bd60fe84a686c6b18227d9faacaa27100b6173c0c78f892c7820a313507a1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7433626.exe

    Filesize

    1.0MB

    MD5

    15924b11d2d2c455bc656e12d48be0bc

    SHA1

    eb47c1492fe6a8a71e51f40b6fadb7933d96c717

    SHA256

    35f474e21be0196a239bef9e2c4457abde03a2e1ec05da62ec7bdeed2a919012

    SHA512

    f509d1fd2a5c424eb05362ec2e62df996be9173fb346e4913552461c4fee92a47e5bd60fe84a686c6b18227d9faacaa27100b6173c0c78f892c7820a313507a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022475.exe

    Filesize

    675KB

    MD5

    1466bb9b5db9bb64e368d8189d4e6f69

    SHA1

    c744af4cc8a4d98d71f7efb6f57df1d6457c43ea

    SHA256

    0f2e5ed751f05db830ca9872d97a3ae196dde110d57fa9b356f24e1d7bf6c4c1

    SHA512

    3bb9ba8a38dbd4591c3b3455568353a71156da51c2277edafd1085b6011b1ec99622f72afd31e50f889a80c3f574db42f7f26e72851a8d30e0dbda9fc9df2a7d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022475.exe

    Filesize

    675KB

    MD5

    1466bb9b5db9bb64e368d8189d4e6f69

    SHA1

    c744af4cc8a4d98d71f7efb6f57df1d6457c43ea

    SHA256

    0f2e5ed751f05db830ca9872d97a3ae196dde110d57fa9b356f24e1d7bf6c4c1

    SHA512

    3bb9ba8a38dbd4591c3b3455568353a71156da51c2277edafd1085b6011b1ec99622f72afd31e50f889a80c3f574db42f7f26e72851a8d30e0dbda9fc9df2a7d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2529638.exe

    Filesize

    509KB

    MD5

    e5f924acb1d3002d130dd311c04dd518

    SHA1

    3f5506a4339ac4f183b7dbc01454c893159ceb6d

    SHA256

    cae46e7211f6c94afa1808aa009ffab304b638b09d55a1f5b67087fba9c0cf27

    SHA512

    b00119a24d9a22809339408618bc4ec7a7b1e75da7719eee1098b0192178bd9c5d1996fdc551303debfd5b76746f78ce3f5f099a65e4658b67f738690da95cca

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2529638.exe

    Filesize

    509KB

    MD5

    e5f924acb1d3002d130dd311c04dd518

    SHA1

    3f5506a4339ac4f183b7dbc01454c893159ceb6d

    SHA256

    cae46e7211f6c94afa1808aa009ffab304b638b09d55a1f5b67087fba9c0cf27

    SHA512

    b00119a24d9a22809339408618bc4ec7a7b1e75da7719eee1098b0192178bd9c5d1996fdc551303debfd5b76746f78ce3f5f099a65e4658b67f738690da95cca

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7433626.exe

    Filesize

    1.0MB

    MD5

    15924b11d2d2c455bc656e12d48be0bc

    SHA1

    eb47c1492fe6a8a71e51f40b6fadb7933d96c717

    SHA256

    35f474e21be0196a239bef9e2c4457abde03a2e1ec05da62ec7bdeed2a919012

    SHA512

    f509d1fd2a5c424eb05362ec2e62df996be9173fb346e4913552461c4fee92a47e5bd60fe84a686c6b18227d9faacaa27100b6173c0c78f892c7820a313507a1

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7433626.exe

    Filesize

    1.0MB

    MD5

    15924b11d2d2c455bc656e12d48be0bc

    SHA1

    eb47c1492fe6a8a71e51f40b6fadb7933d96c717

    SHA256

    35f474e21be0196a239bef9e2c4457abde03a2e1ec05da62ec7bdeed2a919012

    SHA512

    f509d1fd2a5c424eb05362ec2e62df996be9173fb346e4913552461c4fee92a47e5bd60fe84a686c6b18227d9faacaa27100b6173c0c78f892c7820a313507a1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022475.exe

    Filesize

    675KB

    MD5

    1466bb9b5db9bb64e368d8189d4e6f69

    SHA1

    c744af4cc8a4d98d71f7efb6f57df1d6457c43ea

    SHA256

    0f2e5ed751f05db830ca9872d97a3ae196dde110d57fa9b356f24e1d7bf6c4c1

    SHA512

    3bb9ba8a38dbd4591c3b3455568353a71156da51c2277edafd1085b6011b1ec99622f72afd31e50f889a80c3f574db42f7f26e72851a8d30e0dbda9fc9df2a7d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022475.exe

    Filesize

    675KB

    MD5

    1466bb9b5db9bb64e368d8189d4e6f69

    SHA1

    c744af4cc8a4d98d71f7efb6f57df1d6457c43ea

    SHA256

    0f2e5ed751f05db830ca9872d97a3ae196dde110d57fa9b356f24e1d7bf6c4c1

    SHA512

    3bb9ba8a38dbd4591c3b3455568353a71156da51c2277edafd1085b6011b1ec99622f72afd31e50f889a80c3f574db42f7f26e72851a8d30e0dbda9fc9df2a7d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x2529638.exe

    Filesize

    509KB

    MD5

    e5f924acb1d3002d130dd311c04dd518

    SHA1

    3f5506a4339ac4f183b7dbc01454c893159ceb6d

    SHA256

    cae46e7211f6c94afa1808aa009ffab304b638b09d55a1f5b67087fba9c0cf27

    SHA512

    b00119a24d9a22809339408618bc4ec7a7b1e75da7719eee1098b0192178bd9c5d1996fdc551303debfd5b76746f78ce3f5f099a65e4658b67f738690da95cca

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x2529638.exe

    Filesize

    509KB

    MD5

    e5f924acb1d3002d130dd311c04dd518

    SHA1

    3f5506a4339ac4f183b7dbc01454c893159ceb6d

    SHA256

    cae46e7211f6c94afa1808aa009ffab304b638b09d55a1f5b67087fba9c0cf27

    SHA512

    b00119a24d9a22809339408618bc4ec7a7b1e75da7719eee1098b0192178bd9c5d1996fdc551303debfd5b76746f78ce3f5f099a65e4658b67f738690da95cca

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe

    Filesize

    1016KB

    MD5

    038bedf48ab213da7e0dd85ff86deba8

    SHA1

    10b59e56a9635ec01b5c886493ffd70ed2834153

    SHA256

    2f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a

    SHA512

    1337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080

  • memory/2532-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2532-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2532-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2532-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2532-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2532-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2532-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2532-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2532-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2532-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB