Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 08:34
Static task
static1
Behavioral task
behavioral1
Sample
75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe
Resource
win10v2004-20230915-en
General
-
Target
75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe
-
Size
1.1MB
-
MD5
4d4ab373da2d7170b2ebb5789fe1b8c5
-
SHA1
a67d00f36345463fb8c2f30596ef601b620f7683
-
SHA256
75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5
-
SHA512
83f84d41d7de0849d0fdaccca78c384cffa4fb679659dec4c65b285f3d592898ad16d77ef7fbebedf5525cd5a233a4a517363989a2743dbccd564c668ade2242
-
SSDEEP
24576:nyljaxBG7KCicvm+3Vg9DZcCXKwvbOOtNXM84V519rtf:yljabG7KCflg9DZFvbjtNa59R
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2532-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2532-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2532-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2532-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2532-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2532-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2372 x7433626.exe 2652 x0022475.exe 2812 x2529638.exe 2640 g6650455.exe -
Loads dropped DLL 13 IoCs
pid Process 1368 75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe 2372 x7433626.exe 2372 x7433626.exe 2652 x0022475.exe 2652 x0022475.exe 2812 x2529638.exe 2812 x2529638.exe 2812 x2529638.exe 2640 g6650455.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe 2512 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0022475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2529638.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7433626.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2640 set thread context of 2532 2640 g6650455.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2512 2640 WerFault.exe 31 2528 2532 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2372 1368 75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe 28 PID 1368 wrote to memory of 2372 1368 75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe 28 PID 1368 wrote to memory of 2372 1368 75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe 28 PID 1368 wrote to memory of 2372 1368 75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe 28 PID 1368 wrote to memory of 2372 1368 75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe 28 PID 1368 wrote to memory of 2372 1368 75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe 28 PID 1368 wrote to memory of 2372 1368 75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe 28 PID 2372 wrote to memory of 2652 2372 x7433626.exe 29 PID 2372 wrote to memory of 2652 2372 x7433626.exe 29 PID 2372 wrote to memory of 2652 2372 x7433626.exe 29 PID 2372 wrote to memory of 2652 2372 x7433626.exe 29 PID 2372 wrote to memory of 2652 2372 x7433626.exe 29 PID 2372 wrote to memory of 2652 2372 x7433626.exe 29 PID 2372 wrote to memory of 2652 2372 x7433626.exe 29 PID 2652 wrote to memory of 2812 2652 x0022475.exe 30 PID 2652 wrote to memory of 2812 2652 x0022475.exe 30 PID 2652 wrote to memory of 2812 2652 x0022475.exe 30 PID 2652 wrote to memory of 2812 2652 x0022475.exe 30 PID 2652 wrote to memory of 2812 2652 x0022475.exe 30 PID 2652 wrote to memory of 2812 2652 x0022475.exe 30 PID 2652 wrote to memory of 2812 2652 x0022475.exe 30 PID 2812 wrote to memory of 2640 2812 x2529638.exe 31 PID 2812 wrote to memory of 2640 2812 x2529638.exe 31 PID 2812 wrote to memory of 2640 2812 x2529638.exe 31 PID 2812 wrote to memory of 2640 2812 x2529638.exe 31 PID 2812 wrote to memory of 2640 2812 x2529638.exe 31 PID 2812 wrote to memory of 2640 2812 x2529638.exe 31 PID 2812 wrote to memory of 2640 2812 x2529638.exe 31 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2532 2640 g6650455.exe 33 PID 2640 wrote to memory of 2512 2640 g6650455.exe 34 PID 2640 wrote to memory of 2512 2640 g6650455.exe 34 PID 2640 wrote to memory of 2512 2640 g6650455.exe 34 PID 2640 wrote to memory of 2512 2640 g6650455.exe 34 PID 2640 wrote to memory of 2512 2640 g6650455.exe 34 PID 2640 wrote to memory of 2512 2640 g6650455.exe 34 PID 2640 wrote to memory of 2512 2640 g6650455.exe 34 PID 2532 wrote to memory of 2528 2532 AppLaunch.exe 35 PID 2532 wrote to memory of 2528 2532 AppLaunch.exe 35 PID 2532 wrote to memory of 2528 2532 AppLaunch.exe 35 PID 2532 wrote to memory of 2528 2532 AppLaunch.exe 35 PID 2532 wrote to memory of 2528 2532 AppLaunch.exe 35 PID 2532 wrote to memory of 2528 2532 AppLaunch.exe 35 PID 2532 wrote to memory of 2528 2532 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe"C:\Users\Admin\AppData\Local\Temp\75bc651b81daed0a35e1587e59c867610a31cb3e0b8423325e0322739a6fb2b5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7433626.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7433626.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022475.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0022475.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2529638.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2529638.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6650455.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 2687⤵
- Program crash
PID:2528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2512
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD515924b11d2d2c455bc656e12d48be0bc
SHA1eb47c1492fe6a8a71e51f40b6fadb7933d96c717
SHA25635f474e21be0196a239bef9e2c4457abde03a2e1ec05da62ec7bdeed2a919012
SHA512f509d1fd2a5c424eb05362ec2e62df996be9173fb346e4913552461c4fee92a47e5bd60fe84a686c6b18227d9faacaa27100b6173c0c78f892c7820a313507a1
-
Filesize
1.0MB
MD515924b11d2d2c455bc656e12d48be0bc
SHA1eb47c1492fe6a8a71e51f40b6fadb7933d96c717
SHA25635f474e21be0196a239bef9e2c4457abde03a2e1ec05da62ec7bdeed2a919012
SHA512f509d1fd2a5c424eb05362ec2e62df996be9173fb346e4913552461c4fee92a47e5bd60fe84a686c6b18227d9faacaa27100b6173c0c78f892c7820a313507a1
-
Filesize
675KB
MD51466bb9b5db9bb64e368d8189d4e6f69
SHA1c744af4cc8a4d98d71f7efb6f57df1d6457c43ea
SHA2560f2e5ed751f05db830ca9872d97a3ae196dde110d57fa9b356f24e1d7bf6c4c1
SHA5123bb9ba8a38dbd4591c3b3455568353a71156da51c2277edafd1085b6011b1ec99622f72afd31e50f889a80c3f574db42f7f26e72851a8d30e0dbda9fc9df2a7d
-
Filesize
675KB
MD51466bb9b5db9bb64e368d8189d4e6f69
SHA1c744af4cc8a4d98d71f7efb6f57df1d6457c43ea
SHA2560f2e5ed751f05db830ca9872d97a3ae196dde110d57fa9b356f24e1d7bf6c4c1
SHA5123bb9ba8a38dbd4591c3b3455568353a71156da51c2277edafd1085b6011b1ec99622f72afd31e50f889a80c3f574db42f7f26e72851a8d30e0dbda9fc9df2a7d
-
Filesize
509KB
MD5e5f924acb1d3002d130dd311c04dd518
SHA13f5506a4339ac4f183b7dbc01454c893159ceb6d
SHA256cae46e7211f6c94afa1808aa009ffab304b638b09d55a1f5b67087fba9c0cf27
SHA512b00119a24d9a22809339408618bc4ec7a7b1e75da7719eee1098b0192178bd9c5d1996fdc551303debfd5b76746f78ce3f5f099a65e4658b67f738690da95cca
-
Filesize
509KB
MD5e5f924acb1d3002d130dd311c04dd518
SHA13f5506a4339ac4f183b7dbc01454c893159ceb6d
SHA256cae46e7211f6c94afa1808aa009ffab304b638b09d55a1f5b67087fba9c0cf27
SHA512b00119a24d9a22809339408618bc4ec7a7b1e75da7719eee1098b0192178bd9c5d1996fdc551303debfd5b76746f78ce3f5f099a65e4658b67f738690da95cca
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080
-
Filesize
1.0MB
MD515924b11d2d2c455bc656e12d48be0bc
SHA1eb47c1492fe6a8a71e51f40b6fadb7933d96c717
SHA25635f474e21be0196a239bef9e2c4457abde03a2e1ec05da62ec7bdeed2a919012
SHA512f509d1fd2a5c424eb05362ec2e62df996be9173fb346e4913552461c4fee92a47e5bd60fe84a686c6b18227d9faacaa27100b6173c0c78f892c7820a313507a1
-
Filesize
1.0MB
MD515924b11d2d2c455bc656e12d48be0bc
SHA1eb47c1492fe6a8a71e51f40b6fadb7933d96c717
SHA25635f474e21be0196a239bef9e2c4457abde03a2e1ec05da62ec7bdeed2a919012
SHA512f509d1fd2a5c424eb05362ec2e62df996be9173fb346e4913552461c4fee92a47e5bd60fe84a686c6b18227d9faacaa27100b6173c0c78f892c7820a313507a1
-
Filesize
675KB
MD51466bb9b5db9bb64e368d8189d4e6f69
SHA1c744af4cc8a4d98d71f7efb6f57df1d6457c43ea
SHA2560f2e5ed751f05db830ca9872d97a3ae196dde110d57fa9b356f24e1d7bf6c4c1
SHA5123bb9ba8a38dbd4591c3b3455568353a71156da51c2277edafd1085b6011b1ec99622f72afd31e50f889a80c3f574db42f7f26e72851a8d30e0dbda9fc9df2a7d
-
Filesize
675KB
MD51466bb9b5db9bb64e368d8189d4e6f69
SHA1c744af4cc8a4d98d71f7efb6f57df1d6457c43ea
SHA2560f2e5ed751f05db830ca9872d97a3ae196dde110d57fa9b356f24e1d7bf6c4c1
SHA5123bb9ba8a38dbd4591c3b3455568353a71156da51c2277edafd1085b6011b1ec99622f72afd31e50f889a80c3f574db42f7f26e72851a8d30e0dbda9fc9df2a7d
-
Filesize
509KB
MD5e5f924acb1d3002d130dd311c04dd518
SHA13f5506a4339ac4f183b7dbc01454c893159ceb6d
SHA256cae46e7211f6c94afa1808aa009ffab304b638b09d55a1f5b67087fba9c0cf27
SHA512b00119a24d9a22809339408618bc4ec7a7b1e75da7719eee1098b0192178bd9c5d1996fdc551303debfd5b76746f78ce3f5f099a65e4658b67f738690da95cca
-
Filesize
509KB
MD5e5f924acb1d3002d130dd311c04dd518
SHA13f5506a4339ac4f183b7dbc01454c893159ceb6d
SHA256cae46e7211f6c94afa1808aa009ffab304b638b09d55a1f5b67087fba9c0cf27
SHA512b00119a24d9a22809339408618bc4ec7a7b1e75da7719eee1098b0192178bd9c5d1996fdc551303debfd5b76746f78ce3f5f099a65e4658b67f738690da95cca
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080
-
Filesize
1016KB
MD5038bedf48ab213da7e0dd85ff86deba8
SHA110b59e56a9635ec01b5c886493ffd70ed2834153
SHA2562f6e629321680f5e674bc7c0c6dbefb8e2639b0e63e1065b29eca447a925223a
SHA5121337b7b2ad6732cf94241e87b9bcce35f3cd9bb33865377f1fcbba0b3bc308a39aeaf45e631e61a2a512d8d0bbf2a044139255396930b1c70d8c5d22617d9080