Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe
Resource
win10v2004-20230915-en
General
-
Target
d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe
-
Size
907KB
-
MD5
e5f2b60898dda7246f58187276ff5f63
-
SHA1
39c709cbe3fc1e4b5fc53fdcab4c700cacdf3fde
-
SHA256
d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326
-
SHA512
372a9b4fdb19ca96dcf3359610a1e1b50bc14d7c53b547f7b3fca7f990fc9bd2248841fb4db75440a5209f962a74aed731358f36a1a4079bdd7121c8392c043c
-
SSDEEP
24576:/ybU3wRjN9OmnKAaR8WC4Pof0GXKgt/xUpx9MPoJq:Kwg39CyIPoXKgt/xAx9PJ
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2636-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2636-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2636-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2636-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2636-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2636-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2460 x3201225.exe 2192 x3297344.exe 2368 x3531242.exe 2760 g0399034.exe -
Loads dropped DLL 13 IoCs
pid Process 2260 d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe 2460 x3201225.exe 2460 x3201225.exe 2192 x3297344.exe 2192 x3297344.exe 2368 x3531242.exe 2368 x3531242.exe 2368 x3531242.exe 2760 g0399034.exe 2964 WerFault.exe 2964 WerFault.exe 2964 WerFault.exe 2964 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3531242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3201225.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3297344.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2760 set thread context of 2636 2760 g0399034.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2964 2760 WerFault.exe 31 2280 2636 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2460 2260 d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe 28 PID 2260 wrote to memory of 2460 2260 d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe 28 PID 2260 wrote to memory of 2460 2260 d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe 28 PID 2260 wrote to memory of 2460 2260 d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe 28 PID 2260 wrote to memory of 2460 2260 d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe 28 PID 2260 wrote to memory of 2460 2260 d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe 28 PID 2260 wrote to memory of 2460 2260 d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe 28 PID 2460 wrote to memory of 2192 2460 x3201225.exe 29 PID 2460 wrote to memory of 2192 2460 x3201225.exe 29 PID 2460 wrote to memory of 2192 2460 x3201225.exe 29 PID 2460 wrote to memory of 2192 2460 x3201225.exe 29 PID 2460 wrote to memory of 2192 2460 x3201225.exe 29 PID 2460 wrote to memory of 2192 2460 x3201225.exe 29 PID 2460 wrote to memory of 2192 2460 x3201225.exe 29 PID 2192 wrote to memory of 2368 2192 x3297344.exe 30 PID 2192 wrote to memory of 2368 2192 x3297344.exe 30 PID 2192 wrote to memory of 2368 2192 x3297344.exe 30 PID 2192 wrote to memory of 2368 2192 x3297344.exe 30 PID 2192 wrote to memory of 2368 2192 x3297344.exe 30 PID 2192 wrote to memory of 2368 2192 x3297344.exe 30 PID 2192 wrote to memory of 2368 2192 x3297344.exe 30 PID 2368 wrote to memory of 2760 2368 x3531242.exe 31 PID 2368 wrote to memory of 2760 2368 x3531242.exe 31 PID 2368 wrote to memory of 2760 2368 x3531242.exe 31 PID 2368 wrote to memory of 2760 2368 x3531242.exe 31 PID 2368 wrote to memory of 2760 2368 x3531242.exe 31 PID 2368 wrote to memory of 2760 2368 x3531242.exe 31 PID 2368 wrote to memory of 2760 2368 x3531242.exe 31 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2760 wrote to memory of 2636 2760 g0399034.exe 32 PID 2636 wrote to memory of 2280 2636 AppLaunch.exe 34 PID 2636 wrote to memory of 2280 2636 AppLaunch.exe 34 PID 2636 wrote to memory of 2280 2636 AppLaunch.exe 34 PID 2636 wrote to memory of 2280 2636 AppLaunch.exe 34 PID 2636 wrote to memory of 2280 2636 AppLaunch.exe 34 PID 2636 wrote to memory of 2280 2636 AppLaunch.exe 34 PID 2636 wrote to memory of 2280 2636 AppLaunch.exe 34 PID 2760 wrote to memory of 2964 2760 g0399034.exe 33 PID 2760 wrote to memory of 2964 2760 g0399034.exe 33 PID 2760 wrote to memory of 2964 2760 g0399034.exe 33 PID 2760 wrote to memory of 2964 2760 g0399034.exe 33 PID 2760 wrote to memory of 2964 2760 g0399034.exe 33 PID 2760 wrote to memory of 2964 2760 g0399034.exe 33 PID 2760 wrote to memory of 2964 2760 g0399034.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe"C:\Users\Admin\AppData\Local\Temp\d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3201225.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3201225.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3297344.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3297344.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3531242.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3531242.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 2687⤵
- Program crash
PID:2280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2964
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD5d78b7ab70d99c56e732e31dec295432e
SHA1155cc3a76e2ad447bdd5985dd5c28b7fd17bb49d
SHA256cd02977d5bc5aa0df801e4a92e4d0874f5915a72aaac51d7a2128a9317c2c4f6
SHA512e65e96508d2c66daf9b21cffe716f1b3530fee3aa89533be75ebed07879213e4f904a9e1134c9486aca21dd6340f1ec2e43995cc194df31e696d8c0c1db64df0
-
Filesize
805KB
MD5d78b7ab70d99c56e732e31dec295432e
SHA1155cc3a76e2ad447bdd5985dd5c28b7fd17bb49d
SHA256cd02977d5bc5aa0df801e4a92e4d0874f5915a72aaac51d7a2128a9317c2c4f6
SHA512e65e96508d2c66daf9b21cffe716f1b3530fee3aa89533be75ebed07879213e4f904a9e1134c9486aca21dd6340f1ec2e43995cc194df31e696d8c0c1db64df0
-
Filesize
545KB
MD5734d36a6ec936a5b0f79bc75412f5e3e
SHA189741899652f194b1b0699d6cea738fee1d37ede
SHA256351425c4f9f66de3f2de9a3bed3bea5e560045ee5c4b485f5fad0826a37c2948
SHA5128e589d6b75a4268794078a33e7c30980cf2a41114436aa226e2b9e4b5f85a9f973038cea8bbda50a20dd7f64a992081ca999c1dcead9f72b8188abad8bd41e4e
-
Filesize
545KB
MD5734d36a6ec936a5b0f79bc75412f5e3e
SHA189741899652f194b1b0699d6cea738fee1d37ede
SHA256351425c4f9f66de3f2de9a3bed3bea5e560045ee5c4b485f5fad0826a37c2948
SHA5128e589d6b75a4268794078a33e7c30980cf2a41114436aa226e2b9e4b5f85a9f973038cea8bbda50a20dd7f64a992081ca999c1dcead9f72b8188abad8bd41e4e
-
Filesize
379KB
MD54c72378e3f22f8de3ee334eb223f709d
SHA17a54cdcff09d28e76869d2c678754e0a22ab3e58
SHA2567284eabcebe5577b2adabdd4957f513efeecf134e67f5f0eef34acf854b5f0c7
SHA512e7e7aff25cc22da197b41a98f83a4d057ab36a7b1ae880d02d0737258aa53b8cd0fb5cb93ea105a355b6e6feae2ea9e1d3e556fca6d4194df9c7ecebc5233b8d
-
Filesize
379KB
MD54c72378e3f22f8de3ee334eb223f709d
SHA17a54cdcff09d28e76869d2c678754e0a22ab3e58
SHA2567284eabcebe5577b2adabdd4957f513efeecf134e67f5f0eef34acf854b5f0c7
SHA512e7e7aff25cc22da197b41a98f83a4d057ab36a7b1ae880d02d0737258aa53b8cd0fb5cb93ea105a355b6e6feae2ea9e1d3e556fca6d4194df9c7ecebc5233b8d
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3
-
Filesize
805KB
MD5d78b7ab70d99c56e732e31dec295432e
SHA1155cc3a76e2ad447bdd5985dd5c28b7fd17bb49d
SHA256cd02977d5bc5aa0df801e4a92e4d0874f5915a72aaac51d7a2128a9317c2c4f6
SHA512e65e96508d2c66daf9b21cffe716f1b3530fee3aa89533be75ebed07879213e4f904a9e1134c9486aca21dd6340f1ec2e43995cc194df31e696d8c0c1db64df0
-
Filesize
805KB
MD5d78b7ab70d99c56e732e31dec295432e
SHA1155cc3a76e2ad447bdd5985dd5c28b7fd17bb49d
SHA256cd02977d5bc5aa0df801e4a92e4d0874f5915a72aaac51d7a2128a9317c2c4f6
SHA512e65e96508d2c66daf9b21cffe716f1b3530fee3aa89533be75ebed07879213e4f904a9e1134c9486aca21dd6340f1ec2e43995cc194df31e696d8c0c1db64df0
-
Filesize
545KB
MD5734d36a6ec936a5b0f79bc75412f5e3e
SHA189741899652f194b1b0699d6cea738fee1d37ede
SHA256351425c4f9f66de3f2de9a3bed3bea5e560045ee5c4b485f5fad0826a37c2948
SHA5128e589d6b75a4268794078a33e7c30980cf2a41114436aa226e2b9e4b5f85a9f973038cea8bbda50a20dd7f64a992081ca999c1dcead9f72b8188abad8bd41e4e
-
Filesize
545KB
MD5734d36a6ec936a5b0f79bc75412f5e3e
SHA189741899652f194b1b0699d6cea738fee1d37ede
SHA256351425c4f9f66de3f2de9a3bed3bea5e560045ee5c4b485f5fad0826a37c2948
SHA5128e589d6b75a4268794078a33e7c30980cf2a41114436aa226e2b9e4b5f85a9f973038cea8bbda50a20dd7f64a992081ca999c1dcead9f72b8188abad8bd41e4e
-
Filesize
379KB
MD54c72378e3f22f8de3ee334eb223f709d
SHA17a54cdcff09d28e76869d2c678754e0a22ab3e58
SHA2567284eabcebe5577b2adabdd4957f513efeecf134e67f5f0eef34acf854b5f0c7
SHA512e7e7aff25cc22da197b41a98f83a4d057ab36a7b1ae880d02d0737258aa53b8cd0fb5cb93ea105a355b6e6feae2ea9e1d3e556fca6d4194df9c7ecebc5233b8d
-
Filesize
379KB
MD54c72378e3f22f8de3ee334eb223f709d
SHA17a54cdcff09d28e76869d2c678754e0a22ab3e58
SHA2567284eabcebe5577b2adabdd4957f513efeecf134e67f5f0eef34acf854b5f0c7
SHA512e7e7aff25cc22da197b41a98f83a4d057ab36a7b1ae880d02d0737258aa53b8cd0fb5cb93ea105a355b6e6feae2ea9e1d3e556fca6d4194df9c7ecebc5233b8d
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3
-
Filesize
350KB
MD5af7d04e1dd4594e4765ee99394e6b88e
SHA1d10a3dc2c2b939994b93675b71bb86b3ab22b3cf
SHA256bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b
SHA512101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3