Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 10:01

General

  • Target

    d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe

  • Size

    907KB

  • MD5

    e5f2b60898dda7246f58187276ff5f63

  • SHA1

    39c709cbe3fc1e4b5fc53fdcab4c700cacdf3fde

  • SHA256

    d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326

  • SHA512

    372a9b4fdb19ca96dcf3359610a1e1b50bc14d7c53b547f7b3fca7f990fc9bd2248841fb4db75440a5209f962a74aed731358f36a1a4079bdd7121c8392c043c

  • SSDEEP

    24576:/ybU3wRjN9OmnKAaR8WC4Pof0GXKgt/xUpx9MPoJq:Kwg39CyIPoXKgt/xAx9PJ

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe
    "C:\Users\Admin\AppData\Local\Temp\d9762357129c5a2bbebce7f771e82ae6ca3c0425fb4c09a29991489aba766326.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3201225.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3201225.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3297344.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3297344.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3531242.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3531242.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2368
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2760
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 268
                7⤵
                • Program crash
                PID:2280
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3201225.exe

    Filesize

    805KB

    MD5

    d78b7ab70d99c56e732e31dec295432e

    SHA1

    155cc3a76e2ad447bdd5985dd5c28b7fd17bb49d

    SHA256

    cd02977d5bc5aa0df801e4a92e4d0874f5915a72aaac51d7a2128a9317c2c4f6

    SHA512

    e65e96508d2c66daf9b21cffe716f1b3530fee3aa89533be75ebed07879213e4f904a9e1134c9486aca21dd6340f1ec2e43995cc194df31e696d8c0c1db64df0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3201225.exe

    Filesize

    805KB

    MD5

    d78b7ab70d99c56e732e31dec295432e

    SHA1

    155cc3a76e2ad447bdd5985dd5c28b7fd17bb49d

    SHA256

    cd02977d5bc5aa0df801e4a92e4d0874f5915a72aaac51d7a2128a9317c2c4f6

    SHA512

    e65e96508d2c66daf9b21cffe716f1b3530fee3aa89533be75ebed07879213e4f904a9e1134c9486aca21dd6340f1ec2e43995cc194df31e696d8c0c1db64df0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3297344.exe

    Filesize

    545KB

    MD5

    734d36a6ec936a5b0f79bc75412f5e3e

    SHA1

    89741899652f194b1b0699d6cea738fee1d37ede

    SHA256

    351425c4f9f66de3f2de9a3bed3bea5e560045ee5c4b485f5fad0826a37c2948

    SHA512

    8e589d6b75a4268794078a33e7c30980cf2a41114436aa226e2b9e4b5f85a9f973038cea8bbda50a20dd7f64a992081ca999c1dcead9f72b8188abad8bd41e4e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3297344.exe

    Filesize

    545KB

    MD5

    734d36a6ec936a5b0f79bc75412f5e3e

    SHA1

    89741899652f194b1b0699d6cea738fee1d37ede

    SHA256

    351425c4f9f66de3f2de9a3bed3bea5e560045ee5c4b485f5fad0826a37c2948

    SHA512

    8e589d6b75a4268794078a33e7c30980cf2a41114436aa226e2b9e4b5f85a9f973038cea8bbda50a20dd7f64a992081ca999c1dcead9f72b8188abad8bd41e4e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3531242.exe

    Filesize

    379KB

    MD5

    4c72378e3f22f8de3ee334eb223f709d

    SHA1

    7a54cdcff09d28e76869d2c678754e0a22ab3e58

    SHA256

    7284eabcebe5577b2adabdd4957f513efeecf134e67f5f0eef34acf854b5f0c7

    SHA512

    e7e7aff25cc22da197b41a98f83a4d057ab36a7b1ae880d02d0737258aa53b8cd0fb5cb93ea105a355b6e6feae2ea9e1d3e556fca6d4194df9c7ecebc5233b8d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3531242.exe

    Filesize

    379KB

    MD5

    4c72378e3f22f8de3ee334eb223f709d

    SHA1

    7a54cdcff09d28e76869d2c678754e0a22ab3e58

    SHA256

    7284eabcebe5577b2adabdd4957f513efeecf134e67f5f0eef34acf854b5f0c7

    SHA512

    e7e7aff25cc22da197b41a98f83a4d057ab36a7b1ae880d02d0737258aa53b8cd0fb5cb93ea105a355b6e6feae2ea9e1d3e556fca6d4194df9c7ecebc5233b8d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3201225.exe

    Filesize

    805KB

    MD5

    d78b7ab70d99c56e732e31dec295432e

    SHA1

    155cc3a76e2ad447bdd5985dd5c28b7fd17bb49d

    SHA256

    cd02977d5bc5aa0df801e4a92e4d0874f5915a72aaac51d7a2128a9317c2c4f6

    SHA512

    e65e96508d2c66daf9b21cffe716f1b3530fee3aa89533be75ebed07879213e4f904a9e1134c9486aca21dd6340f1ec2e43995cc194df31e696d8c0c1db64df0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3201225.exe

    Filesize

    805KB

    MD5

    d78b7ab70d99c56e732e31dec295432e

    SHA1

    155cc3a76e2ad447bdd5985dd5c28b7fd17bb49d

    SHA256

    cd02977d5bc5aa0df801e4a92e4d0874f5915a72aaac51d7a2128a9317c2c4f6

    SHA512

    e65e96508d2c66daf9b21cffe716f1b3530fee3aa89533be75ebed07879213e4f904a9e1134c9486aca21dd6340f1ec2e43995cc194df31e696d8c0c1db64df0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3297344.exe

    Filesize

    545KB

    MD5

    734d36a6ec936a5b0f79bc75412f5e3e

    SHA1

    89741899652f194b1b0699d6cea738fee1d37ede

    SHA256

    351425c4f9f66de3f2de9a3bed3bea5e560045ee5c4b485f5fad0826a37c2948

    SHA512

    8e589d6b75a4268794078a33e7c30980cf2a41114436aa226e2b9e4b5f85a9f973038cea8bbda50a20dd7f64a992081ca999c1dcead9f72b8188abad8bd41e4e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3297344.exe

    Filesize

    545KB

    MD5

    734d36a6ec936a5b0f79bc75412f5e3e

    SHA1

    89741899652f194b1b0699d6cea738fee1d37ede

    SHA256

    351425c4f9f66de3f2de9a3bed3bea5e560045ee5c4b485f5fad0826a37c2948

    SHA512

    8e589d6b75a4268794078a33e7c30980cf2a41114436aa226e2b9e4b5f85a9f973038cea8bbda50a20dd7f64a992081ca999c1dcead9f72b8188abad8bd41e4e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3531242.exe

    Filesize

    379KB

    MD5

    4c72378e3f22f8de3ee334eb223f709d

    SHA1

    7a54cdcff09d28e76869d2c678754e0a22ab3e58

    SHA256

    7284eabcebe5577b2adabdd4957f513efeecf134e67f5f0eef34acf854b5f0c7

    SHA512

    e7e7aff25cc22da197b41a98f83a4d057ab36a7b1ae880d02d0737258aa53b8cd0fb5cb93ea105a355b6e6feae2ea9e1d3e556fca6d4194df9c7ecebc5233b8d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3531242.exe

    Filesize

    379KB

    MD5

    4c72378e3f22f8de3ee334eb223f709d

    SHA1

    7a54cdcff09d28e76869d2c678754e0a22ab3e58

    SHA256

    7284eabcebe5577b2adabdd4957f513efeecf134e67f5f0eef34acf854b5f0c7

    SHA512

    e7e7aff25cc22da197b41a98f83a4d057ab36a7b1ae880d02d0737258aa53b8cd0fb5cb93ea105a355b6e6feae2ea9e1d3e556fca6d4194df9c7ecebc5233b8d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0399034.exe

    Filesize

    350KB

    MD5

    af7d04e1dd4594e4765ee99394e6b88e

    SHA1

    d10a3dc2c2b939994b93675b71bb86b3ab22b3cf

    SHA256

    bbed7cac7f251285b1407e4306544991dbdebddd81ebce2d55fbaae541b9c54b

    SHA512

    101c9cf47d497f27e15acd85816811c0fa7dbbf3a5f9495a4878a3439c7e943d269144029443a967b4e5f62047c43aa55e4d1bcc3b67f7099bb9998d7e397cf3

  • memory/2636-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2636-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2636-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2636-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2636-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2636-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2636-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2636-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2636-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2636-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB