Analysis
-
max time kernel
118s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 09:21
Static task
static1
Behavioral task
behavioral1
Sample
b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe
Resource
win10v2004-20230915-en
General
-
Target
b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe
-
Size
907KB
-
MD5
02ddc57e766bf186b0a848221839e5e9
-
SHA1
59d13a4f71ff1321e7bed568cb670843539dc6e7
-
SHA256
b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea
-
SHA512
63dcc3ef1b6af81e6605f6bdc125e7b6202e20196c858a0abd1a92a3e80656628514aff9bc6f7d2ee157bb80f2acd49bc12c540b404fa7ea9b6c3e1f89d8b110
-
SSDEEP
24576:Vy8D1RsaswjByhRFr9udCv7q0LP2gh2E2o:wwsgoF52Cv7l2
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2476-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2476-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2476-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2476-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2476-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2476-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2796 x1468711.exe 2792 x8504553.exe 2504 x3417916.exe 2036 g2006911.exe -
Loads dropped DLL 13 IoCs
pid Process 2720 b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe 2796 x1468711.exe 2796 x1468711.exe 2792 x8504553.exe 2792 x8504553.exe 2504 x3417916.exe 2504 x3417916.exe 2504 x3417916.exe 2036 g2006911.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe 2864 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1468711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8504553.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3417916.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 2476 2036 g2006911.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2864 2036 WerFault.exe 32 2828 2476 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2796 2720 b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe 29 PID 2720 wrote to memory of 2796 2720 b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe 29 PID 2720 wrote to memory of 2796 2720 b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe 29 PID 2720 wrote to memory of 2796 2720 b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe 29 PID 2720 wrote to memory of 2796 2720 b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe 29 PID 2720 wrote to memory of 2796 2720 b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe 29 PID 2720 wrote to memory of 2796 2720 b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe 29 PID 2796 wrote to memory of 2792 2796 x1468711.exe 30 PID 2796 wrote to memory of 2792 2796 x1468711.exe 30 PID 2796 wrote to memory of 2792 2796 x1468711.exe 30 PID 2796 wrote to memory of 2792 2796 x1468711.exe 30 PID 2796 wrote to memory of 2792 2796 x1468711.exe 30 PID 2796 wrote to memory of 2792 2796 x1468711.exe 30 PID 2796 wrote to memory of 2792 2796 x1468711.exe 30 PID 2792 wrote to memory of 2504 2792 x8504553.exe 31 PID 2792 wrote to memory of 2504 2792 x8504553.exe 31 PID 2792 wrote to memory of 2504 2792 x8504553.exe 31 PID 2792 wrote to memory of 2504 2792 x8504553.exe 31 PID 2792 wrote to memory of 2504 2792 x8504553.exe 31 PID 2792 wrote to memory of 2504 2792 x8504553.exe 31 PID 2792 wrote to memory of 2504 2792 x8504553.exe 31 PID 2504 wrote to memory of 2036 2504 x3417916.exe 32 PID 2504 wrote to memory of 2036 2504 x3417916.exe 32 PID 2504 wrote to memory of 2036 2504 x3417916.exe 32 PID 2504 wrote to memory of 2036 2504 x3417916.exe 32 PID 2504 wrote to memory of 2036 2504 x3417916.exe 32 PID 2504 wrote to memory of 2036 2504 x3417916.exe 32 PID 2504 wrote to memory of 2036 2504 x3417916.exe 32 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2036 wrote to memory of 2476 2036 g2006911.exe 33 PID 2476 wrote to memory of 2828 2476 AppLaunch.exe 35 PID 2476 wrote to memory of 2828 2476 AppLaunch.exe 35 PID 2476 wrote to memory of 2828 2476 AppLaunch.exe 35 PID 2476 wrote to memory of 2828 2476 AppLaunch.exe 35 PID 2476 wrote to memory of 2828 2476 AppLaunch.exe 35 PID 2476 wrote to memory of 2828 2476 AppLaunch.exe 35 PID 2476 wrote to memory of 2828 2476 AppLaunch.exe 35 PID 2036 wrote to memory of 2864 2036 g2006911.exe 34 PID 2036 wrote to memory of 2864 2036 g2006911.exe 34 PID 2036 wrote to memory of 2864 2036 g2006911.exe 34 PID 2036 wrote to memory of 2864 2036 g2006911.exe 34 PID 2036 wrote to memory of 2864 2036 g2006911.exe 34 PID 2036 wrote to memory of 2864 2036 g2006911.exe 34 PID 2036 wrote to memory of 2864 2036 g2006911.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe"C:\Users\Admin\AppData\Local\Temp\b1d5633d84850bec1bbe92b72f80ebb8f95ce9c0642f0930b8f9bfa95da130ea.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1468711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1468711.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8504553.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8504553.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3417916.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3417916.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2006911.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2006911.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 2687⤵
- Program crash
PID:2828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2864
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD59e2376d62bfccf554beef1a4a7147e39
SHA19ece230fd8dd9aab9f6daa81f8613b45bf697603
SHA256e20795ca09c0e0bbae859b0e914854520bbaaf732706f46075356f6f24e80c5b
SHA512b58ea4b7f194d81d69db9c052b681b4113d2317c2dea646e331572da43ca834f45c2fe7bd913b37f6dbe20189e51a07de2ee9f6a4ce6c4f504f1cf165a09e463
-
Filesize
805KB
MD59e2376d62bfccf554beef1a4a7147e39
SHA19ece230fd8dd9aab9f6daa81f8613b45bf697603
SHA256e20795ca09c0e0bbae859b0e914854520bbaaf732706f46075356f6f24e80c5b
SHA512b58ea4b7f194d81d69db9c052b681b4113d2317c2dea646e331572da43ca834f45c2fe7bd913b37f6dbe20189e51a07de2ee9f6a4ce6c4f504f1cf165a09e463
-
Filesize
545KB
MD50e32f58d90566b81ac003ba00774335f
SHA11963f1c6a3a2c987d77ed3b406f70a40690b9ad8
SHA256be6de7c9f17fdd66d1e6e0123c36291634067294ba39b6f739c0d0fc584c11b1
SHA51233ac378a4e3925ca852df5889461e38f1d92c6df55bb00d1b1fe06eca140749936bc710b9a4e46c00c9de25206825fdd64d9d895076e533fa81cbd0990691ecc
-
Filesize
545KB
MD50e32f58d90566b81ac003ba00774335f
SHA11963f1c6a3a2c987d77ed3b406f70a40690b9ad8
SHA256be6de7c9f17fdd66d1e6e0123c36291634067294ba39b6f739c0d0fc584c11b1
SHA51233ac378a4e3925ca852df5889461e38f1d92c6df55bb00d1b1fe06eca140749936bc710b9a4e46c00c9de25206825fdd64d9d895076e533fa81cbd0990691ecc
-
Filesize
379KB
MD52c21e5272217a3b911b60af74e4982fe
SHA1d2dfb17b589cfa6d1901cbec5b94c53b2292d211
SHA2569f501c5317e05f2d9a339af4b919b5b2ad2060727204a970de7a9ebb3d4ce9b7
SHA512cea2050ff4ecc68a3cf188baa6f0010b395ad7f1b290745af9910a91ec9894a65c101d452c890bb3ec2066d8807ca2907b2fd40a346eb16bd6d81bc3538f4e49
-
Filesize
379KB
MD52c21e5272217a3b911b60af74e4982fe
SHA1d2dfb17b589cfa6d1901cbec5b94c53b2292d211
SHA2569f501c5317e05f2d9a339af4b919b5b2ad2060727204a970de7a9ebb3d4ce9b7
SHA512cea2050ff4ecc68a3cf188baa6f0010b395ad7f1b290745af9910a91ec9894a65c101d452c890bb3ec2066d8807ca2907b2fd40a346eb16bd6d81bc3538f4e49
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f
-
Filesize
805KB
MD59e2376d62bfccf554beef1a4a7147e39
SHA19ece230fd8dd9aab9f6daa81f8613b45bf697603
SHA256e20795ca09c0e0bbae859b0e914854520bbaaf732706f46075356f6f24e80c5b
SHA512b58ea4b7f194d81d69db9c052b681b4113d2317c2dea646e331572da43ca834f45c2fe7bd913b37f6dbe20189e51a07de2ee9f6a4ce6c4f504f1cf165a09e463
-
Filesize
805KB
MD59e2376d62bfccf554beef1a4a7147e39
SHA19ece230fd8dd9aab9f6daa81f8613b45bf697603
SHA256e20795ca09c0e0bbae859b0e914854520bbaaf732706f46075356f6f24e80c5b
SHA512b58ea4b7f194d81d69db9c052b681b4113d2317c2dea646e331572da43ca834f45c2fe7bd913b37f6dbe20189e51a07de2ee9f6a4ce6c4f504f1cf165a09e463
-
Filesize
545KB
MD50e32f58d90566b81ac003ba00774335f
SHA11963f1c6a3a2c987d77ed3b406f70a40690b9ad8
SHA256be6de7c9f17fdd66d1e6e0123c36291634067294ba39b6f739c0d0fc584c11b1
SHA51233ac378a4e3925ca852df5889461e38f1d92c6df55bb00d1b1fe06eca140749936bc710b9a4e46c00c9de25206825fdd64d9d895076e533fa81cbd0990691ecc
-
Filesize
545KB
MD50e32f58d90566b81ac003ba00774335f
SHA11963f1c6a3a2c987d77ed3b406f70a40690b9ad8
SHA256be6de7c9f17fdd66d1e6e0123c36291634067294ba39b6f739c0d0fc584c11b1
SHA51233ac378a4e3925ca852df5889461e38f1d92c6df55bb00d1b1fe06eca140749936bc710b9a4e46c00c9de25206825fdd64d9d895076e533fa81cbd0990691ecc
-
Filesize
379KB
MD52c21e5272217a3b911b60af74e4982fe
SHA1d2dfb17b589cfa6d1901cbec5b94c53b2292d211
SHA2569f501c5317e05f2d9a339af4b919b5b2ad2060727204a970de7a9ebb3d4ce9b7
SHA512cea2050ff4ecc68a3cf188baa6f0010b395ad7f1b290745af9910a91ec9894a65c101d452c890bb3ec2066d8807ca2907b2fd40a346eb16bd6d81bc3538f4e49
-
Filesize
379KB
MD52c21e5272217a3b911b60af74e4982fe
SHA1d2dfb17b589cfa6d1901cbec5b94c53b2292d211
SHA2569f501c5317e05f2d9a339af4b919b5b2ad2060727204a970de7a9ebb3d4ce9b7
SHA512cea2050ff4ecc68a3cf188baa6f0010b395ad7f1b290745af9910a91ec9894a65c101d452c890bb3ec2066d8807ca2907b2fd40a346eb16bd6d81bc3538f4e49
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f
-
Filesize
350KB
MD5250c84e2bdae167f99d625dbc5527bc8
SHA1411f67107c17395b3db5d93317c77bf20fb3cbe1
SHA25649201f7755a0dfa7e8e3ac53e0185f5b6452cce7cc9d7355f9188fa6434a8a08
SHA512ff35c8d88a602187f7aa28f67bb65495072918ddc8fc9911b2940339797aed9c70036c67fec8ba08bcde7da3d08bfd38b614e24c159ebac3a51fab5ba53fbb4f