Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:53

General

  • Target

    4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe

  • Size

    908KB

  • MD5

    939f12f6f0ef949958e6835b42998c67

  • SHA1

    0f87bda2f9f0ecf6bd0dde9fefe7ed865a747388

  • SHA256

    4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac

  • SHA512

    1ab6f2979aa977fc871b076d78d35948cfec1e2e6c3fe4cab62ebdfe9bf4818a79308c912906135c58d5a85f5ad7969509b40353ba3f4f499c36ede301939591

  • SSDEEP

    24576:syqXpmgNgmulSfDNjrpbWcyLHrEGuglXrarYf:bqXpmgNmlSffWcyAGn4k

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe
    "C:\Users\Admin\AppData\Local\Temp\4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9015294.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9015294.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0791643.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0791643.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1603673.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1603673.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 268
                7⤵
                • Program crash
                PID:2752
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9015294.exe

    Filesize

    806KB

    MD5

    b04c913290b70fb112b550f63aaea449

    SHA1

    0709447040e3420f28275cf2cd09d3f6571400ff

    SHA256

    23c5f3e5b85e0ca364d86e819db747087a78a747252f362248fdfdb71eba99aa

    SHA512

    da5102b33bcff1cac52e9e43670c930d3e53f792608b3be59edc3b5077fdabecfe8c27f45e80c55f9ab679d412d3ae902deb3d5c42f810f66c0bb8c6b9d63cc8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9015294.exe

    Filesize

    806KB

    MD5

    b04c913290b70fb112b550f63aaea449

    SHA1

    0709447040e3420f28275cf2cd09d3f6571400ff

    SHA256

    23c5f3e5b85e0ca364d86e819db747087a78a747252f362248fdfdb71eba99aa

    SHA512

    da5102b33bcff1cac52e9e43670c930d3e53f792608b3be59edc3b5077fdabecfe8c27f45e80c55f9ab679d412d3ae902deb3d5c42f810f66c0bb8c6b9d63cc8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0791643.exe

    Filesize

    545KB

    MD5

    9dd054b0e9d6fc484f382787eb4071c8

    SHA1

    74eb3f27cadf927772e048af6fe509ab3eab13b3

    SHA256

    892f1bf5d03c460f658f033c4d1b1a68fbd9deea92806f72e4ef7a766e69b0e5

    SHA512

    d31bacb713e6087f8c6ae6d971f25d9b0c78e309000d5d44c0bb15e1bc4479c1124fdbf58301e916488ef9ab97e01ee821adc95410d3924e27f5bce1f9101526

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0791643.exe

    Filesize

    545KB

    MD5

    9dd054b0e9d6fc484f382787eb4071c8

    SHA1

    74eb3f27cadf927772e048af6fe509ab3eab13b3

    SHA256

    892f1bf5d03c460f658f033c4d1b1a68fbd9deea92806f72e4ef7a766e69b0e5

    SHA512

    d31bacb713e6087f8c6ae6d971f25d9b0c78e309000d5d44c0bb15e1bc4479c1124fdbf58301e916488ef9ab97e01ee821adc95410d3924e27f5bce1f9101526

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1603673.exe

    Filesize

    379KB

    MD5

    2df77f873ac1f0fbdb1cb20107716f9c

    SHA1

    174990ccfbe42da10a9860ec6a4e556ffe599548

    SHA256

    ddb4313111d828d81367a1ee4e94da68eb1dfa3dd984970196d90515183d17d0

    SHA512

    5186833b54a4551aa1be33666d5630ed5cfdb020ee92d814e1ee961616018503d6cc08d9221bbe51dc6d7c011ab2a91d423f988767297cf5704dc97a54f8916c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1603673.exe

    Filesize

    379KB

    MD5

    2df77f873ac1f0fbdb1cb20107716f9c

    SHA1

    174990ccfbe42da10a9860ec6a4e556ffe599548

    SHA256

    ddb4313111d828d81367a1ee4e94da68eb1dfa3dd984970196d90515183d17d0

    SHA512

    5186833b54a4551aa1be33666d5630ed5cfdb020ee92d814e1ee961616018503d6cc08d9221bbe51dc6d7c011ab2a91d423f988767297cf5704dc97a54f8916c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9015294.exe

    Filesize

    806KB

    MD5

    b04c913290b70fb112b550f63aaea449

    SHA1

    0709447040e3420f28275cf2cd09d3f6571400ff

    SHA256

    23c5f3e5b85e0ca364d86e819db747087a78a747252f362248fdfdb71eba99aa

    SHA512

    da5102b33bcff1cac52e9e43670c930d3e53f792608b3be59edc3b5077fdabecfe8c27f45e80c55f9ab679d412d3ae902deb3d5c42f810f66c0bb8c6b9d63cc8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9015294.exe

    Filesize

    806KB

    MD5

    b04c913290b70fb112b550f63aaea449

    SHA1

    0709447040e3420f28275cf2cd09d3f6571400ff

    SHA256

    23c5f3e5b85e0ca364d86e819db747087a78a747252f362248fdfdb71eba99aa

    SHA512

    da5102b33bcff1cac52e9e43670c930d3e53f792608b3be59edc3b5077fdabecfe8c27f45e80c55f9ab679d412d3ae902deb3d5c42f810f66c0bb8c6b9d63cc8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x0791643.exe

    Filesize

    545KB

    MD5

    9dd054b0e9d6fc484f382787eb4071c8

    SHA1

    74eb3f27cadf927772e048af6fe509ab3eab13b3

    SHA256

    892f1bf5d03c460f658f033c4d1b1a68fbd9deea92806f72e4ef7a766e69b0e5

    SHA512

    d31bacb713e6087f8c6ae6d971f25d9b0c78e309000d5d44c0bb15e1bc4479c1124fdbf58301e916488ef9ab97e01ee821adc95410d3924e27f5bce1f9101526

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x0791643.exe

    Filesize

    545KB

    MD5

    9dd054b0e9d6fc484f382787eb4071c8

    SHA1

    74eb3f27cadf927772e048af6fe509ab3eab13b3

    SHA256

    892f1bf5d03c460f658f033c4d1b1a68fbd9deea92806f72e4ef7a766e69b0e5

    SHA512

    d31bacb713e6087f8c6ae6d971f25d9b0c78e309000d5d44c0bb15e1bc4479c1124fdbf58301e916488ef9ab97e01ee821adc95410d3924e27f5bce1f9101526

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x1603673.exe

    Filesize

    379KB

    MD5

    2df77f873ac1f0fbdb1cb20107716f9c

    SHA1

    174990ccfbe42da10a9860ec6a4e556ffe599548

    SHA256

    ddb4313111d828d81367a1ee4e94da68eb1dfa3dd984970196d90515183d17d0

    SHA512

    5186833b54a4551aa1be33666d5630ed5cfdb020ee92d814e1ee961616018503d6cc08d9221bbe51dc6d7c011ab2a91d423f988767297cf5704dc97a54f8916c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x1603673.exe

    Filesize

    379KB

    MD5

    2df77f873ac1f0fbdb1cb20107716f9c

    SHA1

    174990ccfbe42da10a9860ec6a4e556ffe599548

    SHA256

    ddb4313111d828d81367a1ee4e94da68eb1dfa3dd984970196d90515183d17d0

    SHA512

    5186833b54a4551aa1be33666d5630ed5cfdb020ee92d814e1ee961616018503d6cc08d9221bbe51dc6d7c011ab2a91d423f988767297cf5704dc97a54f8916c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe

    Filesize

    350KB

    MD5

    c2d378d4995590f1a73335d2b0ee394c

    SHA1

    00704bc537e86055dac45c78d80739d8dd985c63

    SHA256

    e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4

    SHA512

    1abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7

  • memory/2672-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2672-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2672-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2672-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2672-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2672-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2672-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2672-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2672-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2672-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB