Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe
Resource
win10v2004-20230915-en
General
-
Target
4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe
-
Size
908KB
-
MD5
939f12f6f0ef949958e6835b42998c67
-
SHA1
0f87bda2f9f0ecf6bd0dde9fefe7ed865a747388
-
SHA256
4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac
-
SHA512
1ab6f2979aa977fc871b076d78d35948cfec1e2e6c3fe4cab62ebdfe9bf4818a79308c912906135c58d5a85f5ad7969509b40353ba3f4f499c36ede301939591
-
SSDEEP
24576:syqXpmgNgmulSfDNjrpbWcyLHrEGuglXrarYf:bqXpmgNmlSffWcyAGn4k
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2672-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2672-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 1328 x9015294.exe 2960 x0791643.exe 2564 x1603673.exe 2620 g6841266.exe -
Loads dropped DLL 13 IoCs
pid Process 2164 4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe 1328 x9015294.exe 1328 x9015294.exe 2960 x0791643.exe 2960 x0791643.exe 2564 x1603673.exe 2564 x1603673.exe 2564 x1603673.exe 2620 g6841266.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe 2588 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0791643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1603673.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9015294.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2620 set thread context of 2672 2620 g6841266.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2588 2620 WerFault.exe 31 2752 2672 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2164 wrote to memory of 1328 2164 4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe 28 PID 2164 wrote to memory of 1328 2164 4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe 28 PID 2164 wrote to memory of 1328 2164 4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe 28 PID 2164 wrote to memory of 1328 2164 4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe 28 PID 2164 wrote to memory of 1328 2164 4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe 28 PID 2164 wrote to memory of 1328 2164 4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe 28 PID 2164 wrote to memory of 1328 2164 4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe 28 PID 1328 wrote to memory of 2960 1328 x9015294.exe 29 PID 1328 wrote to memory of 2960 1328 x9015294.exe 29 PID 1328 wrote to memory of 2960 1328 x9015294.exe 29 PID 1328 wrote to memory of 2960 1328 x9015294.exe 29 PID 1328 wrote to memory of 2960 1328 x9015294.exe 29 PID 1328 wrote to memory of 2960 1328 x9015294.exe 29 PID 1328 wrote to memory of 2960 1328 x9015294.exe 29 PID 2960 wrote to memory of 2564 2960 x0791643.exe 30 PID 2960 wrote to memory of 2564 2960 x0791643.exe 30 PID 2960 wrote to memory of 2564 2960 x0791643.exe 30 PID 2960 wrote to memory of 2564 2960 x0791643.exe 30 PID 2960 wrote to memory of 2564 2960 x0791643.exe 30 PID 2960 wrote to memory of 2564 2960 x0791643.exe 30 PID 2960 wrote to memory of 2564 2960 x0791643.exe 30 PID 2564 wrote to memory of 2620 2564 x1603673.exe 31 PID 2564 wrote to memory of 2620 2564 x1603673.exe 31 PID 2564 wrote to memory of 2620 2564 x1603673.exe 31 PID 2564 wrote to memory of 2620 2564 x1603673.exe 31 PID 2564 wrote to memory of 2620 2564 x1603673.exe 31 PID 2564 wrote to memory of 2620 2564 x1603673.exe 31 PID 2564 wrote to memory of 2620 2564 x1603673.exe 31 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2672 2620 g6841266.exe 32 PID 2620 wrote to memory of 2588 2620 g6841266.exe 33 PID 2620 wrote to memory of 2588 2620 g6841266.exe 33 PID 2620 wrote to memory of 2588 2620 g6841266.exe 33 PID 2620 wrote to memory of 2588 2620 g6841266.exe 33 PID 2620 wrote to memory of 2588 2620 g6841266.exe 33 PID 2620 wrote to memory of 2588 2620 g6841266.exe 33 PID 2620 wrote to memory of 2588 2620 g6841266.exe 33 PID 2672 wrote to memory of 2752 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2752 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2752 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2752 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2752 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2752 2672 AppLaunch.exe 34 PID 2672 wrote to memory of 2752 2672 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe"C:\Users\Admin\AppData\Local\Temp\4b2b83f77c6d81f60d963a3d35562930e3631bc83c02f5b66faf0f12484b6eac.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9015294.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9015294.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0791643.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0791643.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1603673.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1603673.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6841266.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 2687⤵
- Program crash
PID:2752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2588
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
806KB
MD5b04c913290b70fb112b550f63aaea449
SHA10709447040e3420f28275cf2cd09d3f6571400ff
SHA25623c5f3e5b85e0ca364d86e819db747087a78a747252f362248fdfdb71eba99aa
SHA512da5102b33bcff1cac52e9e43670c930d3e53f792608b3be59edc3b5077fdabecfe8c27f45e80c55f9ab679d412d3ae902deb3d5c42f810f66c0bb8c6b9d63cc8
-
Filesize
806KB
MD5b04c913290b70fb112b550f63aaea449
SHA10709447040e3420f28275cf2cd09d3f6571400ff
SHA25623c5f3e5b85e0ca364d86e819db747087a78a747252f362248fdfdb71eba99aa
SHA512da5102b33bcff1cac52e9e43670c930d3e53f792608b3be59edc3b5077fdabecfe8c27f45e80c55f9ab679d412d3ae902deb3d5c42f810f66c0bb8c6b9d63cc8
-
Filesize
545KB
MD59dd054b0e9d6fc484f382787eb4071c8
SHA174eb3f27cadf927772e048af6fe509ab3eab13b3
SHA256892f1bf5d03c460f658f033c4d1b1a68fbd9deea92806f72e4ef7a766e69b0e5
SHA512d31bacb713e6087f8c6ae6d971f25d9b0c78e309000d5d44c0bb15e1bc4479c1124fdbf58301e916488ef9ab97e01ee821adc95410d3924e27f5bce1f9101526
-
Filesize
545KB
MD59dd054b0e9d6fc484f382787eb4071c8
SHA174eb3f27cadf927772e048af6fe509ab3eab13b3
SHA256892f1bf5d03c460f658f033c4d1b1a68fbd9deea92806f72e4ef7a766e69b0e5
SHA512d31bacb713e6087f8c6ae6d971f25d9b0c78e309000d5d44c0bb15e1bc4479c1124fdbf58301e916488ef9ab97e01ee821adc95410d3924e27f5bce1f9101526
-
Filesize
379KB
MD52df77f873ac1f0fbdb1cb20107716f9c
SHA1174990ccfbe42da10a9860ec6a4e556ffe599548
SHA256ddb4313111d828d81367a1ee4e94da68eb1dfa3dd984970196d90515183d17d0
SHA5125186833b54a4551aa1be33666d5630ed5cfdb020ee92d814e1ee961616018503d6cc08d9221bbe51dc6d7c011ab2a91d423f988767297cf5704dc97a54f8916c
-
Filesize
379KB
MD52df77f873ac1f0fbdb1cb20107716f9c
SHA1174990ccfbe42da10a9860ec6a4e556ffe599548
SHA256ddb4313111d828d81367a1ee4e94da68eb1dfa3dd984970196d90515183d17d0
SHA5125186833b54a4551aa1be33666d5630ed5cfdb020ee92d814e1ee961616018503d6cc08d9221bbe51dc6d7c011ab2a91d423f988767297cf5704dc97a54f8916c
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7
-
Filesize
806KB
MD5b04c913290b70fb112b550f63aaea449
SHA10709447040e3420f28275cf2cd09d3f6571400ff
SHA25623c5f3e5b85e0ca364d86e819db747087a78a747252f362248fdfdb71eba99aa
SHA512da5102b33bcff1cac52e9e43670c930d3e53f792608b3be59edc3b5077fdabecfe8c27f45e80c55f9ab679d412d3ae902deb3d5c42f810f66c0bb8c6b9d63cc8
-
Filesize
806KB
MD5b04c913290b70fb112b550f63aaea449
SHA10709447040e3420f28275cf2cd09d3f6571400ff
SHA25623c5f3e5b85e0ca364d86e819db747087a78a747252f362248fdfdb71eba99aa
SHA512da5102b33bcff1cac52e9e43670c930d3e53f792608b3be59edc3b5077fdabecfe8c27f45e80c55f9ab679d412d3ae902deb3d5c42f810f66c0bb8c6b9d63cc8
-
Filesize
545KB
MD59dd054b0e9d6fc484f382787eb4071c8
SHA174eb3f27cadf927772e048af6fe509ab3eab13b3
SHA256892f1bf5d03c460f658f033c4d1b1a68fbd9deea92806f72e4ef7a766e69b0e5
SHA512d31bacb713e6087f8c6ae6d971f25d9b0c78e309000d5d44c0bb15e1bc4479c1124fdbf58301e916488ef9ab97e01ee821adc95410d3924e27f5bce1f9101526
-
Filesize
545KB
MD59dd054b0e9d6fc484f382787eb4071c8
SHA174eb3f27cadf927772e048af6fe509ab3eab13b3
SHA256892f1bf5d03c460f658f033c4d1b1a68fbd9deea92806f72e4ef7a766e69b0e5
SHA512d31bacb713e6087f8c6ae6d971f25d9b0c78e309000d5d44c0bb15e1bc4479c1124fdbf58301e916488ef9ab97e01ee821adc95410d3924e27f5bce1f9101526
-
Filesize
379KB
MD52df77f873ac1f0fbdb1cb20107716f9c
SHA1174990ccfbe42da10a9860ec6a4e556ffe599548
SHA256ddb4313111d828d81367a1ee4e94da68eb1dfa3dd984970196d90515183d17d0
SHA5125186833b54a4551aa1be33666d5630ed5cfdb020ee92d814e1ee961616018503d6cc08d9221bbe51dc6d7c011ab2a91d423f988767297cf5704dc97a54f8916c
-
Filesize
379KB
MD52df77f873ac1f0fbdb1cb20107716f9c
SHA1174990ccfbe42da10a9860ec6a4e556ffe599548
SHA256ddb4313111d828d81367a1ee4e94da68eb1dfa3dd984970196d90515183d17d0
SHA5125186833b54a4551aa1be33666d5630ed5cfdb020ee92d814e1ee961616018503d6cc08d9221bbe51dc6d7c011ab2a91d423f988767297cf5704dc97a54f8916c
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7
-
Filesize
350KB
MD5c2d378d4995590f1a73335d2b0ee394c
SHA100704bc537e86055dac45c78d80739d8dd985c63
SHA256e76cee271a0100dbdbf4795e9d8a79ddceccdd8f0da525906de6fa1b6738e7b4
SHA5121abd88faf3b9792d94b8151369a857a97c9ae750513b2c58abfb6fca5096033986e3313da95e2caa56388770b74f29cd47c4ddbe7ddf8e98fd16b3f5ee6ba7c7