Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe
Resource
win10v2004-20230915-en
General
-
Target
60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe
-
Size
907KB
-
MD5
3ac63f44e31d4d7e78fc11853827282c
-
SHA1
13fb3b5448d5d9641ea6a9416ac1712fc4ad4ffd
-
SHA256
60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772
-
SHA512
3e77cd94ff13b7ddd931294129e3368ede1c0474e1cf5e4df041c6eafe5f2fa1e09d02ff1403a0dd35b778875e2770f18ea2ba0bb96f488d630d49ce0a6bd775
-
SSDEEP
12288:/Mrby90kLRsfKdMbGJW/4UCTIQTeODGL/PYX0OqOJ5ICEgur6UIIVa88zhHkFwg4:cyrLYKdMgW/KpeOAP+0SPIheU7UuU
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2780-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2780-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2780-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2780-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2780-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2780-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2236 x1653564.exe 3064 x3536261.exe 2620 x3445802.exe 2752 g0937261.exe -
Loads dropped DLL 13 IoCs
pid Process 2820 60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe 2236 x1653564.exe 2236 x1653564.exe 3064 x3536261.exe 3064 x3536261.exe 2620 x3445802.exe 2620 x3445802.exe 2620 x3445802.exe 2752 g0937261.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3536261.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3445802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1653564.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2780 2752 g0937261.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2772 2752 WerFault.exe 31 2520 2780 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2236 2820 60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe 28 PID 2820 wrote to memory of 2236 2820 60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe 28 PID 2820 wrote to memory of 2236 2820 60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe 28 PID 2820 wrote to memory of 2236 2820 60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe 28 PID 2820 wrote to memory of 2236 2820 60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe 28 PID 2820 wrote to memory of 2236 2820 60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe 28 PID 2820 wrote to memory of 2236 2820 60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe 28 PID 2236 wrote to memory of 3064 2236 x1653564.exe 29 PID 2236 wrote to memory of 3064 2236 x1653564.exe 29 PID 2236 wrote to memory of 3064 2236 x1653564.exe 29 PID 2236 wrote to memory of 3064 2236 x1653564.exe 29 PID 2236 wrote to memory of 3064 2236 x1653564.exe 29 PID 2236 wrote to memory of 3064 2236 x1653564.exe 29 PID 2236 wrote to memory of 3064 2236 x1653564.exe 29 PID 3064 wrote to memory of 2620 3064 x3536261.exe 30 PID 3064 wrote to memory of 2620 3064 x3536261.exe 30 PID 3064 wrote to memory of 2620 3064 x3536261.exe 30 PID 3064 wrote to memory of 2620 3064 x3536261.exe 30 PID 3064 wrote to memory of 2620 3064 x3536261.exe 30 PID 3064 wrote to memory of 2620 3064 x3536261.exe 30 PID 3064 wrote to memory of 2620 3064 x3536261.exe 30 PID 2620 wrote to memory of 2752 2620 x3445802.exe 31 PID 2620 wrote to memory of 2752 2620 x3445802.exe 31 PID 2620 wrote to memory of 2752 2620 x3445802.exe 31 PID 2620 wrote to memory of 2752 2620 x3445802.exe 31 PID 2620 wrote to memory of 2752 2620 x3445802.exe 31 PID 2620 wrote to memory of 2752 2620 x3445802.exe 31 PID 2620 wrote to memory of 2752 2620 x3445802.exe 31 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2780 2752 g0937261.exe 32 PID 2752 wrote to memory of 2772 2752 g0937261.exe 33 PID 2752 wrote to memory of 2772 2752 g0937261.exe 33 PID 2752 wrote to memory of 2772 2752 g0937261.exe 33 PID 2752 wrote to memory of 2772 2752 g0937261.exe 33 PID 2752 wrote to memory of 2772 2752 g0937261.exe 33 PID 2752 wrote to memory of 2772 2752 g0937261.exe 33 PID 2752 wrote to memory of 2772 2752 g0937261.exe 33 PID 2780 wrote to memory of 2520 2780 AppLaunch.exe 34 PID 2780 wrote to memory of 2520 2780 AppLaunch.exe 34 PID 2780 wrote to memory of 2520 2780 AppLaunch.exe 34 PID 2780 wrote to memory of 2520 2780 AppLaunch.exe 34 PID 2780 wrote to memory of 2520 2780 AppLaunch.exe 34 PID 2780 wrote to memory of 2520 2780 AppLaunch.exe 34 PID 2780 wrote to memory of 2520 2780 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe"C:\Users\Admin\AppData\Local\Temp\60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1653564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1653564.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3536261.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3536261.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3445802.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3445802.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 2687⤵
- Program crash
PID:2520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2772
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD528312cb6a5b89c64f5c071017db7b011
SHA167c298fab6c3a3369a5766679430dbfc4d5bfcb5
SHA256ba81922b6e31c885a999476218e0bbf6c266da3418116f18a51965f4c2a92906
SHA5121e081f52ee06b23921b8655fff932e023711206663dfcf916b0183f29687c14bf704d023ddd0619f347ef0b509766ee2cebdb8f868538036de07a64c005293c9
-
Filesize
805KB
MD528312cb6a5b89c64f5c071017db7b011
SHA167c298fab6c3a3369a5766679430dbfc4d5bfcb5
SHA256ba81922b6e31c885a999476218e0bbf6c266da3418116f18a51965f4c2a92906
SHA5121e081f52ee06b23921b8655fff932e023711206663dfcf916b0183f29687c14bf704d023ddd0619f347ef0b509766ee2cebdb8f868538036de07a64c005293c9
-
Filesize
545KB
MD5eece34459c258bb3efbe455efe128219
SHA1c3e2b6e242c61ffa8dc064e3ecc3dfa48462db6c
SHA25626ab55e9db0cbac6b4c0ad946e81d33eb6fb936daba02d9c3434f29286687989
SHA5120685b74bcfcf6eed0da06116a5239194c490ec580022f36996636fa3b8fcf90c03adbbd658df77631e8da897954048a23d91f692d2f5b11d45dc3604d4056967
-
Filesize
545KB
MD5eece34459c258bb3efbe455efe128219
SHA1c3e2b6e242c61ffa8dc064e3ecc3dfa48462db6c
SHA25626ab55e9db0cbac6b4c0ad946e81d33eb6fb936daba02d9c3434f29286687989
SHA5120685b74bcfcf6eed0da06116a5239194c490ec580022f36996636fa3b8fcf90c03adbbd658df77631e8da897954048a23d91f692d2f5b11d45dc3604d4056967
-
Filesize
379KB
MD51bab27d7163ab9f8bda4d036ab12257c
SHA1a0cbddc76f2fa521502fc7f567ab3172578c1ea3
SHA256d6b7bc487e3cdcf4bc9d5f797ca7af6e0cd853ca4c5822b3db1e975c54870977
SHA5129c3bb9dbe7cf46d9f8209fa35ba0477c186617812e30aa9f0102e28fea263f84705e0e2d8e02eaa45e13914b1348bfe15a6606623736eebe4b3d5135c42c88b0
-
Filesize
379KB
MD51bab27d7163ab9f8bda4d036ab12257c
SHA1a0cbddc76f2fa521502fc7f567ab3172578c1ea3
SHA256d6b7bc487e3cdcf4bc9d5f797ca7af6e0cd853ca4c5822b3db1e975c54870977
SHA5129c3bb9dbe7cf46d9f8209fa35ba0477c186617812e30aa9f0102e28fea263f84705e0e2d8e02eaa45e13914b1348bfe15a6606623736eebe4b3d5135c42c88b0
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8
-
Filesize
805KB
MD528312cb6a5b89c64f5c071017db7b011
SHA167c298fab6c3a3369a5766679430dbfc4d5bfcb5
SHA256ba81922b6e31c885a999476218e0bbf6c266da3418116f18a51965f4c2a92906
SHA5121e081f52ee06b23921b8655fff932e023711206663dfcf916b0183f29687c14bf704d023ddd0619f347ef0b509766ee2cebdb8f868538036de07a64c005293c9
-
Filesize
805KB
MD528312cb6a5b89c64f5c071017db7b011
SHA167c298fab6c3a3369a5766679430dbfc4d5bfcb5
SHA256ba81922b6e31c885a999476218e0bbf6c266da3418116f18a51965f4c2a92906
SHA5121e081f52ee06b23921b8655fff932e023711206663dfcf916b0183f29687c14bf704d023ddd0619f347ef0b509766ee2cebdb8f868538036de07a64c005293c9
-
Filesize
545KB
MD5eece34459c258bb3efbe455efe128219
SHA1c3e2b6e242c61ffa8dc064e3ecc3dfa48462db6c
SHA25626ab55e9db0cbac6b4c0ad946e81d33eb6fb936daba02d9c3434f29286687989
SHA5120685b74bcfcf6eed0da06116a5239194c490ec580022f36996636fa3b8fcf90c03adbbd658df77631e8da897954048a23d91f692d2f5b11d45dc3604d4056967
-
Filesize
545KB
MD5eece34459c258bb3efbe455efe128219
SHA1c3e2b6e242c61ffa8dc064e3ecc3dfa48462db6c
SHA25626ab55e9db0cbac6b4c0ad946e81d33eb6fb936daba02d9c3434f29286687989
SHA5120685b74bcfcf6eed0da06116a5239194c490ec580022f36996636fa3b8fcf90c03adbbd658df77631e8da897954048a23d91f692d2f5b11d45dc3604d4056967
-
Filesize
379KB
MD51bab27d7163ab9f8bda4d036ab12257c
SHA1a0cbddc76f2fa521502fc7f567ab3172578c1ea3
SHA256d6b7bc487e3cdcf4bc9d5f797ca7af6e0cd853ca4c5822b3db1e975c54870977
SHA5129c3bb9dbe7cf46d9f8209fa35ba0477c186617812e30aa9f0102e28fea263f84705e0e2d8e02eaa45e13914b1348bfe15a6606623736eebe4b3d5135c42c88b0
-
Filesize
379KB
MD51bab27d7163ab9f8bda4d036ab12257c
SHA1a0cbddc76f2fa521502fc7f567ab3172578c1ea3
SHA256d6b7bc487e3cdcf4bc9d5f797ca7af6e0cd853ca4c5822b3db1e975c54870977
SHA5129c3bb9dbe7cf46d9f8209fa35ba0477c186617812e30aa9f0102e28fea263f84705e0e2d8e02eaa45e13914b1348bfe15a6606623736eebe4b3d5135c42c88b0
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8
-
Filesize
350KB
MD56a7bd3df749fe0430af6b0bfb719f709
SHA11494fec74afd56d5896543cb82687ed436ba401d
SHA2561535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31
SHA5125ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8