Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:54

General

  • Target

    60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe

  • Size

    907KB

  • MD5

    3ac63f44e31d4d7e78fc11853827282c

  • SHA1

    13fb3b5448d5d9641ea6a9416ac1712fc4ad4ffd

  • SHA256

    60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772

  • SHA512

    3e77cd94ff13b7ddd931294129e3368ede1c0474e1cf5e4df041c6eafe5f2fa1e09d02ff1403a0dd35b778875e2770f18ea2ba0bb96f488d630d49ce0a6bd775

  • SSDEEP

    12288:/Mrby90kLRsfKdMbGJW/4UCTIQTeODGL/PYX0OqOJ5ICEgur6UIIVa88zhHkFwg4:cyrLYKdMgW/KpeOAP+0SPIheU7UuU

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe
    "C:\Users\Admin\AppData\Local\Temp\60cab3014b05ed8fea9e2be10cf833834c14d2184abbb754498ba36043d36772.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1653564.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1653564.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3536261.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3536261.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3445802.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3445802.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2620
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2780
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 268
                7⤵
                • Program crash
                PID:2520
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1653564.exe

    Filesize

    805KB

    MD5

    28312cb6a5b89c64f5c071017db7b011

    SHA1

    67c298fab6c3a3369a5766679430dbfc4d5bfcb5

    SHA256

    ba81922b6e31c885a999476218e0bbf6c266da3418116f18a51965f4c2a92906

    SHA512

    1e081f52ee06b23921b8655fff932e023711206663dfcf916b0183f29687c14bf704d023ddd0619f347ef0b509766ee2cebdb8f868538036de07a64c005293c9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1653564.exe

    Filesize

    805KB

    MD5

    28312cb6a5b89c64f5c071017db7b011

    SHA1

    67c298fab6c3a3369a5766679430dbfc4d5bfcb5

    SHA256

    ba81922b6e31c885a999476218e0bbf6c266da3418116f18a51965f4c2a92906

    SHA512

    1e081f52ee06b23921b8655fff932e023711206663dfcf916b0183f29687c14bf704d023ddd0619f347ef0b509766ee2cebdb8f868538036de07a64c005293c9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3536261.exe

    Filesize

    545KB

    MD5

    eece34459c258bb3efbe455efe128219

    SHA1

    c3e2b6e242c61ffa8dc064e3ecc3dfa48462db6c

    SHA256

    26ab55e9db0cbac6b4c0ad946e81d33eb6fb936daba02d9c3434f29286687989

    SHA512

    0685b74bcfcf6eed0da06116a5239194c490ec580022f36996636fa3b8fcf90c03adbbd658df77631e8da897954048a23d91f692d2f5b11d45dc3604d4056967

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3536261.exe

    Filesize

    545KB

    MD5

    eece34459c258bb3efbe455efe128219

    SHA1

    c3e2b6e242c61ffa8dc064e3ecc3dfa48462db6c

    SHA256

    26ab55e9db0cbac6b4c0ad946e81d33eb6fb936daba02d9c3434f29286687989

    SHA512

    0685b74bcfcf6eed0da06116a5239194c490ec580022f36996636fa3b8fcf90c03adbbd658df77631e8da897954048a23d91f692d2f5b11d45dc3604d4056967

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3445802.exe

    Filesize

    379KB

    MD5

    1bab27d7163ab9f8bda4d036ab12257c

    SHA1

    a0cbddc76f2fa521502fc7f567ab3172578c1ea3

    SHA256

    d6b7bc487e3cdcf4bc9d5f797ca7af6e0cd853ca4c5822b3db1e975c54870977

    SHA512

    9c3bb9dbe7cf46d9f8209fa35ba0477c186617812e30aa9f0102e28fea263f84705e0e2d8e02eaa45e13914b1348bfe15a6606623736eebe4b3d5135c42c88b0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3445802.exe

    Filesize

    379KB

    MD5

    1bab27d7163ab9f8bda4d036ab12257c

    SHA1

    a0cbddc76f2fa521502fc7f567ab3172578c1ea3

    SHA256

    d6b7bc487e3cdcf4bc9d5f797ca7af6e0cd853ca4c5822b3db1e975c54870977

    SHA512

    9c3bb9dbe7cf46d9f8209fa35ba0477c186617812e30aa9f0102e28fea263f84705e0e2d8e02eaa45e13914b1348bfe15a6606623736eebe4b3d5135c42c88b0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1653564.exe

    Filesize

    805KB

    MD5

    28312cb6a5b89c64f5c071017db7b011

    SHA1

    67c298fab6c3a3369a5766679430dbfc4d5bfcb5

    SHA256

    ba81922b6e31c885a999476218e0bbf6c266da3418116f18a51965f4c2a92906

    SHA512

    1e081f52ee06b23921b8655fff932e023711206663dfcf916b0183f29687c14bf704d023ddd0619f347ef0b509766ee2cebdb8f868538036de07a64c005293c9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1653564.exe

    Filesize

    805KB

    MD5

    28312cb6a5b89c64f5c071017db7b011

    SHA1

    67c298fab6c3a3369a5766679430dbfc4d5bfcb5

    SHA256

    ba81922b6e31c885a999476218e0bbf6c266da3418116f18a51965f4c2a92906

    SHA512

    1e081f52ee06b23921b8655fff932e023711206663dfcf916b0183f29687c14bf704d023ddd0619f347ef0b509766ee2cebdb8f868538036de07a64c005293c9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3536261.exe

    Filesize

    545KB

    MD5

    eece34459c258bb3efbe455efe128219

    SHA1

    c3e2b6e242c61ffa8dc064e3ecc3dfa48462db6c

    SHA256

    26ab55e9db0cbac6b4c0ad946e81d33eb6fb936daba02d9c3434f29286687989

    SHA512

    0685b74bcfcf6eed0da06116a5239194c490ec580022f36996636fa3b8fcf90c03adbbd658df77631e8da897954048a23d91f692d2f5b11d45dc3604d4056967

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3536261.exe

    Filesize

    545KB

    MD5

    eece34459c258bb3efbe455efe128219

    SHA1

    c3e2b6e242c61ffa8dc064e3ecc3dfa48462db6c

    SHA256

    26ab55e9db0cbac6b4c0ad946e81d33eb6fb936daba02d9c3434f29286687989

    SHA512

    0685b74bcfcf6eed0da06116a5239194c490ec580022f36996636fa3b8fcf90c03adbbd658df77631e8da897954048a23d91f692d2f5b11d45dc3604d4056967

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3445802.exe

    Filesize

    379KB

    MD5

    1bab27d7163ab9f8bda4d036ab12257c

    SHA1

    a0cbddc76f2fa521502fc7f567ab3172578c1ea3

    SHA256

    d6b7bc487e3cdcf4bc9d5f797ca7af6e0cd853ca4c5822b3db1e975c54870977

    SHA512

    9c3bb9dbe7cf46d9f8209fa35ba0477c186617812e30aa9f0102e28fea263f84705e0e2d8e02eaa45e13914b1348bfe15a6606623736eebe4b3d5135c42c88b0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3445802.exe

    Filesize

    379KB

    MD5

    1bab27d7163ab9f8bda4d036ab12257c

    SHA1

    a0cbddc76f2fa521502fc7f567ab3172578c1ea3

    SHA256

    d6b7bc487e3cdcf4bc9d5f797ca7af6e0cd853ca4c5822b3db1e975c54870977

    SHA512

    9c3bb9dbe7cf46d9f8209fa35ba0477c186617812e30aa9f0102e28fea263f84705e0e2d8e02eaa45e13914b1348bfe15a6606623736eebe4b3d5135c42c88b0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0937261.exe

    Filesize

    350KB

    MD5

    6a7bd3df749fe0430af6b0bfb719f709

    SHA1

    1494fec74afd56d5896543cb82687ed436ba401d

    SHA256

    1535e80fdacf9c70a9c09a582c16ea290812bcaad6578b48e46974da985f8f31

    SHA512

    5ce784b854ec87196b02428a5ecb460f72432edd742bf824ea0215e92b60b5afe6592d28861c068b63c299c9ca54c7a78adbb87c0a5ede8b6b1e74af476bbcf8

  • memory/2780-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2780-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2780-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2780-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2780-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2780-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2780-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2780-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2780-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2780-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB