Analysis
-
max time kernel
240s -
max time network
275s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe
Resource
win10v2004-20230915-en
General
-
Target
51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe
-
Size
907KB
-
MD5
7b61fca70858a86ec85fcebd41da9820
-
SHA1
0a380b3a51c31f39ee86a7d53402fdf012c4de25
-
SHA256
51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc
-
SHA512
e4ef51cea87392e2db77713c6dcf8bf945678ffee6f4cd6c332edee8588d247ce43f55d28bdeeb066aef916b682113411e5eab751410c662b63de63345bf775e
-
SSDEEP
24576:GyG6vSEAU6RfMTJeylrQnF8mZBbr8B/RIfX8JKpGJ1+SspC:VG66O6RfwJ7OF/PryRCX8cpH
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/304-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/304-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/304-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/304-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/304-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/304-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2760 x7393214.exe 2612 x6940264.exe 2464 x2984433.exe 2952 g3338667.exe -
Loads dropped DLL 13 IoCs
pid Process 2744 51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe 2760 x7393214.exe 2760 x7393214.exe 2612 x6940264.exe 2612 x6940264.exe 2464 x2984433.exe 2464 x2984433.exe 2464 x2984433.exe 2952 g3338667.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7393214.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6940264.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2984433.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2952 set thread context of 304 2952 g3338667.exe 31 -
Program crash 2 IoCs
pid pid_target Process procid_target 2724 2952 WerFault.exe 30 2792 304 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2760 2744 51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe 27 PID 2744 wrote to memory of 2760 2744 51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe 27 PID 2744 wrote to memory of 2760 2744 51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe 27 PID 2744 wrote to memory of 2760 2744 51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe 27 PID 2744 wrote to memory of 2760 2744 51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe 27 PID 2744 wrote to memory of 2760 2744 51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe 27 PID 2744 wrote to memory of 2760 2744 51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe 27 PID 2760 wrote to memory of 2612 2760 x7393214.exe 28 PID 2760 wrote to memory of 2612 2760 x7393214.exe 28 PID 2760 wrote to memory of 2612 2760 x7393214.exe 28 PID 2760 wrote to memory of 2612 2760 x7393214.exe 28 PID 2760 wrote to memory of 2612 2760 x7393214.exe 28 PID 2760 wrote to memory of 2612 2760 x7393214.exe 28 PID 2760 wrote to memory of 2612 2760 x7393214.exe 28 PID 2612 wrote to memory of 2464 2612 x6940264.exe 29 PID 2612 wrote to memory of 2464 2612 x6940264.exe 29 PID 2612 wrote to memory of 2464 2612 x6940264.exe 29 PID 2612 wrote to memory of 2464 2612 x6940264.exe 29 PID 2612 wrote to memory of 2464 2612 x6940264.exe 29 PID 2612 wrote to memory of 2464 2612 x6940264.exe 29 PID 2612 wrote to memory of 2464 2612 x6940264.exe 29 PID 2464 wrote to memory of 2952 2464 x2984433.exe 30 PID 2464 wrote to memory of 2952 2464 x2984433.exe 30 PID 2464 wrote to memory of 2952 2464 x2984433.exe 30 PID 2464 wrote to memory of 2952 2464 x2984433.exe 30 PID 2464 wrote to memory of 2952 2464 x2984433.exe 30 PID 2464 wrote to memory of 2952 2464 x2984433.exe 30 PID 2464 wrote to memory of 2952 2464 x2984433.exe 30 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 2952 wrote to memory of 304 2952 g3338667.exe 31 PID 304 wrote to memory of 2792 304 AppLaunch.exe 33 PID 304 wrote to memory of 2792 304 AppLaunch.exe 33 PID 304 wrote to memory of 2792 304 AppLaunch.exe 33 PID 304 wrote to memory of 2792 304 AppLaunch.exe 33 PID 304 wrote to memory of 2792 304 AppLaunch.exe 33 PID 304 wrote to memory of 2792 304 AppLaunch.exe 33 PID 304 wrote to memory of 2792 304 AppLaunch.exe 33 PID 2952 wrote to memory of 2724 2952 g3338667.exe 32 PID 2952 wrote to memory of 2724 2952 g3338667.exe 32 PID 2952 wrote to memory of 2724 2952 g3338667.exe 32 PID 2952 wrote to memory of 2724 2952 g3338667.exe 32 PID 2952 wrote to memory of 2724 2952 g3338667.exe 32 PID 2952 wrote to memory of 2724 2952 g3338667.exe 32 PID 2952 wrote to memory of 2724 2952 g3338667.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe"C:\Users\Admin\AppData\Local\Temp\51354cc43ad0b21398d0206f6c211f7294c7008abc8690f8f91bc0ed919d65bc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7393214.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7393214.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6940264.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6940264.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2984433.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2984433.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3338667.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3338667.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 304 -s 2687⤵
- Program crash
PID:2792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2724
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD59ede36f70a79c46bb9f6f0270187572b
SHA13922ce5422f4227f029be73b6b2364c2a45d1b80
SHA2563a5f13cb40690b8cf81e86026a9ec2071fa2fcd18600e3d9b152904a9b73348a
SHA5126c03301599f0202a3feb43830ab5b11448431a46ff9a79e3ffa15eadff3e406edfe99a3e0b070219253771d7a86de4494bb0f45614a53261907bb187a3e9818a
-
Filesize
805KB
MD59ede36f70a79c46bb9f6f0270187572b
SHA13922ce5422f4227f029be73b6b2364c2a45d1b80
SHA2563a5f13cb40690b8cf81e86026a9ec2071fa2fcd18600e3d9b152904a9b73348a
SHA5126c03301599f0202a3feb43830ab5b11448431a46ff9a79e3ffa15eadff3e406edfe99a3e0b070219253771d7a86de4494bb0f45614a53261907bb187a3e9818a
-
Filesize
544KB
MD51c6aff60dfbc07ab950895b8beb1be18
SHA1571a08f9457c2a040a7547d80f3574abb46c71dc
SHA25625e583b644a5080f64c4ba87c3d2967f73d75675e197423b46f1fa90e5f8c6f0
SHA5123c2b1e5385487b9ea575904e013650d3839532d6fc5f971e1a91dc6f8b8676d7c2dfb1d1b215354ffee03a0d692a08748569394b5ca3d60ce8580733d43587ea
-
Filesize
544KB
MD51c6aff60dfbc07ab950895b8beb1be18
SHA1571a08f9457c2a040a7547d80f3574abb46c71dc
SHA25625e583b644a5080f64c4ba87c3d2967f73d75675e197423b46f1fa90e5f8c6f0
SHA5123c2b1e5385487b9ea575904e013650d3839532d6fc5f971e1a91dc6f8b8676d7c2dfb1d1b215354ffee03a0d692a08748569394b5ca3d60ce8580733d43587ea
-
Filesize
379KB
MD58d12ac820522ea8c2fa3a0668b0b3c6f
SHA13a8062aaa3530b8cf53a44140625e491f26118c8
SHA2562ef0d846f9cff6d2f97a6e709aea80bab40fe961734a8d399f32d4f57dac5023
SHA5129684d106288ef5795cb245da0e4975f9a37da3d666a563f47af7b2c503406442f02231d2e29962c6a948349a79663083cc1c838ed9fbd6ff94d74aceb115195f
-
Filesize
379KB
MD58d12ac820522ea8c2fa3a0668b0b3c6f
SHA13a8062aaa3530b8cf53a44140625e491f26118c8
SHA2562ef0d846f9cff6d2f97a6e709aea80bab40fe961734a8d399f32d4f57dac5023
SHA5129684d106288ef5795cb245da0e4975f9a37da3d666a563f47af7b2c503406442f02231d2e29962c6a948349a79663083cc1c838ed9fbd6ff94d74aceb115195f
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e
-
Filesize
805KB
MD59ede36f70a79c46bb9f6f0270187572b
SHA13922ce5422f4227f029be73b6b2364c2a45d1b80
SHA2563a5f13cb40690b8cf81e86026a9ec2071fa2fcd18600e3d9b152904a9b73348a
SHA5126c03301599f0202a3feb43830ab5b11448431a46ff9a79e3ffa15eadff3e406edfe99a3e0b070219253771d7a86de4494bb0f45614a53261907bb187a3e9818a
-
Filesize
805KB
MD59ede36f70a79c46bb9f6f0270187572b
SHA13922ce5422f4227f029be73b6b2364c2a45d1b80
SHA2563a5f13cb40690b8cf81e86026a9ec2071fa2fcd18600e3d9b152904a9b73348a
SHA5126c03301599f0202a3feb43830ab5b11448431a46ff9a79e3ffa15eadff3e406edfe99a3e0b070219253771d7a86de4494bb0f45614a53261907bb187a3e9818a
-
Filesize
544KB
MD51c6aff60dfbc07ab950895b8beb1be18
SHA1571a08f9457c2a040a7547d80f3574abb46c71dc
SHA25625e583b644a5080f64c4ba87c3d2967f73d75675e197423b46f1fa90e5f8c6f0
SHA5123c2b1e5385487b9ea575904e013650d3839532d6fc5f971e1a91dc6f8b8676d7c2dfb1d1b215354ffee03a0d692a08748569394b5ca3d60ce8580733d43587ea
-
Filesize
544KB
MD51c6aff60dfbc07ab950895b8beb1be18
SHA1571a08f9457c2a040a7547d80f3574abb46c71dc
SHA25625e583b644a5080f64c4ba87c3d2967f73d75675e197423b46f1fa90e5f8c6f0
SHA5123c2b1e5385487b9ea575904e013650d3839532d6fc5f971e1a91dc6f8b8676d7c2dfb1d1b215354ffee03a0d692a08748569394b5ca3d60ce8580733d43587ea
-
Filesize
379KB
MD58d12ac820522ea8c2fa3a0668b0b3c6f
SHA13a8062aaa3530b8cf53a44140625e491f26118c8
SHA2562ef0d846f9cff6d2f97a6e709aea80bab40fe961734a8d399f32d4f57dac5023
SHA5129684d106288ef5795cb245da0e4975f9a37da3d666a563f47af7b2c503406442f02231d2e29962c6a948349a79663083cc1c838ed9fbd6ff94d74aceb115195f
-
Filesize
379KB
MD58d12ac820522ea8c2fa3a0668b0b3c6f
SHA13a8062aaa3530b8cf53a44140625e491f26118c8
SHA2562ef0d846f9cff6d2f97a6e709aea80bab40fe961734a8d399f32d4f57dac5023
SHA5129684d106288ef5795cb245da0e4975f9a37da3d666a563f47af7b2c503406442f02231d2e29962c6a948349a79663083cc1c838ed9fbd6ff94d74aceb115195f
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e
-
Filesize
350KB
MD5b9aedbd551d4a3ebbf91fb9cdf362d49
SHA1135cb3f099295f2ca2af4c0e30110167480ab742
SHA2568f85399cc1edc4660e30b818303c62af3244f69091ab75a7b57a97c71bb91c99
SHA5127b61c2c8ac7274b655e7df1e752ba1908415aad47506df572036a113112599a4d365e4bfdc812028f4bb799ea5d294c7f920f878a8344f1c5950fd22f585b52e