Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 10:39

General

  • Target

    8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe

  • Size

    908KB

  • MD5

    29ee3db1a85d1a888c0059a7e4a290c2

  • SHA1

    f85d0a6321d53ce58ad759813ce9efe0d04b17bf

  • SHA256

    8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9

  • SHA512

    762455e6bcbe264db1b99908a4fbe634c4ddfcfd546ffc31d223bbc6c3abccae17d31951335c81e0d8c24808ffd1a56f3a5e894d876e72308bfdbfc98625e166

  • SSDEEP

    24576:Yy7/kIqEv6hnRhwq9bIJiTirbKJAa8BhEGTaZAX4:f7/kjg59rbraWh3c

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe
    "C:\Users\Admin\AppData\Local\Temp\8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2615033.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2615033.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6955074.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6955074.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5346659.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5346659.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2772
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 268
                7⤵
                • Program crash
                PID:2528
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2644

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2615033.exe

          Filesize

          806KB

          MD5

          e445a9bf16f89fbc49267113999c07c0

          SHA1

          199a72b0e55896e85a7f6f7f52cb41d15a25cea2

          SHA256

          5ea80ca83ad5f24a80d802e76ebcb8453bdb545506513f6648f409245ec9323a

          SHA512

          da50ef4c97a38c1f5a92eb8ea97321828fd106bb3647e2ecd76a46ab5e41f247bfe37e08f02f306367f42545cb535cbf5299c1370bdec12445e0d1b0508a9ad3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2615033.exe

          Filesize

          806KB

          MD5

          e445a9bf16f89fbc49267113999c07c0

          SHA1

          199a72b0e55896e85a7f6f7f52cb41d15a25cea2

          SHA256

          5ea80ca83ad5f24a80d802e76ebcb8453bdb545506513f6648f409245ec9323a

          SHA512

          da50ef4c97a38c1f5a92eb8ea97321828fd106bb3647e2ecd76a46ab5e41f247bfe37e08f02f306367f42545cb535cbf5299c1370bdec12445e0d1b0508a9ad3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6955074.exe

          Filesize

          545KB

          MD5

          6032517216bbcd9e27c0206572127813

          SHA1

          3c5f5aed93ccf0e4f49998c2dc55b876d4c34a2b

          SHA256

          5568bb28e3df7736318face66e3f5de7071621c2f11df972a5be083457559f0a

          SHA512

          fc6b0c598ebc24dc6a355fb3358d012d08fbd5a6ab33369d135d1045a94b877cae21ac64cf5d167f4e7b3f5f6d6a49138c3443e90ace6fbd18bdb4ba35fb95aa

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6955074.exe

          Filesize

          545KB

          MD5

          6032517216bbcd9e27c0206572127813

          SHA1

          3c5f5aed93ccf0e4f49998c2dc55b876d4c34a2b

          SHA256

          5568bb28e3df7736318face66e3f5de7071621c2f11df972a5be083457559f0a

          SHA512

          fc6b0c598ebc24dc6a355fb3358d012d08fbd5a6ab33369d135d1045a94b877cae21ac64cf5d167f4e7b3f5f6d6a49138c3443e90ace6fbd18bdb4ba35fb95aa

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5346659.exe

          Filesize

          379KB

          MD5

          2eb9b7dd17e5d867b12327beb8772f54

          SHA1

          c4a1af27f0ba10d208eb0366fa37e493d60153f1

          SHA256

          fc2f806d3582304d1f4129199df9f81b5b787e3dbb1161cb9e0c148e4e978109

          SHA512

          0a50ee67c070f32ffa44f58268f49c8e4a6e81c1647c595caeff99ce7c75aab520ce36f33a513776f62021e8fd901874112e7ef2494324e7c76bc8d99e0fab6b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5346659.exe

          Filesize

          379KB

          MD5

          2eb9b7dd17e5d867b12327beb8772f54

          SHA1

          c4a1af27f0ba10d208eb0366fa37e493d60153f1

          SHA256

          fc2f806d3582304d1f4129199df9f81b5b787e3dbb1161cb9e0c148e4e978109

          SHA512

          0a50ee67c070f32ffa44f58268f49c8e4a6e81c1647c595caeff99ce7c75aab520ce36f33a513776f62021e8fd901874112e7ef2494324e7c76bc8d99e0fab6b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2615033.exe

          Filesize

          806KB

          MD5

          e445a9bf16f89fbc49267113999c07c0

          SHA1

          199a72b0e55896e85a7f6f7f52cb41d15a25cea2

          SHA256

          5ea80ca83ad5f24a80d802e76ebcb8453bdb545506513f6648f409245ec9323a

          SHA512

          da50ef4c97a38c1f5a92eb8ea97321828fd106bb3647e2ecd76a46ab5e41f247bfe37e08f02f306367f42545cb535cbf5299c1370bdec12445e0d1b0508a9ad3

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2615033.exe

          Filesize

          806KB

          MD5

          e445a9bf16f89fbc49267113999c07c0

          SHA1

          199a72b0e55896e85a7f6f7f52cb41d15a25cea2

          SHA256

          5ea80ca83ad5f24a80d802e76ebcb8453bdb545506513f6648f409245ec9323a

          SHA512

          da50ef4c97a38c1f5a92eb8ea97321828fd106bb3647e2ecd76a46ab5e41f247bfe37e08f02f306367f42545cb535cbf5299c1370bdec12445e0d1b0508a9ad3

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6955074.exe

          Filesize

          545KB

          MD5

          6032517216bbcd9e27c0206572127813

          SHA1

          3c5f5aed93ccf0e4f49998c2dc55b876d4c34a2b

          SHA256

          5568bb28e3df7736318face66e3f5de7071621c2f11df972a5be083457559f0a

          SHA512

          fc6b0c598ebc24dc6a355fb3358d012d08fbd5a6ab33369d135d1045a94b877cae21ac64cf5d167f4e7b3f5f6d6a49138c3443e90ace6fbd18bdb4ba35fb95aa

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6955074.exe

          Filesize

          545KB

          MD5

          6032517216bbcd9e27c0206572127813

          SHA1

          3c5f5aed93ccf0e4f49998c2dc55b876d4c34a2b

          SHA256

          5568bb28e3df7736318face66e3f5de7071621c2f11df972a5be083457559f0a

          SHA512

          fc6b0c598ebc24dc6a355fb3358d012d08fbd5a6ab33369d135d1045a94b877cae21ac64cf5d167f4e7b3f5f6d6a49138c3443e90ace6fbd18bdb4ba35fb95aa

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5346659.exe

          Filesize

          379KB

          MD5

          2eb9b7dd17e5d867b12327beb8772f54

          SHA1

          c4a1af27f0ba10d208eb0366fa37e493d60153f1

          SHA256

          fc2f806d3582304d1f4129199df9f81b5b787e3dbb1161cb9e0c148e4e978109

          SHA512

          0a50ee67c070f32ffa44f58268f49c8e4a6e81c1647c595caeff99ce7c75aab520ce36f33a513776f62021e8fd901874112e7ef2494324e7c76bc8d99e0fab6b

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5346659.exe

          Filesize

          379KB

          MD5

          2eb9b7dd17e5d867b12327beb8772f54

          SHA1

          c4a1af27f0ba10d208eb0366fa37e493d60153f1

          SHA256

          fc2f806d3582304d1f4129199df9f81b5b787e3dbb1161cb9e0c148e4e978109

          SHA512

          0a50ee67c070f32ffa44f58268f49c8e4a6e81c1647c595caeff99ce7c75aab520ce36f33a513776f62021e8fd901874112e7ef2494324e7c76bc8d99e0fab6b

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe

          Filesize

          350KB

          MD5

          643de662678f4ed49caf554b2ae55508

          SHA1

          1ff9bf02484a4d1985c070efea046b69785919c4

          SHA256

          3e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91

          SHA512

          27402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555

        • memory/2772-50-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2772-54-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2772-48-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2772-47-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2772-52-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2772-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2772-46-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2772-45-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2772-43-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2772-44-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB