Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe
Resource
win10v2004-20230915-en
General
-
Target
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe
-
Size
908KB
-
MD5
29ee3db1a85d1a888c0059a7e4a290c2
-
SHA1
f85d0a6321d53ce58ad759813ce9efe0d04b17bf
-
SHA256
8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9
-
SHA512
762455e6bcbe264db1b99908a4fbe634c4ddfcfd546ffc31d223bbc6c3abccae17d31951335c81e0d8c24808ffd1a56f3a5e894d876e72308bfdbfc98625e166
-
SSDEEP
24576:Yy7/kIqEv6hnRhwq9bIJiTirbKJAa8BhEGTaZAX4:f7/kjg59rbraWh3c
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2772-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2772-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2772-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2772-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2772-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2772-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 3040 x2615033.exe 2584 x6955074.exe 2760 x5346659.exe 2740 g1079007.exe -
Loads dropped DLL 13 IoCs
pid Process 2392 8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe 3040 x2615033.exe 3040 x2615033.exe 2584 x6955074.exe 2584 x6955074.exe 2760 x5346659.exe 2760 x5346659.exe 2760 x5346659.exe 2740 g1079007.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2615033.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6955074.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5346659.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2740 set thread context of 2772 2740 g1079007.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2528 2772 WerFault.exe 32 2644 2740 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3040 2392 8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe 28 PID 2392 wrote to memory of 3040 2392 8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe 28 PID 2392 wrote to memory of 3040 2392 8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe 28 PID 2392 wrote to memory of 3040 2392 8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe 28 PID 2392 wrote to memory of 3040 2392 8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe 28 PID 2392 wrote to memory of 3040 2392 8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe 28 PID 2392 wrote to memory of 3040 2392 8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe 28 PID 3040 wrote to memory of 2584 3040 x2615033.exe 29 PID 3040 wrote to memory of 2584 3040 x2615033.exe 29 PID 3040 wrote to memory of 2584 3040 x2615033.exe 29 PID 3040 wrote to memory of 2584 3040 x2615033.exe 29 PID 3040 wrote to memory of 2584 3040 x2615033.exe 29 PID 3040 wrote to memory of 2584 3040 x2615033.exe 29 PID 3040 wrote to memory of 2584 3040 x2615033.exe 29 PID 2584 wrote to memory of 2760 2584 x6955074.exe 30 PID 2584 wrote to memory of 2760 2584 x6955074.exe 30 PID 2584 wrote to memory of 2760 2584 x6955074.exe 30 PID 2584 wrote to memory of 2760 2584 x6955074.exe 30 PID 2584 wrote to memory of 2760 2584 x6955074.exe 30 PID 2584 wrote to memory of 2760 2584 x6955074.exe 30 PID 2584 wrote to memory of 2760 2584 x6955074.exe 30 PID 2760 wrote to memory of 2740 2760 x5346659.exe 31 PID 2760 wrote to memory of 2740 2760 x5346659.exe 31 PID 2760 wrote to memory of 2740 2760 x5346659.exe 31 PID 2760 wrote to memory of 2740 2760 x5346659.exe 31 PID 2760 wrote to memory of 2740 2760 x5346659.exe 31 PID 2760 wrote to memory of 2740 2760 x5346659.exe 31 PID 2760 wrote to memory of 2740 2760 x5346659.exe 31 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2740 wrote to memory of 2772 2740 g1079007.exe 32 PID 2772 wrote to memory of 2528 2772 AppLaunch.exe 33 PID 2772 wrote to memory of 2528 2772 AppLaunch.exe 33 PID 2772 wrote to memory of 2528 2772 AppLaunch.exe 33 PID 2772 wrote to memory of 2528 2772 AppLaunch.exe 33 PID 2772 wrote to memory of 2528 2772 AppLaunch.exe 33 PID 2772 wrote to memory of 2528 2772 AppLaunch.exe 33 PID 2772 wrote to memory of 2528 2772 AppLaunch.exe 33 PID 2740 wrote to memory of 2644 2740 g1079007.exe 34 PID 2740 wrote to memory of 2644 2740 g1079007.exe 34 PID 2740 wrote to memory of 2644 2740 g1079007.exe 34 PID 2740 wrote to memory of 2644 2740 g1079007.exe 34 PID 2740 wrote to memory of 2644 2740 g1079007.exe 34 PID 2740 wrote to memory of 2644 2740 g1079007.exe 34 PID 2740 wrote to memory of 2644 2740 g1079007.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe"C:\Users\Admin\AppData\Local\Temp\8ed3ed8ae8dd31a991ab5e63e69161f502be26abd287705b1600b1d7122538c9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2615033.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2615033.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6955074.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6955074.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5346659.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5346659.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1079007.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 2687⤵
- Program crash
PID:2528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2644
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
806KB
MD5e445a9bf16f89fbc49267113999c07c0
SHA1199a72b0e55896e85a7f6f7f52cb41d15a25cea2
SHA2565ea80ca83ad5f24a80d802e76ebcb8453bdb545506513f6648f409245ec9323a
SHA512da50ef4c97a38c1f5a92eb8ea97321828fd106bb3647e2ecd76a46ab5e41f247bfe37e08f02f306367f42545cb535cbf5299c1370bdec12445e0d1b0508a9ad3
-
Filesize
806KB
MD5e445a9bf16f89fbc49267113999c07c0
SHA1199a72b0e55896e85a7f6f7f52cb41d15a25cea2
SHA2565ea80ca83ad5f24a80d802e76ebcb8453bdb545506513f6648f409245ec9323a
SHA512da50ef4c97a38c1f5a92eb8ea97321828fd106bb3647e2ecd76a46ab5e41f247bfe37e08f02f306367f42545cb535cbf5299c1370bdec12445e0d1b0508a9ad3
-
Filesize
545KB
MD56032517216bbcd9e27c0206572127813
SHA13c5f5aed93ccf0e4f49998c2dc55b876d4c34a2b
SHA2565568bb28e3df7736318face66e3f5de7071621c2f11df972a5be083457559f0a
SHA512fc6b0c598ebc24dc6a355fb3358d012d08fbd5a6ab33369d135d1045a94b877cae21ac64cf5d167f4e7b3f5f6d6a49138c3443e90ace6fbd18bdb4ba35fb95aa
-
Filesize
545KB
MD56032517216bbcd9e27c0206572127813
SHA13c5f5aed93ccf0e4f49998c2dc55b876d4c34a2b
SHA2565568bb28e3df7736318face66e3f5de7071621c2f11df972a5be083457559f0a
SHA512fc6b0c598ebc24dc6a355fb3358d012d08fbd5a6ab33369d135d1045a94b877cae21ac64cf5d167f4e7b3f5f6d6a49138c3443e90ace6fbd18bdb4ba35fb95aa
-
Filesize
379KB
MD52eb9b7dd17e5d867b12327beb8772f54
SHA1c4a1af27f0ba10d208eb0366fa37e493d60153f1
SHA256fc2f806d3582304d1f4129199df9f81b5b787e3dbb1161cb9e0c148e4e978109
SHA5120a50ee67c070f32ffa44f58268f49c8e4a6e81c1647c595caeff99ce7c75aab520ce36f33a513776f62021e8fd901874112e7ef2494324e7c76bc8d99e0fab6b
-
Filesize
379KB
MD52eb9b7dd17e5d867b12327beb8772f54
SHA1c4a1af27f0ba10d208eb0366fa37e493d60153f1
SHA256fc2f806d3582304d1f4129199df9f81b5b787e3dbb1161cb9e0c148e4e978109
SHA5120a50ee67c070f32ffa44f58268f49c8e4a6e81c1647c595caeff99ce7c75aab520ce36f33a513776f62021e8fd901874112e7ef2494324e7c76bc8d99e0fab6b
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555
-
Filesize
806KB
MD5e445a9bf16f89fbc49267113999c07c0
SHA1199a72b0e55896e85a7f6f7f52cb41d15a25cea2
SHA2565ea80ca83ad5f24a80d802e76ebcb8453bdb545506513f6648f409245ec9323a
SHA512da50ef4c97a38c1f5a92eb8ea97321828fd106bb3647e2ecd76a46ab5e41f247bfe37e08f02f306367f42545cb535cbf5299c1370bdec12445e0d1b0508a9ad3
-
Filesize
806KB
MD5e445a9bf16f89fbc49267113999c07c0
SHA1199a72b0e55896e85a7f6f7f52cb41d15a25cea2
SHA2565ea80ca83ad5f24a80d802e76ebcb8453bdb545506513f6648f409245ec9323a
SHA512da50ef4c97a38c1f5a92eb8ea97321828fd106bb3647e2ecd76a46ab5e41f247bfe37e08f02f306367f42545cb535cbf5299c1370bdec12445e0d1b0508a9ad3
-
Filesize
545KB
MD56032517216bbcd9e27c0206572127813
SHA13c5f5aed93ccf0e4f49998c2dc55b876d4c34a2b
SHA2565568bb28e3df7736318face66e3f5de7071621c2f11df972a5be083457559f0a
SHA512fc6b0c598ebc24dc6a355fb3358d012d08fbd5a6ab33369d135d1045a94b877cae21ac64cf5d167f4e7b3f5f6d6a49138c3443e90ace6fbd18bdb4ba35fb95aa
-
Filesize
545KB
MD56032517216bbcd9e27c0206572127813
SHA13c5f5aed93ccf0e4f49998c2dc55b876d4c34a2b
SHA2565568bb28e3df7736318face66e3f5de7071621c2f11df972a5be083457559f0a
SHA512fc6b0c598ebc24dc6a355fb3358d012d08fbd5a6ab33369d135d1045a94b877cae21ac64cf5d167f4e7b3f5f6d6a49138c3443e90ace6fbd18bdb4ba35fb95aa
-
Filesize
379KB
MD52eb9b7dd17e5d867b12327beb8772f54
SHA1c4a1af27f0ba10d208eb0366fa37e493d60153f1
SHA256fc2f806d3582304d1f4129199df9f81b5b787e3dbb1161cb9e0c148e4e978109
SHA5120a50ee67c070f32ffa44f58268f49c8e4a6e81c1647c595caeff99ce7c75aab520ce36f33a513776f62021e8fd901874112e7ef2494324e7c76bc8d99e0fab6b
-
Filesize
379KB
MD52eb9b7dd17e5d867b12327beb8772f54
SHA1c4a1af27f0ba10d208eb0366fa37e493d60153f1
SHA256fc2f806d3582304d1f4129199df9f81b5b787e3dbb1161cb9e0c148e4e978109
SHA5120a50ee67c070f32ffa44f58268f49c8e4a6e81c1647c595caeff99ce7c75aab520ce36f33a513776f62021e8fd901874112e7ef2494324e7c76bc8d99e0fab6b
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555
-
Filesize
350KB
MD5643de662678f4ed49caf554b2ae55508
SHA11ff9bf02484a4d1985c070efea046b69785919c4
SHA2563e2165556542946533855899ffd1c65c6446e69237a4e98f45edc9abb792ea91
SHA51227402f74f068192cebc54e329065639e16d13a640ac5352027c99fef63aa2da1e6bbdbce06655d387f68117eb1b6ef7a721a10a314b4ab6a68755b0d7bf17555