Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 12:07
Static task
static1
Behavioral task
behavioral1
Sample
1ac99ba56d5fd0598449c266a89abdc6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1ac99ba56d5fd0598449c266a89abdc6.exe
Resource
win10v2004-20230915-en
General
-
Target
1ac99ba56d5fd0598449c266a89abdc6.exe
-
Size
942KB
-
MD5
1ac99ba56d5fd0598449c266a89abdc6
-
SHA1
5ec0706a25695446ec14c909d3d71e0b0b8ab5a5
-
SHA256
dc9042b69ab00a51de2ad8c298066a59c945bafe7df14db959a7a1ead1b7cdd6
-
SHA512
1bba277e3b0a452ab391644ebdf5e154aab513f1732b31dadc1ed48d31a9527f2778cdc28ddd7677f67dbf8e328af205f2a17fd788d3c9e7ea6e2fbd18617a8a
-
SSDEEP
24576:GyjszW7jNC4VBryxeArJhOwLBhtSSzVM534GheE35Ni:VZNUrzOwVhNzVZGhl
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2784-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2784-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2784-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2784-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2784-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2784-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 856 x3890278.exe 2104 x8725422.exe 2728 x8465136.exe 3052 g2870497.exe -
Loads dropped DLL 13 IoCs
pid Process 1168 1ac99ba56d5fd0598449c266a89abdc6.exe 856 x3890278.exe 856 x3890278.exe 2104 x8725422.exe 2104 x8725422.exe 2728 x8465136.exe 2728 x8465136.exe 2728 x8465136.exe 3052 g2870497.exe 2556 WerFault.exe 2556 WerFault.exe 2556 WerFault.exe 2556 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1ac99ba56d5fd0598449c266a89abdc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3890278.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8725422.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8465136.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 2784 3052 g2870497.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2556 3052 WerFault.exe 31 2692 2784 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1168 wrote to memory of 856 1168 1ac99ba56d5fd0598449c266a89abdc6.exe 28 PID 1168 wrote to memory of 856 1168 1ac99ba56d5fd0598449c266a89abdc6.exe 28 PID 1168 wrote to memory of 856 1168 1ac99ba56d5fd0598449c266a89abdc6.exe 28 PID 1168 wrote to memory of 856 1168 1ac99ba56d5fd0598449c266a89abdc6.exe 28 PID 1168 wrote to memory of 856 1168 1ac99ba56d5fd0598449c266a89abdc6.exe 28 PID 1168 wrote to memory of 856 1168 1ac99ba56d5fd0598449c266a89abdc6.exe 28 PID 1168 wrote to memory of 856 1168 1ac99ba56d5fd0598449c266a89abdc6.exe 28 PID 856 wrote to memory of 2104 856 x3890278.exe 29 PID 856 wrote to memory of 2104 856 x3890278.exe 29 PID 856 wrote to memory of 2104 856 x3890278.exe 29 PID 856 wrote to memory of 2104 856 x3890278.exe 29 PID 856 wrote to memory of 2104 856 x3890278.exe 29 PID 856 wrote to memory of 2104 856 x3890278.exe 29 PID 856 wrote to memory of 2104 856 x3890278.exe 29 PID 2104 wrote to memory of 2728 2104 x8725422.exe 30 PID 2104 wrote to memory of 2728 2104 x8725422.exe 30 PID 2104 wrote to memory of 2728 2104 x8725422.exe 30 PID 2104 wrote to memory of 2728 2104 x8725422.exe 30 PID 2104 wrote to memory of 2728 2104 x8725422.exe 30 PID 2104 wrote to memory of 2728 2104 x8725422.exe 30 PID 2104 wrote to memory of 2728 2104 x8725422.exe 30 PID 2728 wrote to memory of 3052 2728 x8465136.exe 31 PID 2728 wrote to memory of 3052 2728 x8465136.exe 31 PID 2728 wrote to memory of 3052 2728 x8465136.exe 31 PID 2728 wrote to memory of 3052 2728 x8465136.exe 31 PID 2728 wrote to memory of 3052 2728 x8465136.exe 31 PID 2728 wrote to memory of 3052 2728 x8465136.exe 31 PID 2728 wrote to memory of 3052 2728 x8465136.exe 31 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2784 3052 g2870497.exe 32 PID 3052 wrote to memory of 2556 3052 g2870497.exe 33 PID 3052 wrote to memory of 2556 3052 g2870497.exe 33 PID 3052 wrote to memory of 2556 3052 g2870497.exe 33 PID 3052 wrote to memory of 2556 3052 g2870497.exe 33 PID 3052 wrote to memory of 2556 3052 g2870497.exe 33 PID 3052 wrote to memory of 2556 3052 g2870497.exe 33 PID 3052 wrote to memory of 2556 3052 g2870497.exe 33 PID 2784 wrote to memory of 2692 2784 AppLaunch.exe 34 PID 2784 wrote to memory of 2692 2784 AppLaunch.exe 34 PID 2784 wrote to memory of 2692 2784 AppLaunch.exe 34 PID 2784 wrote to memory of 2692 2784 AppLaunch.exe 34 PID 2784 wrote to memory of 2692 2784 AppLaunch.exe 34 PID 2784 wrote to memory of 2692 2784 AppLaunch.exe 34 PID 2784 wrote to memory of 2692 2784 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ac99ba56d5fd0598449c266a89abdc6.exe"C:\Users\Admin\AppData\Local\Temp\1ac99ba56d5fd0598449c266a89abdc6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3890278.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3890278.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8725422.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8725422.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8465136.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8465136.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 2687⤵
- Program crash
PID:2692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2556
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD5663b8e0508ec439178f6690662414c10
SHA1d37ca5bb44cb7e0f608081f953d04abab5abfb33
SHA256aab243b9732e8d90b62da24129c1475fdda87c74e4bfe66bf2eb18b6f056f54c
SHA5125751a6e352d9d115c7d1c002b2ca07b692e15328fce22ce101bdb738d354fef5d169f66ce2fa9b55c3fe502a4c61f5fcf398713a774703bd60f5403287e6d586
-
Filesize
840KB
MD5663b8e0508ec439178f6690662414c10
SHA1d37ca5bb44cb7e0f608081f953d04abab5abfb33
SHA256aab243b9732e8d90b62da24129c1475fdda87c74e4bfe66bf2eb18b6f056f54c
SHA5125751a6e352d9d115c7d1c002b2ca07b692e15328fce22ce101bdb738d354fef5d169f66ce2fa9b55c3fe502a4c61f5fcf398713a774703bd60f5403287e6d586
-
Filesize
562KB
MD52e421f07e963062e3046b6eb78b0ef76
SHA1b26332dbadce83b9530629ac2f2bfef29ddf6fe7
SHA256c5b009939d03766574c0f575d1daf07b8bb9db5f3fc8f89b340f2ed651e9ecff
SHA5123304d530e0619c6f628b694ef9b158ee767af9c9f55dca91bc46c21157faf0b55ac543608c23ba2aa578e216e467869446b701a58351bde3839f2fac21b75b58
-
Filesize
562KB
MD52e421f07e963062e3046b6eb78b0ef76
SHA1b26332dbadce83b9530629ac2f2bfef29ddf6fe7
SHA256c5b009939d03766574c0f575d1daf07b8bb9db5f3fc8f89b340f2ed651e9ecff
SHA5123304d530e0619c6f628b694ef9b158ee767af9c9f55dca91bc46c21157faf0b55ac543608c23ba2aa578e216e467869446b701a58351bde3839f2fac21b75b58
-
Filesize
396KB
MD53f8a08eea714eb00fbc77a28d6fb0174
SHA1ffcad2677e4f22425d90886906af428e5be24bb3
SHA2567cac8ead3d290b5ceac40380ff63f5a6305195c38013a3d399c8a8c9d80c2e7f
SHA512d8892f364c7aca338c8229881e7f99cdcbed3a18048453ea58f4fc8f52cf4f15ba580151c2d66b421bd4e98d50c875f4c4c847e73398d1cf4fa6e887cf88f88b
-
Filesize
396KB
MD53f8a08eea714eb00fbc77a28d6fb0174
SHA1ffcad2677e4f22425d90886906af428e5be24bb3
SHA2567cac8ead3d290b5ceac40380ff63f5a6305195c38013a3d399c8a8c9d80c2e7f
SHA512d8892f364c7aca338c8229881e7f99cdcbed3a18048453ea58f4fc8f52cf4f15ba580151c2d66b421bd4e98d50c875f4c4c847e73398d1cf4fa6e887cf88f88b
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a
-
Filesize
840KB
MD5663b8e0508ec439178f6690662414c10
SHA1d37ca5bb44cb7e0f608081f953d04abab5abfb33
SHA256aab243b9732e8d90b62da24129c1475fdda87c74e4bfe66bf2eb18b6f056f54c
SHA5125751a6e352d9d115c7d1c002b2ca07b692e15328fce22ce101bdb738d354fef5d169f66ce2fa9b55c3fe502a4c61f5fcf398713a774703bd60f5403287e6d586
-
Filesize
840KB
MD5663b8e0508ec439178f6690662414c10
SHA1d37ca5bb44cb7e0f608081f953d04abab5abfb33
SHA256aab243b9732e8d90b62da24129c1475fdda87c74e4bfe66bf2eb18b6f056f54c
SHA5125751a6e352d9d115c7d1c002b2ca07b692e15328fce22ce101bdb738d354fef5d169f66ce2fa9b55c3fe502a4c61f5fcf398713a774703bd60f5403287e6d586
-
Filesize
562KB
MD52e421f07e963062e3046b6eb78b0ef76
SHA1b26332dbadce83b9530629ac2f2bfef29ddf6fe7
SHA256c5b009939d03766574c0f575d1daf07b8bb9db5f3fc8f89b340f2ed651e9ecff
SHA5123304d530e0619c6f628b694ef9b158ee767af9c9f55dca91bc46c21157faf0b55ac543608c23ba2aa578e216e467869446b701a58351bde3839f2fac21b75b58
-
Filesize
562KB
MD52e421f07e963062e3046b6eb78b0ef76
SHA1b26332dbadce83b9530629ac2f2bfef29ddf6fe7
SHA256c5b009939d03766574c0f575d1daf07b8bb9db5f3fc8f89b340f2ed651e9ecff
SHA5123304d530e0619c6f628b694ef9b158ee767af9c9f55dca91bc46c21157faf0b55ac543608c23ba2aa578e216e467869446b701a58351bde3839f2fac21b75b58
-
Filesize
396KB
MD53f8a08eea714eb00fbc77a28d6fb0174
SHA1ffcad2677e4f22425d90886906af428e5be24bb3
SHA2567cac8ead3d290b5ceac40380ff63f5a6305195c38013a3d399c8a8c9d80c2e7f
SHA512d8892f364c7aca338c8229881e7f99cdcbed3a18048453ea58f4fc8f52cf4f15ba580151c2d66b421bd4e98d50c875f4c4c847e73398d1cf4fa6e887cf88f88b
-
Filesize
396KB
MD53f8a08eea714eb00fbc77a28d6fb0174
SHA1ffcad2677e4f22425d90886906af428e5be24bb3
SHA2567cac8ead3d290b5ceac40380ff63f5a6305195c38013a3d399c8a8c9d80c2e7f
SHA512d8892f364c7aca338c8229881e7f99cdcbed3a18048453ea58f4fc8f52cf4f15ba580151c2d66b421bd4e98d50c875f4c4c847e73398d1cf4fa6e887cf88f88b
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a
-
Filesize
379KB
MD5dec7ce4bbb12f4ce65cf9d728fe7ba3d
SHA174d916b493c1ab88fd5777cce9347e4aef0625ec
SHA256987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f
SHA512527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a