Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 12:07

General

  • Target

    1ac99ba56d5fd0598449c266a89abdc6.exe

  • Size

    942KB

  • MD5

    1ac99ba56d5fd0598449c266a89abdc6

  • SHA1

    5ec0706a25695446ec14c909d3d71e0b0b8ab5a5

  • SHA256

    dc9042b69ab00a51de2ad8c298066a59c945bafe7df14db959a7a1ead1b7cdd6

  • SHA512

    1bba277e3b0a452ab391644ebdf5e154aab513f1732b31dadc1ed48d31a9527f2778cdc28ddd7677f67dbf8e328af205f2a17fd788d3c9e7ea6e2fbd18617a8a

  • SSDEEP

    24576:GyjszW7jNC4VBryxeArJhOwLBhtSSzVM534GheE35Ni:VZNUrzOwVhNzVZGhl

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ac99ba56d5fd0598449c266a89abdc6.exe
    "C:\Users\Admin\AppData\Local\Temp\1ac99ba56d5fd0598449c266a89abdc6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3890278.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3890278.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8725422.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8725422.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8465136.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8465136.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3052
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2784
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 268
                7⤵
                • Program crash
                PID:2692
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3890278.exe

    Filesize

    840KB

    MD5

    663b8e0508ec439178f6690662414c10

    SHA1

    d37ca5bb44cb7e0f608081f953d04abab5abfb33

    SHA256

    aab243b9732e8d90b62da24129c1475fdda87c74e4bfe66bf2eb18b6f056f54c

    SHA512

    5751a6e352d9d115c7d1c002b2ca07b692e15328fce22ce101bdb738d354fef5d169f66ce2fa9b55c3fe502a4c61f5fcf398713a774703bd60f5403287e6d586

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3890278.exe

    Filesize

    840KB

    MD5

    663b8e0508ec439178f6690662414c10

    SHA1

    d37ca5bb44cb7e0f608081f953d04abab5abfb33

    SHA256

    aab243b9732e8d90b62da24129c1475fdda87c74e4bfe66bf2eb18b6f056f54c

    SHA512

    5751a6e352d9d115c7d1c002b2ca07b692e15328fce22ce101bdb738d354fef5d169f66ce2fa9b55c3fe502a4c61f5fcf398713a774703bd60f5403287e6d586

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8725422.exe

    Filesize

    562KB

    MD5

    2e421f07e963062e3046b6eb78b0ef76

    SHA1

    b26332dbadce83b9530629ac2f2bfef29ddf6fe7

    SHA256

    c5b009939d03766574c0f575d1daf07b8bb9db5f3fc8f89b340f2ed651e9ecff

    SHA512

    3304d530e0619c6f628b694ef9b158ee767af9c9f55dca91bc46c21157faf0b55ac543608c23ba2aa578e216e467869446b701a58351bde3839f2fac21b75b58

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8725422.exe

    Filesize

    562KB

    MD5

    2e421f07e963062e3046b6eb78b0ef76

    SHA1

    b26332dbadce83b9530629ac2f2bfef29ddf6fe7

    SHA256

    c5b009939d03766574c0f575d1daf07b8bb9db5f3fc8f89b340f2ed651e9ecff

    SHA512

    3304d530e0619c6f628b694ef9b158ee767af9c9f55dca91bc46c21157faf0b55ac543608c23ba2aa578e216e467869446b701a58351bde3839f2fac21b75b58

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8465136.exe

    Filesize

    396KB

    MD5

    3f8a08eea714eb00fbc77a28d6fb0174

    SHA1

    ffcad2677e4f22425d90886906af428e5be24bb3

    SHA256

    7cac8ead3d290b5ceac40380ff63f5a6305195c38013a3d399c8a8c9d80c2e7f

    SHA512

    d8892f364c7aca338c8229881e7f99cdcbed3a18048453ea58f4fc8f52cf4f15ba580151c2d66b421bd4e98d50c875f4c4c847e73398d1cf4fa6e887cf88f88b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8465136.exe

    Filesize

    396KB

    MD5

    3f8a08eea714eb00fbc77a28d6fb0174

    SHA1

    ffcad2677e4f22425d90886906af428e5be24bb3

    SHA256

    7cac8ead3d290b5ceac40380ff63f5a6305195c38013a3d399c8a8c9d80c2e7f

    SHA512

    d8892f364c7aca338c8229881e7f99cdcbed3a18048453ea58f4fc8f52cf4f15ba580151c2d66b421bd4e98d50c875f4c4c847e73398d1cf4fa6e887cf88f88b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3890278.exe

    Filesize

    840KB

    MD5

    663b8e0508ec439178f6690662414c10

    SHA1

    d37ca5bb44cb7e0f608081f953d04abab5abfb33

    SHA256

    aab243b9732e8d90b62da24129c1475fdda87c74e4bfe66bf2eb18b6f056f54c

    SHA512

    5751a6e352d9d115c7d1c002b2ca07b692e15328fce22ce101bdb738d354fef5d169f66ce2fa9b55c3fe502a4c61f5fcf398713a774703bd60f5403287e6d586

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3890278.exe

    Filesize

    840KB

    MD5

    663b8e0508ec439178f6690662414c10

    SHA1

    d37ca5bb44cb7e0f608081f953d04abab5abfb33

    SHA256

    aab243b9732e8d90b62da24129c1475fdda87c74e4bfe66bf2eb18b6f056f54c

    SHA512

    5751a6e352d9d115c7d1c002b2ca07b692e15328fce22ce101bdb738d354fef5d169f66ce2fa9b55c3fe502a4c61f5fcf398713a774703bd60f5403287e6d586

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x8725422.exe

    Filesize

    562KB

    MD5

    2e421f07e963062e3046b6eb78b0ef76

    SHA1

    b26332dbadce83b9530629ac2f2bfef29ddf6fe7

    SHA256

    c5b009939d03766574c0f575d1daf07b8bb9db5f3fc8f89b340f2ed651e9ecff

    SHA512

    3304d530e0619c6f628b694ef9b158ee767af9c9f55dca91bc46c21157faf0b55ac543608c23ba2aa578e216e467869446b701a58351bde3839f2fac21b75b58

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x8725422.exe

    Filesize

    562KB

    MD5

    2e421f07e963062e3046b6eb78b0ef76

    SHA1

    b26332dbadce83b9530629ac2f2bfef29ddf6fe7

    SHA256

    c5b009939d03766574c0f575d1daf07b8bb9db5f3fc8f89b340f2ed651e9ecff

    SHA512

    3304d530e0619c6f628b694ef9b158ee767af9c9f55dca91bc46c21157faf0b55ac543608c23ba2aa578e216e467869446b701a58351bde3839f2fac21b75b58

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8465136.exe

    Filesize

    396KB

    MD5

    3f8a08eea714eb00fbc77a28d6fb0174

    SHA1

    ffcad2677e4f22425d90886906af428e5be24bb3

    SHA256

    7cac8ead3d290b5ceac40380ff63f5a6305195c38013a3d399c8a8c9d80c2e7f

    SHA512

    d8892f364c7aca338c8229881e7f99cdcbed3a18048453ea58f4fc8f52cf4f15ba580151c2d66b421bd4e98d50c875f4c4c847e73398d1cf4fa6e887cf88f88b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8465136.exe

    Filesize

    396KB

    MD5

    3f8a08eea714eb00fbc77a28d6fb0174

    SHA1

    ffcad2677e4f22425d90886906af428e5be24bb3

    SHA256

    7cac8ead3d290b5ceac40380ff63f5a6305195c38013a3d399c8a8c9d80c2e7f

    SHA512

    d8892f364c7aca338c8229881e7f99cdcbed3a18048453ea58f4fc8f52cf4f15ba580151c2d66b421bd4e98d50c875f4c4c847e73398d1cf4fa6e887cf88f88b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2870497.exe

    Filesize

    379KB

    MD5

    dec7ce4bbb12f4ce65cf9d728fe7ba3d

    SHA1

    74d916b493c1ab88fd5777cce9347e4aef0625ec

    SHA256

    987629a2c49668ae86d94a1537a97b9449f2dc6cf34f8a73007abc0fcc95356f

    SHA512

    527ff5b4aaeb875092dacddfd58c80ae2be5229373a8b61116124ae984827c7817ddeb13bc160d84324bde41b5038042ee33db7f3a51f7232a9b1a77bb81301a

  • memory/2784-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2784-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2784-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2784-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2784-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2784-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2784-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2784-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2784-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2784-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB