Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe
Resource
win10v2004-20230915-en
General
-
Target
a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe
-
Size
942KB
-
MD5
2997330dc24069278ba40179573cbc33
-
SHA1
22db086a9b8601e6d821dd78d0c7fc33050192b7
-
SHA256
a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307
-
SHA512
ec3fc7f27b79667da0d27f6f076c844512f4c50acdf7d6c33361264136f53b70400f0f898654ab410f8266574449385b4d565332ba07516d071e7d4e6e159335
-
SSDEEP
24576:6yTp9WF5PkMUOsdYVsMS236AIkY4Ygj44:BdAF5AO8YRh6AC4YM
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2484-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2484-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2484-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2484-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2484-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2484-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 3056 x7666083.exe 908 x0332973.exe 1812 x7793671.exe 2788 g9857427.exe -
Loads dropped DLL 13 IoCs
pid Process 1800 a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe 3056 x7666083.exe 3056 x7666083.exe 908 x0332973.exe 908 x0332973.exe 1812 x7793671.exe 1812 x7793671.exe 1812 x7793671.exe 2788 g9857427.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7666083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0332973.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7793671.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2788 set thread context of 2484 2788 g9857427.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2848 2788 WerFault.exe 31 2680 2484 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1800 wrote to memory of 3056 1800 a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe 28 PID 1800 wrote to memory of 3056 1800 a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe 28 PID 1800 wrote to memory of 3056 1800 a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe 28 PID 1800 wrote to memory of 3056 1800 a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe 28 PID 1800 wrote to memory of 3056 1800 a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe 28 PID 1800 wrote to memory of 3056 1800 a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe 28 PID 1800 wrote to memory of 3056 1800 a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe 28 PID 3056 wrote to memory of 908 3056 x7666083.exe 29 PID 3056 wrote to memory of 908 3056 x7666083.exe 29 PID 3056 wrote to memory of 908 3056 x7666083.exe 29 PID 3056 wrote to memory of 908 3056 x7666083.exe 29 PID 3056 wrote to memory of 908 3056 x7666083.exe 29 PID 3056 wrote to memory of 908 3056 x7666083.exe 29 PID 3056 wrote to memory of 908 3056 x7666083.exe 29 PID 908 wrote to memory of 1812 908 x0332973.exe 30 PID 908 wrote to memory of 1812 908 x0332973.exe 30 PID 908 wrote to memory of 1812 908 x0332973.exe 30 PID 908 wrote to memory of 1812 908 x0332973.exe 30 PID 908 wrote to memory of 1812 908 x0332973.exe 30 PID 908 wrote to memory of 1812 908 x0332973.exe 30 PID 908 wrote to memory of 1812 908 x0332973.exe 30 PID 1812 wrote to memory of 2788 1812 x7793671.exe 31 PID 1812 wrote to memory of 2788 1812 x7793671.exe 31 PID 1812 wrote to memory of 2788 1812 x7793671.exe 31 PID 1812 wrote to memory of 2788 1812 x7793671.exe 31 PID 1812 wrote to memory of 2788 1812 x7793671.exe 31 PID 1812 wrote to memory of 2788 1812 x7793671.exe 31 PID 1812 wrote to memory of 2788 1812 x7793671.exe 31 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2788 wrote to memory of 2484 2788 g9857427.exe 32 PID 2484 wrote to memory of 2680 2484 AppLaunch.exe 34 PID 2484 wrote to memory of 2680 2484 AppLaunch.exe 34 PID 2484 wrote to memory of 2680 2484 AppLaunch.exe 34 PID 2484 wrote to memory of 2680 2484 AppLaunch.exe 34 PID 2484 wrote to memory of 2680 2484 AppLaunch.exe 34 PID 2484 wrote to memory of 2680 2484 AppLaunch.exe 34 PID 2484 wrote to memory of 2680 2484 AppLaunch.exe 34 PID 2788 wrote to memory of 2848 2788 g9857427.exe 33 PID 2788 wrote to memory of 2848 2788 g9857427.exe 33 PID 2788 wrote to memory of 2848 2788 g9857427.exe 33 PID 2788 wrote to memory of 2848 2788 g9857427.exe 33 PID 2788 wrote to memory of 2848 2788 g9857427.exe 33 PID 2788 wrote to memory of 2848 2788 g9857427.exe 33 PID 2788 wrote to memory of 2848 2788 g9857427.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe"C:\Users\Admin\AppData\Local\Temp\a7a673769beddf2dadcd114dba1ad54cd30d55a30ee099d84ecc34d032d80307.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7666083.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7666083.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0332973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0332973.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7793671.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7793671.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9857427.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9857427.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 2687⤵
- Program crash
PID:2680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2848
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD52b0439ea9869594741614eed687ea04a
SHA116df95ac11012660706ee5c1b6c52e8c9d569ee1
SHA25611b6b337144f9c44ebdbcede9e1d41e74ea826e6bee00de37591577708b809e5
SHA51224523df33f12afde0c15af39bf1a121a71f368b6c62654f590eb1f1a3444181c639ae53436e12b1941ae896814b72c765714a2266caf24069e212ab39d9762e7
-
Filesize
840KB
MD52b0439ea9869594741614eed687ea04a
SHA116df95ac11012660706ee5c1b6c52e8c9d569ee1
SHA25611b6b337144f9c44ebdbcede9e1d41e74ea826e6bee00de37591577708b809e5
SHA51224523df33f12afde0c15af39bf1a121a71f368b6c62654f590eb1f1a3444181c639ae53436e12b1941ae896814b72c765714a2266caf24069e212ab39d9762e7
-
Filesize
562KB
MD529324ed0ce58905b2a31a372297b883f
SHA1d48cb003b459eb539e918baf572acbfe276d4f18
SHA25690be0fa035a49586deeeffa1ef402da89be2bbc4954bc97d73340f21e71d78e6
SHA512f3be9b618d6151db4fdb05dcb061c97d71b1a23d4d3db65f72ee8d1caba98c34fa1f93fb7257593fc4caee4d514bab75a3cb114f85bd8a5aae2711db11e6e6fa
-
Filesize
562KB
MD529324ed0ce58905b2a31a372297b883f
SHA1d48cb003b459eb539e918baf572acbfe276d4f18
SHA25690be0fa035a49586deeeffa1ef402da89be2bbc4954bc97d73340f21e71d78e6
SHA512f3be9b618d6151db4fdb05dcb061c97d71b1a23d4d3db65f72ee8d1caba98c34fa1f93fb7257593fc4caee4d514bab75a3cb114f85bd8a5aae2711db11e6e6fa
-
Filesize
397KB
MD59d28c483455aca84bcbcedfd321114f6
SHA107428d9111ad0f5e0f6ef8d0c4b5e9b01dd0466d
SHA256548364b8a295f785b7d0102368d2a73a8d6bc66ac50c6464d7efbde9c66a7f7b
SHA512a71f7ade4efc0e9c53ece11ca40e59e3c6827b8f816ca7d20a0e213a41b65ec80d779541df0ac2ed573d264053a4108f7feb4dc3f6d454ed41c9eaca4fe1b307
-
Filesize
397KB
MD59d28c483455aca84bcbcedfd321114f6
SHA107428d9111ad0f5e0f6ef8d0c4b5e9b01dd0466d
SHA256548364b8a295f785b7d0102368d2a73a8d6bc66ac50c6464d7efbde9c66a7f7b
SHA512a71f7ade4efc0e9c53ece11ca40e59e3c6827b8f816ca7d20a0e213a41b65ec80d779541df0ac2ed573d264053a4108f7feb4dc3f6d454ed41c9eaca4fe1b307
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5
-
Filesize
840KB
MD52b0439ea9869594741614eed687ea04a
SHA116df95ac11012660706ee5c1b6c52e8c9d569ee1
SHA25611b6b337144f9c44ebdbcede9e1d41e74ea826e6bee00de37591577708b809e5
SHA51224523df33f12afde0c15af39bf1a121a71f368b6c62654f590eb1f1a3444181c639ae53436e12b1941ae896814b72c765714a2266caf24069e212ab39d9762e7
-
Filesize
840KB
MD52b0439ea9869594741614eed687ea04a
SHA116df95ac11012660706ee5c1b6c52e8c9d569ee1
SHA25611b6b337144f9c44ebdbcede9e1d41e74ea826e6bee00de37591577708b809e5
SHA51224523df33f12afde0c15af39bf1a121a71f368b6c62654f590eb1f1a3444181c639ae53436e12b1941ae896814b72c765714a2266caf24069e212ab39d9762e7
-
Filesize
562KB
MD529324ed0ce58905b2a31a372297b883f
SHA1d48cb003b459eb539e918baf572acbfe276d4f18
SHA25690be0fa035a49586deeeffa1ef402da89be2bbc4954bc97d73340f21e71d78e6
SHA512f3be9b618d6151db4fdb05dcb061c97d71b1a23d4d3db65f72ee8d1caba98c34fa1f93fb7257593fc4caee4d514bab75a3cb114f85bd8a5aae2711db11e6e6fa
-
Filesize
562KB
MD529324ed0ce58905b2a31a372297b883f
SHA1d48cb003b459eb539e918baf572acbfe276d4f18
SHA25690be0fa035a49586deeeffa1ef402da89be2bbc4954bc97d73340f21e71d78e6
SHA512f3be9b618d6151db4fdb05dcb061c97d71b1a23d4d3db65f72ee8d1caba98c34fa1f93fb7257593fc4caee4d514bab75a3cb114f85bd8a5aae2711db11e6e6fa
-
Filesize
397KB
MD59d28c483455aca84bcbcedfd321114f6
SHA107428d9111ad0f5e0f6ef8d0c4b5e9b01dd0466d
SHA256548364b8a295f785b7d0102368d2a73a8d6bc66ac50c6464d7efbde9c66a7f7b
SHA512a71f7ade4efc0e9c53ece11ca40e59e3c6827b8f816ca7d20a0e213a41b65ec80d779541df0ac2ed573d264053a4108f7feb4dc3f6d454ed41c9eaca4fe1b307
-
Filesize
397KB
MD59d28c483455aca84bcbcedfd321114f6
SHA107428d9111ad0f5e0f6ef8d0c4b5e9b01dd0466d
SHA256548364b8a295f785b7d0102368d2a73a8d6bc66ac50c6464d7efbde9c66a7f7b
SHA512a71f7ade4efc0e9c53ece11ca40e59e3c6827b8f816ca7d20a0e213a41b65ec80d779541df0ac2ed573d264053a4108f7feb4dc3f6d454ed41c9eaca4fe1b307
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5
-
Filesize
379KB
MD577f5b37f0824e69bea5bce1427ccb262
SHA1b6bbd446c5b335ee7c71923e27ce33f4778bc4e9
SHA2567787c8d510209e06bbc3b2856d08939da9d5195b4e230eee81afca93443f09c4
SHA512b17e1a73a577e797445a65876bb9a7372dd4642709db163aea3d46e16a0e5de08052a3c50db3b2ed0ddbd2d209922b3232712d0a210e648569a74f121356fab5