Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 12:24

General

  • Target

    e7079098bd75d91e0fa86c2096a0d904.exe

  • Size

    942KB

  • MD5

    e7079098bd75d91e0fa86c2096a0d904

  • SHA1

    0e7a54978b527ea03efca6789ee29a8f84779277

  • SHA256

    0e70a693d0da2e40dbaa727db26d423a73fec3b83c93a32233bdd729f8fcf02d

  • SHA512

    4fc9064311e7eb1e1f2ecec0f27774e113aca898938f888ed994de6f669633374869021f205b2b52123b75e4f7141ade31e6879edc7877b28511513ed83dba2d

  • SSDEEP

    24576:By5tA9uRA+jH0aIMG0AWr6lRxL4Yjp0QkCCN:0nFq+gNMR6l/NpuCC

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7079098bd75d91e0fa86c2096a0d904.exe
    "C:\Users\Admin\AppData\Local\Temp\e7079098bd75d91e0fa86c2096a0d904.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3535683.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3535683.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5687392.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5687392.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8311417.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8311417.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1768
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2004
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2828
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 268
                7⤵
                • Program crash
                PID:2644
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3535683.exe

    Filesize

    840KB

    MD5

    e94fea533270c72498d3296c8640e14e

    SHA1

    fbd0f957a43c03475f7be90a001b1c4c32fe07de

    SHA256

    6d320dd0ad229fa0f543e15201f077536c5525f91970d24dcfa715e022153307

    SHA512

    093676abda68ec8ff3da40b11a6cf82bfa18172e43a1a18818111aedfb5b1eb67f01fda8c118b23d2f9f27b1a61f80315bff78e278e61c5ee677f28e2fc62dfd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3535683.exe

    Filesize

    840KB

    MD5

    e94fea533270c72498d3296c8640e14e

    SHA1

    fbd0f957a43c03475f7be90a001b1c4c32fe07de

    SHA256

    6d320dd0ad229fa0f543e15201f077536c5525f91970d24dcfa715e022153307

    SHA512

    093676abda68ec8ff3da40b11a6cf82bfa18172e43a1a18818111aedfb5b1eb67f01fda8c118b23d2f9f27b1a61f80315bff78e278e61c5ee677f28e2fc62dfd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5687392.exe

    Filesize

    562KB

    MD5

    1f8514902a8dcb54deecfe97c575b2fc

    SHA1

    2c8380c4008c2df1eb9bc55c54ebc14b8539e6f1

    SHA256

    c18b4d52c2a8dbcf63fd28ece48c0ba50ace28eb48e48ef57841979aff287af2

    SHA512

    ec288ba22ce86fe570bb8a2441171167113bd927891a3ef13ce0dcae2d8c290ee3dcf9be03dcc3ad96846386db52d89542e6012b9f8a5cf977acb3ba871981e6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5687392.exe

    Filesize

    562KB

    MD5

    1f8514902a8dcb54deecfe97c575b2fc

    SHA1

    2c8380c4008c2df1eb9bc55c54ebc14b8539e6f1

    SHA256

    c18b4d52c2a8dbcf63fd28ece48c0ba50ace28eb48e48ef57841979aff287af2

    SHA512

    ec288ba22ce86fe570bb8a2441171167113bd927891a3ef13ce0dcae2d8c290ee3dcf9be03dcc3ad96846386db52d89542e6012b9f8a5cf977acb3ba871981e6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8311417.exe

    Filesize

    396KB

    MD5

    a716fb90f72437b0dbbea8c9977e47ac

    SHA1

    1d83e19eea0e53fcd98250985bfcc46b477310a6

    SHA256

    42b81cefab94ab200857b13aa5beb1b3cadf3c8b6f53dcfdc9c14f39d0c90cd7

    SHA512

    c53e543cd8b5ff44bb1a249588bc9005ba3720b719a9beb2e3abe9225e58bcbdbd9fc36191c90c5eccfc6406bc3a2a69402cc974a902c2a9a05c7235358a2b18

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8311417.exe

    Filesize

    396KB

    MD5

    a716fb90f72437b0dbbea8c9977e47ac

    SHA1

    1d83e19eea0e53fcd98250985bfcc46b477310a6

    SHA256

    42b81cefab94ab200857b13aa5beb1b3cadf3c8b6f53dcfdc9c14f39d0c90cd7

    SHA512

    c53e543cd8b5ff44bb1a249588bc9005ba3720b719a9beb2e3abe9225e58bcbdbd9fc36191c90c5eccfc6406bc3a2a69402cc974a902c2a9a05c7235358a2b18

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3535683.exe

    Filesize

    840KB

    MD5

    e94fea533270c72498d3296c8640e14e

    SHA1

    fbd0f957a43c03475f7be90a001b1c4c32fe07de

    SHA256

    6d320dd0ad229fa0f543e15201f077536c5525f91970d24dcfa715e022153307

    SHA512

    093676abda68ec8ff3da40b11a6cf82bfa18172e43a1a18818111aedfb5b1eb67f01fda8c118b23d2f9f27b1a61f80315bff78e278e61c5ee677f28e2fc62dfd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3535683.exe

    Filesize

    840KB

    MD5

    e94fea533270c72498d3296c8640e14e

    SHA1

    fbd0f957a43c03475f7be90a001b1c4c32fe07de

    SHA256

    6d320dd0ad229fa0f543e15201f077536c5525f91970d24dcfa715e022153307

    SHA512

    093676abda68ec8ff3da40b11a6cf82bfa18172e43a1a18818111aedfb5b1eb67f01fda8c118b23d2f9f27b1a61f80315bff78e278e61c5ee677f28e2fc62dfd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5687392.exe

    Filesize

    562KB

    MD5

    1f8514902a8dcb54deecfe97c575b2fc

    SHA1

    2c8380c4008c2df1eb9bc55c54ebc14b8539e6f1

    SHA256

    c18b4d52c2a8dbcf63fd28ece48c0ba50ace28eb48e48ef57841979aff287af2

    SHA512

    ec288ba22ce86fe570bb8a2441171167113bd927891a3ef13ce0dcae2d8c290ee3dcf9be03dcc3ad96846386db52d89542e6012b9f8a5cf977acb3ba871981e6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5687392.exe

    Filesize

    562KB

    MD5

    1f8514902a8dcb54deecfe97c575b2fc

    SHA1

    2c8380c4008c2df1eb9bc55c54ebc14b8539e6f1

    SHA256

    c18b4d52c2a8dbcf63fd28ece48c0ba50ace28eb48e48ef57841979aff287af2

    SHA512

    ec288ba22ce86fe570bb8a2441171167113bd927891a3ef13ce0dcae2d8c290ee3dcf9be03dcc3ad96846386db52d89542e6012b9f8a5cf977acb3ba871981e6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8311417.exe

    Filesize

    396KB

    MD5

    a716fb90f72437b0dbbea8c9977e47ac

    SHA1

    1d83e19eea0e53fcd98250985bfcc46b477310a6

    SHA256

    42b81cefab94ab200857b13aa5beb1b3cadf3c8b6f53dcfdc9c14f39d0c90cd7

    SHA512

    c53e543cd8b5ff44bb1a249588bc9005ba3720b719a9beb2e3abe9225e58bcbdbd9fc36191c90c5eccfc6406bc3a2a69402cc974a902c2a9a05c7235358a2b18

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8311417.exe

    Filesize

    396KB

    MD5

    a716fb90f72437b0dbbea8c9977e47ac

    SHA1

    1d83e19eea0e53fcd98250985bfcc46b477310a6

    SHA256

    42b81cefab94ab200857b13aa5beb1b3cadf3c8b6f53dcfdc9c14f39d0c90cd7

    SHA512

    c53e543cd8b5ff44bb1a249588bc9005ba3720b719a9beb2e3abe9225e58bcbdbd9fc36191c90c5eccfc6406bc3a2a69402cc974a902c2a9a05c7235358a2b18

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe

    Filesize

    379KB

    MD5

    14a162a2890fc60582fd6b4b006e9e19

    SHA1

    46b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5

    SHA256

    80119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8

    SHA512

    b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240

  • memory/2828-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2828-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2828-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2828-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2828-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2828-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2828-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2828-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2828-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2828-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB