Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 12:24
Static task
static1
Behavioral task
behavioral1
Sample
e7079098bd75d91e0fa86c2096a0d904.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e7079098bd75d91e0fa86c2096a0d904.exe
Resource
win10v2004-20230915-en
General
-
Target
e7079098bd75d91e0fa86c2096a0d904.exe
-
Size
942KB
-
MD5
e7079098bd75d91e0fa86c2096a0d904
-
SHA1
0e7a54978b527ea03efca6789ee29a8f84779277
-
SHA256
0e70a693d0da2e40dbaa727db26d423a73fec3b83c93a32233bdd729f8fcf02d
-
SHA512
4fc9064311e7eb1e1f2ecec0f27774e113aca898938f888ed994de6f669633374869021f205b2b52123b75e4f7141ade31e6879edc7877b28511513ed83dba2d
-
SSDEEP
24576:By5tA9uRA+jH0aIMG0AWr6lRxL4Yjp0QkCCN:0nFq+gNMR6l/NpuCC
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2828-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2828-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2828-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2828-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2828-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2828-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2852 x3535683.exe 1700 x5687392.exe 1768 x8311417.exe 2004 g8779903.exe -
Loads dropped DLL 13 IoCs
pid Process 3024 e7079098bd75d91e0fa86c2096a0d904.exe 2852 x3535683.exe 2852 x3535683.exe 1700 x5687392.exe 1700 x5687392.exe 1768 x8311417.exe 1768 x8311417.exe 1768 x8311417.exe 2004 g8779903.exe 2824 WerFault.exe 2824 WerFault.exe 2824 WerFault.exe 2824 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5687392.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8311417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e7079098bd75d91e0fa86c2096a0d904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3535683.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 2828 2004 g8779903.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2824 2004 WerFault.exe 31 2644 2828 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2852 3024 e7079098bd75d91e0fa86c2096a0d904.exe 28 PID 3024 wrote to memory of 2852 3024 e7079098bd75d91e0fa86c2096a0d904.exe 28 PID 3024 wrote to memory of 2852 3024 e7079098bd75d91e0fa86c2096a0d904.exe 28 PID 3024 wrote to memory of 2852 3024 e7079098bd75d91e0fa86c2096a0d904.exe 28 PID 3024 wrote to memory of 2852 3024 e7079098bd75d91e0fa86c2096a0d904.exe 28 PID 3024 wrote to memory of 2852 3024 e7079098bd75d91e0fa86c2096a0d904.exe 28 PID 3024 wrote to memory of 2852 3024 e7079098bd75d91e0fa86c2096a0d904.exe 28 PID 2852 wrote to memory of 1700 2852 x3535683.exe 29 PID 2852 wrote to memory of 1700 2852 x3535683.exe 29 PID 2852 wrote to memory of 1700 2852 x3535683.exe 29 PID 2852 wrote to memory of 1700 2852 x3535683.exe 29 PID 2852 wrote to memory of 1700 2852 x3535683.exe 29 PID 2852 wrote to memory of 1700 2852 x3535683.exe 29 PID 2852 wrote to memory of 1700 2852 x3535683.exe 29 PID 1700 wrote to memory of 1768 1700 x5687392.exe 30 PID 1700 wrote to memory of 1768 1700 x5687392.exe 30 PID 1700 wrote to memory of 1768 1700 x5687392.exe 30 PID 1700 wrote to memory of 1768 1700 x5687392.exe 30 PID 1700 wrote to memory of 1768 1700 x5687392.exe 30 PID 1700 wrote to memory of 1768 1700 x5687392.exe 30 PID 1700 wrote to memory of 1768 1700 x5687392.exe 30 PID 1768 wrote to memory of 2004 1768 x8311417.exe 31 PID 1768 wrote to memory of 2004 1768 x8311417.exe 31 PID 1768 wrote to memory of 2004 1768 x8311417.exe 31 PID 1768 wrote to memory of 2004 1768 x8311417.exe 31 PID 1768 wrote to memory of 2004 1768 x8311417.exe 31 PID 1768 wrote to memory of 2004 1768 x8311417.exe 31 PID 1768 wrote to memory of 2004 1768 x8311417.exe 31 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2004 wrote to memory of 2828 2004 g8779903.exe 32 PID 2828 wrote to memory of 2644 2828 AppLaunch.exe 34 PID 2828 wrote to memory of 2644 2828 AppLaunch.exe 34 PID 2828 wrote to memory of 2644 2828 AppLaunch.exe 34 PID 2828 wrote to memory of 2644 2828 AppLaunch.exe 34 PID 2828 wrote to memory of 2644 2828 AppLaunch.exe 34 PID 2828 wrote to memory of 2644 2828 AppLaunch.exe 34 PID 2828 wrote to memory of 2644 2828 AppLaunch.exe 34 PID 2004 wrote to memory of 2824 2004 g8779903.exe 33 PID 2004 wrote to memory of 2824 2004 g8779903.exe 33 PID 2004 wrote to memory of 2824 2004 g8779903.exe 33 PID 2004 wrote to memory of 2824 2004 g8779903.exe 33 PID 2004 wrote to memory of 2824 2004 g8779903.exe 33 PID 2004 wrote to memory of 2824 2004 g8779903.exe 33 PID 2004 wrote to memory of 2824 2004 g8779903.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7079098bd75d91e0fa86c2096a0d904.exe"C:\Users\Admin\AppData\Local\Temp\e7079098bd75d91e0fa86c2096a0d904.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3535683.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3535683.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5687392.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5687392.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8311417.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8311417.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8779903.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 2687⤵
- Program crash
PID:2644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2824
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD5e94fea533270c72498d3296c8640e14e
SHA1fbd0f957a43c03475f7be90a001b1c4c32fe07de
SHA2566d320dd0ad229fa0f543e15201f077536c5525f91970d24dcfa715e022153307
SHA512093676abda68ec8ff3da40b11a6cf82bfa18172e43a1a18818111aedfb5b1eb67f01fda8c118b23d2f9f27b1a61f80315bff78e278e61c5ee677f28e2fc62dfd
-
Filesize
840KB
MD5e94fea533270c72498d3296c8640e14e
SHA1fbd0f957a43c03475f7be90a001b1c4c32fe07de
SHA2566d320dd0ad229fa0f543e15201f077536c5525f91970d24dcfa715e022153307
SHA512093676abda68ec8ff3da40b11a6cf82bfa18172e43a1a18818111aedfb5b1eb67f01fda8c118b23d2f9f27b1a61f80315bff78e278e61c5ee677f28e2fc62dfd
-
Filesize
562KB
MD51f8514902a8dcb54deecfe97c575b2fc
SHA12c8380c4008c2df1eb9bc55c54ebc14b8539e6f1
SHA256c18b4d52c2a8dbcf63fd28ece48c0ba50ace28eb48e48ef57841979aff287af2
SHA512ec288ba22ce86fe570bb8a2441171167113bd927891a3ef13ce0dcae2d8c290ee3dcf9be03dcc3ad96846386db52d89542e6012b9f8a5cf977acb3ba871981e6
-
Filesize
562KB
MD51f8514902a8dcb54deecfe97c575b2fc
SHA12c8380c4008c2df1eb9bc55c54ebc14b8539e6f1
SHA256c18b4d52c2a8dbcf63fd28ece48c0ba50ace28eb48e48ef57841979aff287af2
SHA512ec288ba22ce86fe570bb8a2441171167113bd927891a3ef13ce0dcae2d8c290ee3dcf9be03dcc3ad96846386db52d89542e6012b9f8a5cf977acb3ba871981e6
-
Filesize
396KB
MD5a716fb90f72437b0dbbea8c9977e47ac
SHA11d83e19eea0e53fcd98250985bfcc46b477310a6
SHA25642b81cefab94ab200857b13aa5beb1b3cadf3c8b6f53dcfdc9c14f39d0c90cd7
SHA512c53e543cd8b5ff44bb1a249588bc9005ba3720b719a9beb2e3abe9225e58bcbdbd9fc36191c90c5eccfc6406bc3a2a69402cc974a902c2a9a05c7235358a2b18
-
Filesize
396KB
MD5a716fb90f72437b0dbbea8c9977e47ac
SHA11d83e19eea0e53fcd98250985bfcc46b477310a6
SHA25642b81cefab94ab200857b13aa5beb1b3cadf3c8b6f53dcfdc9c14f39d0c90cd7
SHA512c53e543cd8b5ff44bb1a249588bc9005ba3720b719a9beb2e3abe9225e58bcbdbd9fc36191c90c5eccfc6406bc3a2a69402cc974a902c2a9a05c7235358a2b18
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240
-
Filesize
840KB
MD5e94fea533270c72498d3296c8640e14e
SHA1fbd0f957a43c03475f7be90a001b1c4c32fe07de
SHA2566d320dd0ad229fa0f543e15201f077536c5525f91970d24dcfa715e022153307
SHA512093676abda68ec8ff3da40b11a6cf82bfa18172e43a1a18818111aedfb5b1eb67f01fda8c118b23d2f9f27b1a61f80315bff78e278e61c5ee677f28e2fc62dfd
-
Filesize
840KB
MD5e94fea533270c72498d3296c8640e14e
SHA1fbd0f957a43c03475f7be90a001b1c4c32fe07de
SHA2566d320dd0ad229fa0f543e15201f077536c5525f91970d24dcfa715e022153307
SHA512093676abda68ec8ff3da40b11a6cf82bfa18172e43a1a18818111aedfb5b1eb67f01fda8c118b23d2f9f27b1a61f80315bff78e278e61c5ee677f28e2fc62dfd
-
Filesize
562KB
MD51f8514902a8dcb54deecfe97c575b2fc
SHA12c8380c4008c2df1eb9bc55c54ebc14b8539e6f1
SHA256c18b4d52c2a8dbcf63fd28ece48c0ba50ace28eb48e48ef57841979aff287af2
SHA512ec288ba22ce86fe570bb8a2441171167113bd927891a3ef13ce0dcae2d8c290ee3dcf9be03dcc3ad96846386db52d89542e6012b9f8a5cf977acb3ba871981e6
-
Filesize
562KB
MD51f8514902a8dcb54deecfe97c575b2fc
SHA12c8380c4008c2df1eb9bc55c54ebc14b8539e6f1
SHA256c18b4d52c2a8dbcf63fd28ece48c0ba50ace28eb48e48ef57841979aff287af2
SHA512ec288ba22ce86fe570bb8a2441171167113bd927891a3ef13ce0dcae2d8c290ee3dcf9be03dcc3ad96846386db52d89542e6012b9f8a5cf977acb3ba871981e6
-
Filesize
396KB
MD5a716fb90f72437b0dbbea8c9977e47ac
SHA11d83e19eea0e53fcd98250985bfcc46b477310a6
SHA25642b81cefab94ab200857b13aa5beb1b3cadf3c8b6f53dcfdc9c14f39d0c90cd7
SHA512c53e543cd8b5ff44bb1a249588bc9005ba3720b719a9beb2e3abe9225e58bcbdbd9fc36191c90c5eccfc6406bc3a2a69402cc974a902c2a9a05c7235358a2b18
-
Filesize
396KB
MD5a716fb90f72437b0dbbea8c9977e47ac
SHA11d83e19eea0e53fcd98250985bfcc46b477310a6
SHA25642b81cefab94ab200857b13aa5beb1b3cadf3c8b6f53dcfdc9c14f39d0c90cd7
SHA512c53e543cd8b5ff44bb1a249588bc9005ba3720b719a9beb2e3abe9225e58bcbdbd9fc36191c90c5eccfc6406bc3a2a69402cc974a902c2a9a05c7235358a2b18
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240
-
Filesize
379KB
MD514a162a2890fc60582fd6b4b006e9e19
SHA146b1cc1ab0946d1c78e7b1e9a3fef445a7025ae5
SHA25680119e416c3f965846563330b409630e0c2fb0d2281f6b218179eda1237310b8
SHA512b391586f6ac711245f7e98534f54cda47ce9e3050244015e64a5e8d61bc5f0c6fd20165050e34af039081e13f1c7d0efbf8c4bda837c98980e74de7d24fe2240