Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe
Resource
win10v2004-20230915-en
General
-
Target
e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe
-
Size
942KB
-
MD5
0a69c25f5ba3219dfa7119c054f3e2e3
-
SHA1
ba6982f9299c68f5b079a7233c4b012fcce7cc0b
-
SHA256
e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd
-
SHA512
82c40176179e9b860ff447abae9b9fbcb9b891db2bdce840a4e3178f7d882b6b5608036ce3a09c7313ae342aa7025d961cdafe1d31ca2ceb6142d75e91baaed9
-
SSDEEP
24576:1ywdvPPyamTgXEX1JVmqmTvwMj7W9PHopUhC6JF:QwVOTgXEFJr2Ygi/o6J
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 8 IoCs
resource yara_rule behavioral1/memory/2744-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2744-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2744-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2744-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2744-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2744-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2744-57-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2744-62-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2172 x5273818.exe 2148 x7314091.exe 2660 x7119484.exe 3052 g4552702.exe -
Loads dropped DLL 13 IoCs
pid Process 2900 e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe 2172 x5273818.exe 2172 x5273818.exe 2148 x7314091.exe 2148 x7314091.exe 2660 x7119484.exe 2660 x7119484.exe 2660 x7119484.exe 3052 g4552702.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5273818.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7314091.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7119484.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 2744 3052 g4552702.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2848 3052 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2172 2900 e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe 28 PID 2900 wrote to memory of 2172 2900 e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe 28 PID 2900 wrote to memory of 2172 2900 e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe 28 PID 2900 wrote to memory of 2172 2900 e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe 28 PID 2900 wrote to memory of 2172 2900 e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe 28 PID 2900 wrote to memory of 2172 2900 e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe 28 PID 2900 wrote to memory of 2172 2900 e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe 28 PID 2172 wrote to memory of 2148 2172 x5273818.exe 29 PID 2172 wrote to memory of 2148 2172 x5273818.exe 29 PID 2172 wrote to memory of 2148 2172 x5273818.exe 29 PID 2172 wrote to memory of 2148 2172 x5273818.exe 29 PID 2172 wrote to memory of 2148 2172 x5273818.exe 29 PID 2172 wrote to memory of 2148 2172 x5273818.exe 29 PID 2172 wrote to memory of 2148 2172 x5273818.exe 29 PID 2148 wrote to memory of 2660 2148 x7314091.exe 30 PID 2148 wrote to memory of 2660 2148 x7314091.exe 30 PID 2148 wrote to memory of 2660 2148 x7314091.exe 30 PID 2148 wrote to memory of 2660 2148 x7314091.exe 30 PID 2148 wrote to memory of 2660 2148 x7314091.exe 30 PID 2148 wrote to memory of 2660 2148 x7314091.exe 30 PID 2148 wrote to memory of 2660 2148 x7314091.exe 30 PID 2660 wrote to memory of 3052 2660 x7119484.exe 31 PID 2660 wrote to memory of 3052 2660 x7119484.exe 31 PID 2660 wrote to memory of 3052 2660 x7119484.exe 31 PID 2660 wrote to memory of 3052 2660 x7119484.exe 31 PID 2660 wrote to memory of 3052 2660 x7119484.exe 31 PID 2660 wrote to memory of 3052 2660 x7119484.exe 31 PID 2660 wrote to memory of 3052 2660 x7119484.exe 31 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2744 3052 g4552702.exe 32 PID 3052 wrote to memory of 2848 3052 g4552702.exe 33 PID 3052 wrote to memory of 2848 3052 g4552702.exe 33 PID 3052 wrote to memory of 2848 3052 g4552702.exe 33 PID 3052 wrote to memory of 2848 3052 g4552702.exe 33 PID 3052 wrote to memory of 2848 3052 g4552702.exe 33 PID 3052 wrote to memory of 2848 3052 g4552702.exe 33 PID 3052 wrote to memory of 2848 3052 g4552702.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe"C:\Users\Admin\AppData\Local\Temp\e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5273818.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5273818.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7314091.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7314091.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7119484.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7119484.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2848
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD58427e8530cbb0730c159fb95cfaeee03
SHA15f7b976ac94c9b0ad2265557fee7c9f2f49848ca
SHA2563ce3030dc03737e157ca6581193fc27b7f0440f29dc7643fd480e15e29e7e05f
SHA512bcbed67cb9fb7a9d0656566e8599436cf7fe7c123d7e6cce1c8f24c3aeb26a8d6f9ad21e428ea527b15e07102645406102f6a5009e124a2191ceb621c2a88493
-
Filesize
840KB
MD58427e8530cbb0730c159fb95cfaeee03
SHA15f7b976ac94c9b0ad2265557fee7c9f2f49848ca
SHA2563ce3030dc03737e157ca6581193fc27b7f0440f29dc7643fd480e15e29e7e05f
SHA512bcbed67cb9fb7a9d0656566e8599436cf7fe7c123d7e6cce1c8f24c3aeb26a8d6f9ad21e428ea527b15e07102645406102f6a5009e124a2191ceb621c2a88493
-
Filesize
562KB
MD5648172470e4e84aebd4650b6bb49e333
SHA16b0d9d244102c74ee15e7c7db06bd544e7b0dffd
SHA2561bfdddf7991be2574b36079d6a5aa09db6f5f4df63a3a66e8e1fd955486a46b0
SHA512277c14203bc1d5d65e6399daeb7a030e0f071175186a0d7e6cf37a4cb2d75f48f8555c329796eaaee33cf5e18876bcb0c8f202329699ecb3ab1d40b4579ae645
-
Filesize
562KB
MD5648172470e4e84aebd4650b6bb49e333
SHA16b0d9d244102c74ee15e7c7db06bd544e7b0dffd
SHA2561bfdddf7991be2574b36079d6a5aa09db6f5f4df63a3a66e8e1fd955486a46b0
SHA512277c14203bc1d5d65e6399daeb7a030e0f071175186a0d7e6cf37a4cb2d75f48f8555c329796eaaee33cf5e18876bcb0c8f202329699ecb3ab1d40b4579ae645
-
Filesize
396KB
MD5319fcdc6dd3e878ced1906601e171f4d
SHA142deddfd79b573683f70b7c66a2b5d56cf9b226b
SHA2565942bca25e3c872def32f1e92819295f709f24e4cfe8fdeb7b6137c53506580a
SHA51269a679a30c213838ba6f1eef52dc5a7ba9dd4f2f4f4c1dfabdd8d0a22e2ca4c2bf68a7f3bd512685baaed4f769fae3c421e81bc44967e0bfd713eb0ad1ad32f6
-
Filesize
396KB
MD5319fcdc6dd3e878ced1906601e171f4d
SHA142deddfd79b573683f70b7c66a2b5d56cf9b226b
SHA2565942bca25e3c872def32f1e92819295f709f24e4cfe8fdeb7b6137c53506580a
SHA51269a679a30c213838ba6f1eef52dc5a7ba9dd4f2f4f4c1dfabdd8d0a22e2ca4c2bf68a7f3bd512685baaed4f769fae3c421e81bc44967e0bfd713eb0ad1ad32f6
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb
-
Filesize
840KB
MD58427e8530cbb0730c159fb95cfaeee03
SHA15f7b976ac94c9b0ad2265557fee7c9f2f49848ca
SHA2563ce3030dc03737e157ca6581193fc27b7f0440f29dc7643fd480e15e29e7e05f
SHA512bcbed67cb9fb7a9d0656566e8599436cf7fe7c123d7e6cce1c8f24c3aeb26a8d6f9ad21e428ea527b15e07102645406102f6a5009e124a2191ceb621c2a88493
-
Filesize
840KB
MD58427e8530cbb0730c159fb95cfaeee03
SHA15f7b976ac94c9b0ad2265557fee7c9f2f49848ca
SHA2563ce3030dc03737e157ca6581193fc27b7f0440f29dc7643fd480e15e29e7e05f
SHA512bcbed67cb9fb7a9d0656566e8599436cf7fe7c123d7e6cce1c8f24c3aeb26a8d6f9ad21e428ea527b15e07102645406102f6a5009e124a2191ceb621c2a88493
-
Filesize
562KB
MD5648172470e4e84aebd4650b6bb49e333
SHA16b0d9d244102c74ee15e7c7db06bd544e7b0dffd
SHA2561bfdddf7991be2574b36079d6a5aa09db6f5f4df63a3a66e8e1fd955486a46b0
SHA512277c14203bc1d5d65e6399daeb7a030e0f071175186a0d7e6cf37a4cb2d75f48f8555c329796eaaee33cf5e18876bcb0c8f202329699ecb3ab1d40b4579ae645
-
Filesize
562KB
MD5648172470e4e84aebd4650b6bb49e333
SHA16b0d9d244102c74ee15e7c7db06bd544e7b0dffd
SHA2561bfdddf7991be2574b36079d6a5aa09db6f5f4df63a3a66e8e1fd955486a46b0
SHA512277c14203bc1d5d65e6399daeb7a030e0f071175186a0d7e6cf37a4cb2d75f48f8555c329796eaaee33cf5e18876bcb0c8f202329699ecb3ab1d40b4579ae645
-
Filesize
396KB
MD5319fcdc6dd3e878ced1906601e171f4d
SHA142deddfd79b573683f70b7c66a2b5d56cf9b226b
SHA2565942bca25e3c872def32f1e92819295f709f24e4cfe8fdeb7b6137c53506580a
SHA51269a679a30c213838ba6f1eef52dc5a7ba9dd4f2f4f4c1dfabdd8d0a22e2ca4c2bf68a7f3bd512685baaed4f769fae3c421e81bc44967e0bfd713eb0ad1ad32f6
-
Filesize
396KB
MD5319fcdc6dd3e878ced1906601e171f4d
SHA142deddfd79b573683f70b7c66a2b5d56cf9b226b
SHA2565942bca25e3c872def32f1e92819295f709f24e4cfe8fdeb7b6137c53506580a
SHA51269a679a30c213838ba6f1eef52dc5a7ba9dd4f2f4f4c1dfabdd8d0a22e2ca4c2bf68a7f3bd512685baaed4f769fae3c421e81bc44967e0bfd713eb0ad1ad32f6
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb
-
Filesize
379KB
MD56471f849e3678a2a6d495d2ccc11dcfa
SHA17762c6dc3c470737e4dda63cebe45187197894d9
SHA256c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5
SHA5124a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb