Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe
Resource
win10v2004-20230915-en
General
-
Target
3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe
-
Size
942KB
-
MD5
5e24d68c1ffd39affe7061e59a8a583c
-
SHA1
8422a179fe6090389a3014eceb351e5153a673c8
-
SHA256
3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973
-
SHA512
b17fd556fe0121429ba261e80c29a8d8e9a7a1180cc68ca2909162bba7eaa444fa6b1c2d0c74e70ccee75b3da71e818d55af64a4c6dcf909fa45f52480111c84
-
SSDEEP
24576:8yvXgJUdpAqUcHo7YzzGawjiYe7rbNu6ByL4W:rvQJUvAdgzVbzNu68
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 8 IoCs
resource yara_rule behavioral1/memory/2132-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2132-51-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2132-53-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2132-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2132-58-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2132-60-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2132-61-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2132-65-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2412 x4102823.exe 2352 x3620296.exe 2692 x5443075.exe 2592 g0409876.exe -
Loads dropped DLL 13 IoCs
pid Process 2148 3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe 2412 x4102823.exe 2412 x4102823.exe 2352 x3620296.exe 2352 x3620296.exe 2692 x5443075.exe 2692 x5443075.exe 2692 x5443075.exe 2592 g0409876.exe 2660 WerFault.exe 2660 WerFault.exe 2660 WerFault.exe 2660 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5443075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4102823.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3620296.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2592 set thread context of 2132 2592 g0409876.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2660 2592 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2412 2148 3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe 29 PID 2148 wrote to memory of 2412 2148 3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe 29 PID 2148 wrote to memory of 2412 2148 3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe 29 PID 2148 wrote to memory of 2412 2148 3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe 29 PID 2148 wrote to memory of 2412 2148 3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe 29 PID 2148 wrote to memory of 2412 2148 3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe 29 PID 2148 wrote to memory of 2412 2148 3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe 29 PID 2412 wrote to memory of 2352 2412 x4102823.exe 30 PID 2412 wrote to memory of 2352 2412 x4102823.exe 30 PID 2412 wrote to memory of 2352 2412 x4102823.exe 30 PID 2412 wrote to memory of 2352 2412 x4102823.exe 30 PID 2412 wrote to memory of 2352 2412 x4102823.exe 30 PID 2412 wrote to memory of 2352 2412 x4102823.exe 30 PID 2412 wrote to memory of 2352 2412 x4102823.exe 30 PID 2352 wrote to memory of 2692 2352 x3620296.exe 31 PID 2352 wrote to memory of 2692 2352 x3620296.exe 31 PID 2352 wrote to memory of 2692 2352 x3620296.exe 31 PID 2352 wrote to memory of 2692 2352 x3620296.exe 31 PID 2352 wrote to memory of 2692 2352 x3620296.exe 31 PID 2352 wrote to memory of 2692 2352 x3620296.exe 31 PID 2352 wrote to memory of 2692 2352 x3620296.exe 31 PID 2692 wrote to memory of 2592 2692 x5443075.exe 32 PID 2692 wrote to memory of 2592 2692 x5443075.exe 32 PID 2692 wrote to memory of 2592 2692 x5443075.exe 32 PID 2692 wrote to memory of 2592 2692 x5443075.exe 32 PID 2692 wrote to memory of 2592 2692 x5443075.exe 32 PID 2692 wrote to memory of 2592 2692 x5443075.exe 32 PID 2692 wrote to memory of 2592 2692 x5443075.exe 32 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2132 2592 g0409876.exe 33 PID 2592 wrote to memory of 2660 2592 g0409876.exe 34 PID 2592 wrote to memory of 2660 2592 g0409876.exe 34 PID 2592 wrote to memory of 2660 2592 g0409876.exe 34 PID 2592 wrote to memory of 2660 2592 g0409876.exe 34 PID 2592 wrote to memory of 2660 2592 g0409876.exe 34 PID 2592 wrote to memory of 2660 2592 g0409876.exe 34 PID 2592 wrote to memory of 2660 2592 g0409876.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe"C:\Users\Admin\AppData\Local\Temp\3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4102823.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4102823.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3620296.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3620296.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5443075.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5443075.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2660
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
839KB
MD51c5c115095a5146c9313a16b69c070d3
SHA1a0da0f651de5016e2e5503d689b4cfe1dbdb9e23
SHA256c4fccbfbe584a349873e3096d36d8717d6393b3bc6bfe1e70649e8b1df5a0406
SHA5123541d597531a544e6795559246b07db293c7b57e4b1dc81ed076ad85bec5e8663a85bc1bf62d1d04d6afbd0d97b263534cfe8ac747425ff27489127d75c9d9d3
-
Filesize
839KB
MD51c5c115095a5146c9313a16b69c070d3
SHA1a0da0f651de5016e2e5503d689b4cfe1dbdb9e23
SHA256c4fccbfbe584a349873e3096d36d8717d6393b3bc6bfe1e70649e8b1df5a0406
SHA5123541d597531a544e6795559246b07db293c7b57e4b1dc81ed076ad85bec5e8663a85bc1bf62d1d04d6afbd0d97b263534cfe8ac747425ff27489127d75c9d9d3
-
Filesize
561KB
MD5e843171c60655be4097558beae38e99f
SHA12075f84cface9a01d8868077b2abee4ff3ab78a0
SHA2565c8d632f10ddc409d52c3d43de4829a21181e041905b7d1f1b431a763a4ba9a9
SHA512c0058a67ee03c7ec8cc37ad6b4cdc62a1a8a73f281c951591dd6bce316cd4c7a98af566e7515b72670fdc2cfc3cd0df4e7f9675887eab5b582836f8096c08079
-
Filesize
561KB
MD5e843171c60655be4097558beae38e99f
SHA12075f84cface9a01d8868077b2abee4ff3ab78a0
SHA2565c8d632f10ddc409d52c3d43de4829a21181e041905b7d1f1b431a763a4ba9a9
SHA512c0058a67ee03c7ec8cc37ad6b4cdc62a1a8a73f281c951591dd6bce316cd4c7a98af566e7515b72670fdc2cfc3cd0df4e7f9675887eab5b582836f8096c08079
-
Filesize
396KB
MD54161b575688122e1d631d3d03008db9a
SHA15afcc20df1beb4f88976293b642980e1c0d2c910
SHA2568eaf0595c01be220e39739fc1be87a05db39ba61ce61b7a9c4f3f3c20fa7d7a5
SHA5121084e42487f8e5ba3e2e61960ce93230fcb10e3412d0b7737f809e7c46525cdd00b05b2b8aa097c323f3744daa0cd1b67bef063df5b0739fb0e7636e6ad0df30
-
Filesize
396KB
MD54161b575688122e1d631d3d03008db9a
SHA15afcc20df1beb4f88976293b642980e1c0d2c910
SHA2568eaf0595c01be220e39739fc1be87a05db39ba61ce61b7a9c4f3f3c20fa7d7a5
SHA5121084e42487f8e5ba3e2e61960ce93230fcb10e3412d0b7737f809e7c46525cdd00b05b2b8aa097c323f3744daa0cd1b67bef063df5b0739fb0e7636e6ad0df30
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6
-
Filesize
839KB
MD51c5c115095a5146c9313a16b69c070d3
SHA1a0da0f651de5016e2e5503d689b4cfe1dbdb9e23
SHA256c4fccbfbe584a349873e3096d36d8717d6393b3bc6bfe1e70649e8b1df5a0406
SHA5123541d597531a544e6795559246b07db293c7b57e4b1dc81ed076ad85bec5e8663a85bc1bf62d1d04d6afbd0d97b263534cfe8ac747425ff27489127d75c9d9d3
-
Filesize
839KB
MD51c5c115095a5146c9313a16b69c070d3
SHA1a0da0f651de5016e2e5503d689b4cfe1dbdb9e23
SHA256c4fccbfbe584a349873e3096d36d8717d6393b3bc6bfe1e70649e8b1df5a0406
SHA5123541d597531a544e6795559246b07db293c7b57e4b1dc81ed076ad85bec5e8663a85bc1bf62d1d04d6afbd0d97b263534cfe8ac747425ff27489127d75c9d9d3
-
Filesize
561KB
MD5e843171c60655be4097558beae38e99f
SHA12075f84cface9a01d8868077b2abee4ff3ab78a0
SHA2565c8d632f10ddc409d52c3d43de4829a21181e041905b7d1f1b431a763a4ba9a9
SHA512c0058a67ee03c7ec8cc37ad6b4cdc62a1a8a73f281c951591dd6bce316cd4c7a98af566e7515b72670fdc2cfc3cd0df4e7f9675887eab5b582836f8096c08079
-
Filesize
561KB
MD5e843171c60655be4097558beae38e99f
SHA12075f84cface9a01d8868077b2abee4ff3ab78a0
SHA2565c8d632f10ddc409d52c3d43de4829a21181e041905b7d1f1b431a763a4ba9a9
SHA512c0058a67ee03c7ec8cc37ad6b4cdc62a1a8a73f281c951591dd6bce316cd4c7a98af566e7515b72670fdc2cfc3cd0df4e7f9675887eab5b582836f8096c08079
-
Filesize
396KB
MD54161b575688122e1d631d3d03008db9a
SHA15afcc20df1beb4f88976293b642980e1c0d2c910
SHA2568eaf0595c01be220e39739fc1be87a05db39ba61ce61b7a9c4f3f3c20fa7d7a5
SHA5121084e42487f8e5ba3e2e61960ce93230fcb10e3412d0b7737f809e7c46525cdd00b05b2b8aa097c323f3744daa0cd1b67bef063df5b0739fb0e7636e6ad0df30
-
Filesize
396KB
MD54161b575688122e1d631d3d03008db9a
SHA15afcc20df1beb4f88976293b642980e1c0d2c910
SHA2568eaf0595c01be220e39739fc1be87a05db39ba61ce61b7a9c4f3f3c20fa7d7a5
SHA5121084e42487f8e5ba3e2e61960ce93230fcb10e3412d0b7737f809e7c46525cdd00b05b2b8aa097c323f3744daa0cd1b67bef063df5b0739fb0e7636e6ad0df30
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6
-
Filesize
379KB
MD5b3f56a9c6ea9eb38673eba0f9678b4ec
SHA138e16997b4c12572a6bf1648101d63a7abad1468
SHA256be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8
SHA512fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6