Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 12:40

General

  • Target

    5228a8bbf28b3d0b59d1f63846066256.exe

  • Size

    943KB

  • MD5

    5228a8bbf28b3d0b59d1f63846066256

  • SHA1

    1fff8f5cb0502ac4cdfdc52daafe8b26f2fd0137

  • SHA256

    7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254

  • SHA512

    0dd1d3c00fc682d329f0d07ff62758cfa6dd3f8e4015cfc7d14b3464374001df380cce47c078a13e60b15557c81006ddebc326c147cacd25629e5a80933c0633

  • SSDEEP

    24576:3y6sKOjkU35UmAbs98lWhgN8FPomRL+WOLKHh6:CvKOHpPAY98Z2gmZYa

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5228a8bbf28b3d0b59d1f63846066256.exe
    "C:\Users\Admin\AppData\Local\Temp\5228a8bbf28b3d0b59d1f63846066256.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2500
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 268
                7⤵
                • Program crash
                PID:2708
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2528

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
    Filesize

    841KB

    MD5

    b54bf5a8aab5fe654c06a0c29952f92e

    SHA1

    5da6940ca428f9ba8e18374b58421869ea1be36f

    SHA256

    bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79

    SHA512

    41eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
    Filesize

    841KB

    MD5

    b54bf5a8aab5fe654c06a0c29952f92e

    SHA1

    5da6940ca428f9ba8e18374b58421869ea1be36f

    SHA256

    bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79

    SHA512

    41eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
    Filesize

    563KB

    MD5

    801b230430206d35a19eb6159b99fd3f

    SHA1

    1f129c9f4dad72d64f209b29fd9ac7c66d32dca1

    SHA256

    562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c

    SHA512

    c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
    Filesize

    563KB

    MD5

    801b230430206d35a19eb6159b99fd3f

    SHA1

    1f129c9f4dad72d64f209b29fd9ac7c66d32dca1

    SHA256

    562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c

    SHA512

    c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
    Filesize

    397KB

    MD5

    150d459075404075f0dbbcada4949fdd

    SHA1

    f846c30432e6a3454e2607f4aaaed2bf6ba3b222

    SHA256

    d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2

    SHA512

    4207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
    Filesize

    397KB

    MD5

    150d459075404075f0dbbcada4949fdd

    SHA1

    f846c30432e6a3454e2607f4aaaed2bf6ba3b222

    SHA256

    d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2

    SHA512

    4207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
    Filesize

    841KB

    MD5

    b54bf5a8aab5fe654c06a0c29952f92e

    SHA1

    5da6940ca428f9ba8e18374b58421869ea1be36f

    SHA256

    bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79

    SHA512

    41eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe
    Filesize

    841KB

    MD5

    b54bf5a8aab5fe654c06a0c29952f92e

    SHA1

    5da6940ca428f9ba8e18374b58421869ea1be36f

    SHA256

    bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79

    SHA512

    41eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
    Filesize

    563KB

    MD5

    801b230430206d35a19eb6159b99fd3f

    SHA1

    1f129c9f4dad72d64f209b29fd9ac7c66d32dca1

    SHA256

    562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c

    SHA512

    c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe
    Filesize

    563KB

    MD5

    801b230430206d35a19eb6159b99fd3f

    SHA1

    1f129c9f4dad72d64f209b29fd9ac7c66d32dca1

    SHA256

    562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c

    SHA512

    c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
    Filesize

    397KB

    MD5

    150d459075404075f0dbbcada4949fdd

    SHA1

    f846c30432e6a3454e2607f4aaaed2bf6ba3b222

    SHA256

    d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2

    SHA512

    4207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe
    Filesize

    397KB

    MD5

    150d459075404075f0dbbcada4949fdd

    SHA1

    f846c30432e6a3454e2607f4aaaed2bf6ba3b222

    SHA256

    d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2

    SHA512

    4207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe
    Filesize

    379KB

    MD5

    c9b33bbac4f5be1992248a0d60b2bec8

    SHA1

    8816fd1e3ed09fccc35d7e8dd908966726cc50b4

    SHA256

    de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3

    SHA512

    1029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae

  • memory/2500-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2500-48-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2500-43-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2500-50-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2500-54-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2500-52-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2500-47-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2500-46-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2500-45-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2500-44-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB