Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 12:40
Static task
static1
Behavioral task
behavioral1
Sample
7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe
Resource
win10v2004-20230915-en
General
-
Target
7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe
-
Size
943KB
-
MD5
5228a8bbf28b3d0b59d1f63846066256
-
SHA1
1fff8f5cb0502ac4cdfdc52daafe8b26f2fd0137
-
SHA256
7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254
-
SHA512
0dd1d3c00fc682d329f0d07ff62758cfa6dd3f8e4015cfc7d14b3464374001df380cce47c078a13e60b15557c81006ddebc326c147cacd25629e5a80933c0633
-
SSDEEP
24576:3y6sKOjkU35UmAbs98lWhgN8FPomRL+WOLKHh6:CvKOHpPAY98Z2gmZYa
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2552-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
Processes:
x7839849.exex1251527.exex0289025.exeg0920239.exepid process 2712 x7839849.exe 2668 x1251527.exe 3048 x0289025.exe 2532 g0920239.exe -
Loads dropped DLL 13 IoCs
Processes:
7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exex7839849.exex1251527.exex0289025.exeg0920239.exeWerFault.exepid process 1728 7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe 2712 x7839849.exe 2712 x7839849.exe 2668 x1251527.exe 2668 x1251527.exe 3048 x0289025.exe 3048 x0289025.exe 3048 x0289025.exe 2532 g0920239.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
x0289025.exe7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exex7839849.exex1251527.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0289025.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7839849.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1251527.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g0920239.exedescription pid process target process PID 2532 set thread context of 2552 2532 g0920239.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2692 2532 WerFault.exe g0920239.exe 2524 2552 WerFault.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exex7839849.exex1251527.exex0289025.exeg0920239.exeAppLaunch.exedescription pid process target process PID 1728 wrote to memory of 2712 1728 7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe x7839849.exe PID 1728 wrote to memory of 2712 1728 7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe x7839849.exe PID 1728 wrote to memory of 2712 1728 7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe x7839849.exe PID 1728 wrote to memory of 2712 1728 7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe x7839849.exe PID 1728 wrote to memory of 2712 1728 7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe x7839849.exe PID 1728 wrote to memory of 2712 1728 7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe x7839849.exe PID 1728 wrote to memory of 2712 1728 7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe x7839849.exe PID 2712 wrote to memory of 2668 2712 x7839849.exe x1251527.exe PID 2712 wrote to memory of 2668 2712 x7839849.exe x1251527.exe PID 2712 wrote to memory of 2668 2712 x7839849.exe x1251527.exe PID 2712 wrote to memory of 2668 2712 x7839849.exe x1251527.exe PID 2712 wrote to memory of 2668 2712 x7839849.exe x1251527.exe PID 2712 wrote to memory of 2668 2712 x7839849.exe x1251527.exe PID 2712 wrote to memory of 2668 2712 x7839849.exe x1251527.exe PID 2668 wrote to memory of 3048 2668 x1251527.exe x0289025.exe PID 2668 wrote to memory of 3048 2668 x1251527.exe x0289025.exe PID 2668 wrote to memory of 3048 2668 x1251527.exe x0289025.exe PID 2668 wrote to memory of 3048 2668 x1251527.exe x0289025.exe PID 2668 wrote to memory of 3048 2668 x1251527.exe x0289025.exe PID 2668 wrote to memory of 3048 2668 x1251527.exe x0289025.exe PID 2668 wrote to memory of 3048 2668 x1251527.exe x0289025.exe PID 3048 wrote to memory of 2532 3048 x0289025.exe g0920239.exe PID 3048 wrote to memory of 2532 3048 x0289025.exe g0920239.exe PID 3048 wrote to memory of 2532 3048 x0289025.exe g0920239.exe PID 3048 wrote to memory of 2532 3048 x0289025.exe g0920239.exe PID 3048 wrote to memory of 2532 3048 x0289025.exe g0920239.exe PID 3048 wrote to memory of 2532 3048 x0289025.exe g0920239.exe PID 3048 wrote to memory of 2532 3048 x0289025.exe g0920239.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2552 2532 g0920239.exe AppLaunch.exe PID 2532 wrote to memory of 2692 2532 g0920239.exe WerFault.exe PID 2532 wrote to memory of 2692 2532 g0920239.exe WerFault.exe PID 2532 wrote to memory of 2692 2532 g0920239.exe WerFault.exe PID 2532 wrote to memory of 2692 2532 g0920239.exe WerFault.exe PID 2532 wrote to memory of 2692 2532 g0920239.exe WerFault.exe PID 2532 wrote to memory of 2692 2532 g0920239.exe WerFault.exe PID 2532 wrote to memory of 2692 2532 g0920239.exe WerFault.exe PID 2552 wrote to memory of 2524 2552 AppLaunch.exe WerFault.exe PID 2552 wrote to memory of 2524 2552 AppLaunch.exe WerFault.exe PID 2552 wrote to memory of 2524 2552 AppLaunch.exe WerFault.exe PID 2552 wrote to memory of 2524 2552 AppLaunch.exe WerFault.exe PID 2552 wrote to memory of 2524 2552 AppLaunch.exe WerFault.exe PID 2552 wrote to memory of 2524 2552 AppLaunch.exe WerFault.exe PID 2552 wrote to memory of 2524 2552 AppLaunch.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe"C:\Users\Admin\AppData\Local\Temp\7d99eb634d001b9dc8667d34cf8f0ae1a067e69dbd366e63af156a592017d254.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839849.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1251527.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0289025.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0920239.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 2687⤵
- Program crash
PID:2524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841KB
MD5b54bf5a8aab5fe654c06a0c29952f92e
SHA15da6940ca428f9ba8e18374b58421869ea1be36f
SHA256bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79
SHA51241eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7
-
Filesize
841KB
MD5b54bf5a8aab5fe654c06a0c29952f92e
SHA15da6940ca428f9ba8e18374b58421869ea1be36f
SHA256bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79
SHA51241eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7
-
Filesize
563KB
MD5801b230430206d35a19eb6159b99fd3f
SHA11f129c9f4dad72d64f209b29fd9ac7c66d32dca1
SHA256562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c
SHA512c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f
-
Filesize
563KB
MD5801b230430206d35a19eb6159b99fd3f
SHA11f129c9f4dad72d64f209b29fd9ac7c66d32dca1
SHA256562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c
SHA512c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f
-
Filesize
397KB
MD5150d459075404075f0dbbcada4949fdd
SHA1f846c30432e6a3454e2607f4aaaed2bf6ba3b222
SHA256d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2
SHA5124207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd
-
Filesize
397KB
MD5150d459075404075f0dbbcada4949fdd
SHA1f846c30432e6a3454e2607f4aaaed2bf6ba3b222
SHA256d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2
SHA5124207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae
-
Filesize
841KB
MD5b54bf5a8aab5fe654c06a0c29952f92e
SHA15da6940ca428f9ba8e18374b58421869ea1be36f
SHA256bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79
SHA51241eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7
-
Filesize
841KB
MD5b54bf5a8aab5fe654c06a0c29952f92e
SHA15da6940ca428f9ba8e18374b58421869ea1be36f
SHA256bf3e8eedc2f689e780770a665daebfdaf4bd3cc626aa0e7448ad267801aa2c79
SHA51241eb1bec32a5b93dbed5d1ccba2664dfdc252b4baf092ca25e41b54584b7005b57a3e1e1b1ba842666edb6cdac10423aec30773e72e2c1ef8364bd4031d5eda7
-
Filesize
563KB
MD5801b230430206d35a19eb6159b99fd3f
SHA11f129c9f4dad72d64f209b29fd9ac7c66d32dca1
SHA256562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c
SHA512c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f
-
Filesize
563KB
MD5801b230430206d35a19eb6159b99fd3f
SHA11f129c9f4dad72d64f209b29fd9ac7c66d32dca1
SHA256562d5cc42c9af119f17cf05624d86947cb275cda49f3947497a6ba7832666d3c
SHA512c61470f418745c51f1313cbdc3d2917262f2e21cf0a7c89daea9a35599d75982b648a64db4efe03c0dd2e296d21382880c0ddd4a2b50c36cb41e9cb0593eae2f
-
Filesize
397KB
MD5150d459075404075f0dbbcada4949fdd
SHA1f846c30432e6a3454e2607f4aaaed2bf6ba3b222
SHA256d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2
SHA5124207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd
-
Filesize
397KB
MD5150d459075404075f0dbbcada4949fdd
SHA1f846c30432e6a3454e2607f4aaaed2bf6ba3b222
SHA256d1959e6aa3cc0cdf622f65b8055ec0ab8d539d6394a115b7bcdca062432830e2
SHA5124207423ab4e3a37dc7dd0b79db92a091a0e1cd3f2fa45b89f8ee905bbd5bd0b8c36ef49f839999c59843c4f06915b70d9be0ee061b500360e3a38b96eca7fadd
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae
-
Filesize
379KB
MD5c9b33bbac4f5be1992248a0d60b2bec8
SHA18816fd1e3ed09fccc35d7e8dd908966726cc50b4
SHA256de9af8333e4d7458e7028b9dfd7d461a6084beb4e4b32f1c3e3bb10d282e26b3
SHA5121029eca5c8059483635519045b624e3b9fbe129e14f5bc437944998003d6ac2ab7e1e324c6c42a13ad2d4fce2471b19c4ffdf0de0bf28f1fcccb8c988ab625ae