Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 13:51

General

  • Target

    ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe

  • Size

    943KB

  • MD5

    258d72718e6928bd8e4260be30c178b7

  • SHA1

    c160182e8522667e749437f0589fbb9a4d4c74b7

  • SHA256

    ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69

  • SHA512

    dadc143b88ed59fc28e1798aca89bc6a1ce275616d27fa032f94858d04c7ff024f67fa33d502c31e35af5486791d37250cb1a42626634afd281d4578e7de591f

  • SSDEEP

    24576:HysjB5xdr0uzNXmeJlc0q3eGk8CvgMSxO1+ahkNR:SC9G6st3eGk8Cvg7xO1+5

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe
    "C:\Users\Admin\AppData\Local\Temp\ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2642817.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2642817.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3568183.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3568183.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4703755.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4703755.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2168
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2868
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2576
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 268
                  7⤵
                  • Program crash
                  PID:2416
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 280
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2432

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2642817.exe

            Filesize

            841KB

            MD5

            646d892b425c69bdf93810cbc5039dec

            SHA1

            84cf105a600812720c3a4978b31a5815e0c5dcae

            SHA256

            54274fa5dd2d181d0e13363390467fffe82b5404f4aaaf299eebbaa55272d444

            SHA512

            d679877ee4e59fbbdf55c6f62f30a73b67207fb50baf5ca5ca64d254a28d006cfdffea5b5671c8aa2bfb63310bdb075bce7342bb8d5c8a3c850c6e933e5e468f

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2642817.exe

            Filesize

            841KB

            MD5

            646d892b425c69bdf93810cbc5039dec

            SHA1

            84cf105a600812720c3a4978b31a5815e0c5dcae

            SHA256

            54274fa5dd2d181d0e13363390467fffe82b5404f4aaaf299eebbaa55272d444

            SHA512

            d679877ee4e59fbbdf55c6f62f30a73b67207fb50baf5ca5ca64d254a28d006cfdffea5b5671c8aa2bfb63310bdb075bce7342bb8d5c8a3c850c6e933e5e468f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3568183.exe

            Filesize

            563KB

            MD5

            f67f19673c2509a0194650dfb03fe1c9

            SHA1

            ceae61e22b9097c173b06d5ddcc8851f6fc986a7

            SHA256

            aaf04fd4c52ce54df06c63ea50a9da3500b0c206e51b25eefba937a45a11720c

            SHA512

            a41190cca9f1cd0b2b5b91607dd9d697b908dac0250e97709841aac56968412c748aaceb0628f5ec9ff138e58910e44f007abf0c8b41fb7abd4785d9846bcf03

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3568183.exe

            Filesize

            563KB

            MD5

            f67f19673c2509a0194650dfb03fe1c9

            SHA1

            ceae61e22b9097c173b06d5ddcc8851f6fc986a7

            SHA256

            aaf04fd4c52ce54df06c63ea50a9da3500b0c206e51b25eefba937a45a11720c

            SHA512

            a41190cca9f1cd0b2b5b91607dd9d697b908dac0250e97709841aac56968412c748aaceb0628f5ec9ff138e58910e44f007abf0c8b41fb7abd4785d9846bcf03

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4703755.exe

            Filesize

            397KB

            MD5

            bd4d5721f222b98057846e15e30af6b3

            SHA1

            65c5ed845eafdc19565142ed7138a6871842792c

            SHA256

            66ebe00a2f9818034c6e4ae822f68dc5b59635a27b834c3356c1d667582d9fde

            SHA512

            346dfd92a5214880250a13d72bfc3a26974d6a1a6d77ec70196ecd9a9e48ceadd144ae9ff3282e38eefb0774215e7674ecb773f5916f6842313320bec0b42700

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4703755.exe

            Filesize

            397KB

            MD5

            bd4d5721f222b98057846e15e30af6b3

            SHA1

            65c5ed845eafdc19565142ed7138a6871842792c

            SHA256

            66ebe00a2f9818034c6e4ae822f68dc5b59635a27b834c3356c1d667582d9fde

            SHA512

            346dfd92a5214880250a13d72bfc3a26974d6a1a6d77ec70196ecd9a9e48ceadd144ae9ff3282e38eefb0774215e7674ecb773f5916f6842313320bec0b42700

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2642817.exe

            Filesize

            841KB

            MD5

            646d892b425c69bdf93810cbc5039dec

            SHA1

            84cf105a600812720c3a4978b31a5815e0c5dcae

            SHA256

            54274fa5dd2d181d0e13363390467fffe82b5404f4aaaf299eebbaa55272d444

            SHA512

            d679877ee4e59fbbdf55c6f62f30a73b67207fb50baf5ca5ca64d254a28d006cfdffea5b5671c8aa2bfb63310bdb075bce7342bb8d5c8a3c850c6e933e5e468f

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2642817.exe

            Filesize

            841KB

            MD5

            646d892b425c69bdf93810cbc5039dec

            SHA1

            84cf105a600812720c3a4978b31a5815e0c5dcae

            SHA256

            54274fa5dd2d181d0e13363390467fffe82b5404f4aaaf299eebbaa55272d444

            SHA512

            d679877ee4e59fbbdf55c6f62f30a73b67207fb50baf5ca5ca64d254a28d006cfdffea5b5671c8aa2bfb63310bdb075bce7342bb8d5c8a3c850c6e933e5e468f

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3568183.exe

            Filesize

            563KB

            MD5

            f67f19673c2509a0194650dfb03fe1c9

            SHA1

            ceae61e22b9097c173b06d5ddcc8851f6fc986a7

            SHA256

            aaf04fd4c52ce54df06c63ea50a9da3500b0c206e51b25eefba937a45a11720c

            SHA512

            a41190cca9f1cd0b2b5b91607dd9d697b908dac0250e97709841aac56968412c748aaceb0628f5ec9ff138e58910e44f007abf0c8b41fb7abd4785d9846bcf03

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3568183.exe

            Filesize

            563KB

            MD5

            f67f19673c2509a0194650dfb03fe1c9

            SHA1

            ceae61e22b9097c173b06d5ddcc8851f6fc986a7

            SHA256

            aaf04fd4c52ce54df06c63ea50a9da3500b0c206e51b25eefba937a45a11720c

            SHA512

            a41190cca9f1cd0b2b5b91607dd9d697b908dac0250e97709841aac56968412c748aaceb0628f5ec9ff138e58910e44f007abf0c8b41fb7abd4785d9846bcf03

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4703755.exe

            Filesize

            397KB

            MD5

            bd4d5721f222b98057846e15e30af6b3

            SHA1

            65c5ed845eafdc19565142ed7138a6871842792c

            SHA256

            66ebe00a2f9818034c6e4ae822f68dc5b59635a27b834c3356c1d667582d9fde

            SHA512

            346dfd92a5214880250a13d72bfc3a26974d6a1a6d77ec70196ecd9a9e48ceadd144ae9ff3282e38eefb0774215e7674ecb773f5916f6842313320bec0b42700

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4703755.exe

            Filesize

            397KB

            MD5

            bd4d5721f222b98057846e15e30af6b3

            SHA1

            65c5ed845eafdc19565142ed7138a6871842792c

            SHA256

            66ebe00a2f9818034c6e4ae822f68dc5b59635a27b834c3356c1d667582d9fde

            SHA512

            346dfd92a5214880250a13d72bfc3a26974d6a1a6d77ec70196ecd9a9e48ceadd144ae9ff3282e38eefb0774215e7674ecb773f5916f6842313320bec0b42700

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe

            Filesize

            379KB

            MD5

            784ea2b906f1cbc5b3ddc8172884f4a3

            SHA1

            acc43fe767fa14a298f5944af47f4bcd094323c3

            SHA256

            f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585

            SHA512

            7e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea

          • memory/2576-50-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2576-48-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2576-43-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2576-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2576-52-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2576-54-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2576-47-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2576-46-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2576-45-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2576-44-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB