Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe
Resource
win10v2004-20230915-en
General
-
Target
ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe
-
Size
943KB
-
MD5
258d72718e6928bd8e4260be30c178b7
-
SHA1
c160182e8522667e749437f0589fbb9a4d4c74b7
-
SHA256
ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69
-
SHA512
dadc143b88ed59fc28e1798aca89bc6a1ce275616d27fa032f94858d04c7ff024f67fa33d502c31e35af5486791d37250cb1a42626634afd281d4578e7de591f
-
SSDEEP
24576:HysjB5xdr0uzNXmeJlc0q3eGk8CvgMSxO1+ahkNR:SC9G6st3eGk8Cvg7xO1+5
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2576-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2576-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2576-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2576-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2576-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2576-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 1456 x2642817.exe 2596 x3568183.exe 2636 x4703755.exe 2168 g8442379.exe -
Loads dropped DLL 13 IoCs
pid Process 2076 ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe 1456 x2642817.exe 1456 x2642817.exe 2596 x3568183.exe 2596 x3568183.exe 2636 x4703755.exe 2636 x4703755.exe 2636 x4703755.exe 2168 g8442379.exe 2432 WerFault.exe 2432 WerFault.exe 2432 WerFault.exe 2432 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2642817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3568183.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4703755.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 2576 2168 g8442379.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2416 2576 WerFault.exe 33 2432 2168 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1456 2076 ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe 28 PID 2076 wrote to memory of 1456 2076 ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe 28 PID 2076 wrote to memory of 1456 2076 ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe 28 PID 2076 wrote to memory of 1456 2076 ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe 28 PID 2076 wrote to memory of 1456 2076 ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe 28 PID 2076 wrote to memory of 1456 2076 ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe 28 PID 2076 wrote to memory of 1456 2076 ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe 28 PID 1456 wrote to memory of 2596 1456 x2642817.exe 29 PID 1456 wrote to memory of 2596 1456 x2642817.exe 29 PID 1456 wrote to memory of 2596 1456 x2642817.exe 29 PID 1456 wrote to memory of 2596 1456 x2642817.exe 29 PID 1456 wrote to memory of 2596 1456 x2642817.exe 29 PID 1456 wrote to memory of 2596 1456 x2642817.exe 29 PID 1456 wrote to memory of 2596 1456 x2642817.exe 29 PID 2596 wrote to memory of 2636 2596 x3568183.exe 30 PID 2596 wrote to memory of 2636 2596 x3568183.exe 30 PID 2596 wrote to memory of 2636 2596 x3568183.exe 30 PID 2596 wrote to memory of 2636 2596 x3568183.exe 30 PID 2596 wrote to memory of 2636 2596 x3568183.exe 30 PID 2596 wrote to memory of 2636 2596 x3568183.exe 30 PID 2596 wrote to memory of 2636 2596 x3568183.exe 30 PID 2636 wrote to memory of 2168 2636 x4703755.exe 31 PID 2636 wrote to memory of 2168 2636 x4703755.exe 31 PID 2636 wrote to memory of 2168 2636 x4703755.exe 31 PID 2636 wrote to memory of 2168 2636 x4703755.exe 31 PID 2636 wrote to memory of 2168 2636 x4703755.exe 31 PID 2636 wrote to memory of 2168 2636 x4703755.exe 31 PID 2636 wrote to memory of 2168 2636 x4703755.exe 31 PID 2168 wrote to memory of 2868 2168 g8442379.exe 32 PID 2168 wrote to memory of 2868 2168 g8442379.exe 32 PID 2168 wrote to memory of 2868 2168 g8442379.exe 32 PID 2168 wrote to memory of 2868 2168 g8442379.exe 32 PID 2168 wrote to memory of 2868 2168 g8442379.exe 32 PID 2168 wrote to memory of 2868 2168 g8442379.exe 32 PID 2168 wrote to memory of 2868 2168 g8442379.exe 32 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2576 2168 g8442379.exe 33 PID 2168 wrote to memory of 2432 2168 g8442379.exe 35 PID 2576 wrote to memory of 2416 2576 AppLaunch.exe 34 PID 2168 wrote to memory of 2432 2168 g8442379.exe 35 PID 2168 wrote to memory of 2432 2168 g8442379.exe 35 PID 2576 wrote to memory of 2416 2576 AppLaunch.exe 34 PID 2576 wrote to memory of 2416 2576 AppLaunch.exe 34 PID 2576 wrote to memory of 2416 2576 AppLaunch.exe 34 PID 2576 wrote to memory of 2416 2576 AppLaunch.exe 34 PID 2576 wrote to memory of 2416 2576 AppLaunch.exe 34 PID 2576 wrote to memory of 2416 2576 AppLaunch.exe 34 PID 2168 wrote to memory of 2432 2168 g8442379.exe 35 PID 2168 wrote to memory of 2432 2168 g8442379.exe 35 PID 2168 wrote to memory of 2432 2168 g8442379.exe 35 PID 2168 wrote to memory of 2432 2168 g8442379.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe"C:\Users\Admin\AppData\Local\Temp\ad48a3ac0e0b3103ca7e03dabd593345cce54d6e87488951d963179bb121de69.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2642817.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2642817.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3568183.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3568183.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4703755.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4703755.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8442379.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 2687⤵
- Program crash
PID:2416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:2432
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841KB
MD5646d892b425c69bdf93810cbc5039dec
SHA184cf105a600812720c3a4978b31a5815e0c5dcae
SHA25654274fa5dd2d181d0e13363390467fffe82b5404f4aaaf299eebbaa55272d444
SHA512d679877ee4e59fbbdf55c6f62f30a73b67207fb50baf5ca5ca64d254a28d006cfdffea5b5671c8aa2bfb63310bdb075bce7342bb8d5c8a3c850c6e933e5e468f
-
Filesize
841KB
MD5646d892b425c69bdf93810cbc5039dec
SHA184cf105a600812720c3a4978b31a5815e0c5dcae
SHA25654274fa5dd2d181d0e13363390467fffe82b5404f4aaaf299eebbaa55272d444
SHA512d679877ee4e59fbbdf55c6f62f30a73b67207fb50baf5ca5ca64d254a28d006cfdffea5b5671c8aa2bfb63310bdb075bce7342bb8d5c8a3c850c6e933e5e468f
-
Filesize
563KB
MD5f67f19673c2509a0194650dfb03fe1c9
SHA1ceae61e22b9097c173b06d5ddcc8851f6fc986a7
SHA256aaf04fd4c52ce54df06c63ea50a9da3500b0c206e51b25eefba937a45a11720c
SHA512a41190cca9f1cd0b2b5b91607dd9d697b908dac0250e97709841aac56968412c748aaceb0628f5ec9ff138e58910e44f007abf0c8b41fb7abd4785d9846bcf03
-
Filesize
563KB
MD5f67f19673c2509a0194650dfb03fe1c9
SHA1ceae61e22b9097c173b06d5ddcc8851f6fc986a7
SHA256aaf04fd4c52ce54df06c63ea50a9da3500b0c206e51b25eefba937a45a11720c
SHA512a41190cca9f1cd0b2b5b91607dd9d697b908dac0250e97709841aac56968412c748aaceb0628f5ec9ff138e58910e44f007abf0c8b41fb7abd4785d9846bcf03
-
Filesize
397KB
MD5bd4d5721f222b98057846e15e30af6b3
SHA165c5ed845eafdc19565142ed7138a6871842792c
SHA25666ebe00a2f9818034c6e4ae822f68dc5b59635a27b834c3356c1d667582d9fde
SHA512346dfd92a5214880250a13d72bfc3a26974d6a1a6d77ec70196ecd9a9e48ceadd144ae9ff3282e38eefb0774215e7674ecb773f5916f6842313320bec0b42700
-
Filesize
397KB
MD5bd4d5721f222b98057846e15e30af6b3
SHA165c5ed845eafdc19565142ed7138a6871842792c
SHA25666ebe00a2f9818034c6e4ae822f68dc5b59635a27b834c3356c1d667582d9fde
SHA512346dfd92a5214880250a13d72bfc3a26974d6a1a6d77ec70196ecd9a9e48ceadd144ae9ff3282e38eefb0774215e7674ecb773f5916f6842313320bec0b42700
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea
-
Filesize
841KB
MD5646d892b425c69bdf93810cbc5039dec
SHA184cf105a600812720c3a4978b31a5815e0c5dcae
SHA25654274fa5dd2d181d0e13363390467fffe82b5404f4aaaf299eebbaa55272d444
SHA512d679877ee4e59fbbdf55c6f62f30a73b67207fb50baf5ca5ca64d254a28d006cfdffea5b5671c8aa2bfb63310bdb075bce7342bb8d5c8a3c850c6e933e5e468f
-
Filesize
841KB
MD5646d892b425c69bdf93810cbc5039dec
SHA184cf105a600812720c3a4978b31a5815e0c5dcae
SHA25654274fa5dd2d181d0e13363390467fffe82b5404f4aaaf299eebbaa55272d444
SHA512d679877ee4e59fbbdf55c6f62f30a73b67207fb50baf5ca5ca64d254a28d006cfdffea5b5671c8aa2bfb63310bdb075bce7342bb8d5c8a3c850c6e933e5e468f
-
Filesize
563KB
MD5f67f19673c2509a0194650dfb03fe1c9
SHA1ceae61e22b9097c173b06d5ddcc8851f6fc986a7
SHA256aaf04fd4c52ce54df06c63ea50a9da3500b0c206e51b25eefba937a45a11720c
SHA512a41190cca9f1cd0b2b5b91607dd9d697b908dac0250e97709841aac56968412c748aaceb0628f5ec9ff138e58910e44f007abf0c8b41fb7abd4785d9846bcf03
-
Filesize
563KB
MD5f67f19673c2509a0194650dfb03fe1c9
SHA1ceae61e22b9097c173b06d5ddcc8851f6fc986a7
SHA256aaf04fd4c52ce54df06c63ea50a9da3500b0c206e51b25eefba937a45a11720c
SHA512a41190cca9f1cd0b2b5b91607dd9d697b908dac0250e97709841aac56968412c748aaceb0628f5ec9ff138e58910e44f007abf0c8b41fb7abd4785d9846bcf03
-
Filesize
397KB
MD5bd4d5721f222b98057846e15e30af6b3
SHA165c5ed845eafdc19565142ed7138a6871842792c
SHA25666ebe00a2f9818034c6e4ae822f68dc5b59635a27b834c3356c1d667582d9fde
SHA512346dfd92a5214880250a13d72bfc3a26974d6a1a6d77ec70196ecd9a9e48ceadd144ae9ff3282e38eefb0774215e7674ecb773f5916f6842313320bec0b42700
-
Filesize
397KB
MD5bd4d5721f222b98057846e15e30af6b3
SHA165c5ed845eafdc19565142ed7138a6871842792c
SHA25666ebe00a2f9818034c6e4ae822f68dc5b59635a27b834c3356c1d667582d9fde
SHA512346dfd92a5214880250a13d72bfc3a26974d6a1a6d77ec70196ecd9a9e48ceadd144ae9ff3282e38eefb0774215e7674ecb773f5916f6842313320bec0b42700
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea
-
Filesize
379KB
MD5784ea2b906f1cbc5b3ddc8172884f4a3
SHA1acc43fe767fa14a298f5944af47f4bcd094323c3
SHA256f15651aedf7387bc9f76f4ab98e426957c006d3faa180a887f7e5b7d2df75585
SHA5127e894014a522c2835a9d63fba74eb90da958941980c7231aeae805a039e29e7fb088129f0a666648a78516d38079b898cc2539548f175b1c0ed4b71586c566ea