Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe
Resource
win10v2004-20230915-en
General
-
Target
601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe
-
Size
943KB
-
MD5
c54d795009aabc12674029d959ad3b86
-
SHA1
a17eb49d8937735d026bb4e36d1c6911f262bdc4
-
SHA256
601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a
-
SHA512
74a62fd3558da9a5c76b13093e098e37a458e2688667994f574b95ae65e2567d6fa7cc3774b6581a0cf369bc7408854e30e50951e11442a9da6d9a76e14992c6
-
SSDEEP
12288:RMrDy90vg0fw2xVhJKqERlLQwZ2OH4+Te0Eyf3Yz/unEIPPY+JoGmYRe1J+Pwxj4:2yslgqqvHbxgTunhYSo0ef+oj4
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2728-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2932 x9628675.exe 2992 x4691493.exe 2640 x8140633.exe 2768 g7645872.exe -
Loads dropped DLL 13 IoCs
pid Process 1752 601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe 2932 x9628675.exe 2932 x9628675.exe 2992 x4691493.exe 2992 x4691493.exe 2640 x8140633.exe 2640 x8140633.exe 2640 x8140633.exe 2768 g7645872.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9628675.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4691493.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8140633.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2768 set thread context of 2728 2768 g7645872.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2772 2768 WerFault.exe 31 2524 2728 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2932 1752 601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe 28 PID 1752 wrote to memory of 2932 1752 601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe 28 PID 1752 wrote to memory of 2932 1752 601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe 28 PID 1752 wrote to memory of 2932 1752 601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe 28 PID 1752 wrote to memory of 2932 1752 601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe 28 PID 1752 wrote to memory of 2932 1752 601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe 28 PID 1752 wrote to memory of 2932 1752 601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe 28 PID 2932 wrote to memory of 2992 2932 x9628675.exe 29 PID 2932 wrote to memory of 2992 2932 x9628675.exe 29 PID 2932 wrote to memory of 2992 2932 x9628675.exe 29 PID 2932 wrote to memory of 2992 2932 x9628675.exe 29 PID 2932 wrote to memory of 2992 2932 x9628675.exe 29 PID 2932 wrote to memory of 2992 2932 x9628675.exe 29 PID 2932 wrote to memory of 2992 2932 x9628675.exe 29 PID 2992 wrote to memory of 2640 2992 x4691493.exe 30 PID 2992 wrote to memory of 2640 2992 x4691493.exe 30 PID 2992 wrote to memory of 2640 2992 x4691493.exe 30 PID 2992 wrote to memory of 2640 2992 x4691493.exe 30 PID 2992 wrote to memory of 2640 2992 x4691493.exe 30 PID 2992 wrote to memory of 2640 2992 x4691493.exe 30 PID 2992 wrote to memory of 2640 2992 x4691493.exe 30 PID 2640 wrote to memory of 2768 2640 x8140633.exe 31 PID 2640 wrote to memory of 2768 2640 x8140633.exe 31 PID 2640 wrote to memory of 2768 2640 x8140633.exe 31 PID 2640 wrote to memory of 2768 2640 x8140633.exe 31 PID 2640 wrote to memory of 2768 2640 x8140633.exe 31 PID 2640 wrote to memory of 2768 2640 x8140633.exe 31 PID 2640 wrote to memory of 2768 2640 x8140633.exe 31 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2728 2768 g7645872.exe 32 PID 2768 wrote to memory of 2772 2768 g7645872.exe 33 PID 2768 wrote to memory of 2772 2768 g7645872.exe 33 PID 2768 wrote to memory of 2772 2768 g7645872.exe 33 PID 2768 wrote to memory of 2772 2768 g7645872.exe 33 PID 2768 wrote to memory of 2772 2768 g7645872.exe 33 PID 2768 wrote to memory of 2772 2768 g7645872.exe 33 PID 2768 wrote to memory of 2772 2768 g7645872.exe 33 PID 2728 wrote to memory of 2524 2728 AppLaunch.exe 34 PID 2728 wrote to memory of 2524 2728 AppLaunch.exe 34 PID 2728 wrote to memory of 2524 2728 AppLaunch.exe 34 PID 2728 wrote to memory of 2524 2728 AppLaunch.exe 34 PID 2728 wrote to memory of 2524 2728 AppLaunch.exe 34 PID 2728 wrote to memory of 2524 2728 AppLaunch.exe 34 PID 2728 wrote to memory of 2524 2728 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe"C:\Users\Admin\AppData\Local\Temp\601effd3e0eb5677bfe635c645042851a782c244b120e01eb5934fbad0ee774a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9628675.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9628675.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4691493.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4691493.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8140633.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8140633.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7645872.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7645872.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 2687⤵
- Program crash
PID:2524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2772
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841KB
MD5412d0512e29565f33470d1b5dc614e24
SHA1b84a7a0c6287ca74723d85f8e302365d5fa77e58
SHA256761df1529134f551315a750b6c7123667fd379c79beca9ed713a2afd0ff14989
SHA51295c66b994a2fcd8fac4705931ad9bfa472a8062a3d8e21782d072f563ec0444c3f3a7bcda23974ab50c6ca510e58c86cbd62c42ae1c7548235a3e921c096e1c9
-
Filesize
841KB
MD5412d0512e29565f33470d1b5dc614e24
SHA1b84a7a0c6287ca74723d85f8e302365d5fa77e58
SHA256761df1529134f551315a750b6c7123667fd379c79beca9ed713a2afd0ff14989
SHA51295c66b994a2fcd8fac4705931ad9bfa472a8062a3d8e21782d072f563ec0444c3f3a7bcda23974ab50c6ca510e58c86cbd62c42ae1c7548235a3e921c096e1c9
-
Filesize
563KB
MD554b82d736167fe7f0d0a77ea12c1fd95
SHA1c32d12da962fb85184c15f9cc22885f9ab032b1f
SHA256e550de37908f4500dff33acb21d15f40ffd5fac1a53761008965dfb8529fdb96
SHA5127a7e1bcbc77a28d89643731c6e42023af6158b535976239ded83be955f84f78dd4d238bae850790ab4c36f8fcd1a7387717e3afcd95f54215c2037486ba04e22
-
Filesize
563KB
MD554b82d736167fe7f0d0a77ea12c1fd95
SHA1c32d12da962fb85184c15f9cc22885f9ab032b1f
SHA256e550de37908f4500dff33acb21d15f40ffd5fac1a53761008965dfb8529fdb96
SHA5127a7e1bcbc77a28d89643731c6e42023af6158b535976239ded83be955f84f78dd4d238bae850790ab4c36f8fcd1a7387717e3afcd95f54215c2037486ba04e22
-
Filesize
397KB
MD5249a048f18d8a42f6df906a910fac3ac
SHA1f218114dd60fca0067b251f1c654bea7b578bdab
SHA256e2ad2e7f0649830143f11832da826d5363df3783b25a16ca5520dffcd2074bf5
SHA512cdd71839c8713b5a2c2ead7360fc1bde1461cbdd20dfe801b6da87c217c3c3a49e875a8550cc03b23509632070d156f12bd46c4011ab8f002617d36158e38863
-
Filesize
397KB
MD5249a048f18d8a42f6df906a910fac3ac
SHA1f218114dd60fca0067b251f1c654bea7b578bdab
SHA256e2ad2e7f0649830143f11832da826d5363df3783b25a16ca5520dffcd2074bf5
SHA512cdd71839c8713b5a2c2ead7360fc1bde1461cbdd20dfe801b6da87c217c3c3a49e875a8550cc03b23509632070d156f12bd46c4011ab8f002617d36158e38863
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4
-
Filesize
841KB
MD5412d0512e29565f33470d1b5dc614e24
SHA1b84a7a0c6287ca74723d85f8e302365d5fa77e58
SHA256761df1529134f551315a750b6c7123667fd379c79beca9ed713a2afd0ff14989
SHA51295c66b994a2fcd8fac4705931ad9bfa472a8062a3d8e21782d072f563ec0444c3f3a7bcda23974ab50c6ca510e58c86cbd62c42ae1c7548235a3e921c096e1c9
-
Filesize
841KB
MD5412d0512e29565f33470d1b5dc614e24
SHA1b84a7a0c6287ca74723d85f8e302365d5fa77e58
SHA256761df1529134f551315a750b6c7123667fd379c79beca9ed713a2afd0ff14989
SHA51295c66b994a2fcd8fac4705931ad9bfa472a8062a3d8e21782d072f563ec0444c3f3a7bcda23974ab50c6ca510e58c86cbd62c42ae1c7548235a3e921c096e1c9
-
Filesize
563KB
MD554b82d736167fe7f0d0a77ea12c1fd95
SHA1c32d12da962fb85184c15f9cc22885f9ab032b1f
SHA256e550de37908f4500dff33acb21d15f40ffd5fac1a53761008965dfb8529fdb96
SHA5127a7e1bcbc77a28d89643731c6e42023af6158b535976239ded83be955f84f78dd4d238bae850790ab4c36f8fcd1a7387717e3afcd95f54215c2037486ba04e22
-
Filesize
563KB
MD554b82d736167fe7f0d0a77ea12c1fd95
SHA1c32d12da962fb85184c15f9cc22885f9ab032b1f
SHA256e550de37908f4500dff33acb21d15f40ffd5fac1a53761008965dfb8529fdb96
SHA5127a7e1bcbc77a28d89643731c6e42023af6158b535976239ded83be955f84f78dd4d238bae850790ab4c36f8fcd1a7387717e3afcd95f54215c2037486ba04e22
-
Filesize
397KB
MD5249a048f18d8a42f6df906a910fac3ac
SHA1f218114dd60fca0067b251f1c654bea7b578bdab
SHA256e2ad2e7f0649830143f11832da826d5363df3783b25a16ca5520dffcd2074bf5
SHA512cdd71839c8713b5a2c2ead7360fc1bde1461cbdd20dfe801b6da87c217c3c3a49e875a8550cc03b23509632070d156f12bd46c4011ab8f002617d36158e38863
-
Filesize
397KB
MD5249a048f18d8a42f6df906a910fac3ac
SHA1f218114dd60fca0067b251f1c654bea7b578bdab
SHA256e2ad2e7f0649830143f11832da826d5363df3783b25a16ca5520dffcd2074bf5
SHA512cdd71839c8713b5a2c2ead7360fc1bde1461cbdd20dfe801b6da87c217c3c3a49e875a8550cc03b23509632070d156f12bd46c4011ab8f002617d36158e38863
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4
-
Filesize
379KB
MD549724c80dc7048acd92e135b9739ae90
SHA134587d7fe9699a1d75c6e8451e3af1bda66524f3
SHA256092e5d102677ff1bff407ba7539b14cb5fc514415560c2d6d8bc95c271b37a8f
SHA51275108264dad81b4ed7cd64824d4215e5f9859b05cd9480667e15b525cdaf973e82528d99eb57d021ac226406d714fd99795bfd4fc8bea874495a67df08aa05c4