Analysis

  • max time kernel
    120s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 14:11

General

  • Target

    55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe

  • Size

    943KB

  • MD5

    e31ab4c222f7e2c4b70cd9a9f34b2ed9

  • SHA1

    bc01a00bcced4f40decd3ce0952fc7da2dc47c15

  • SHA256

    55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733

  • SHA512

    b5038fa5756f9f5320d1bd9fbb629a79a42c2dc2e69d36a5d1fefab20c6779ab0599d3a29fb8d24647041c05b348ecd55ea5b87b55a4f63d19251ca74912a017

  • SSDEEP

    24576:syRS1fhUx+W5y4tGccJHohthBM+D9jTQ:b+adGDythBM+Dx

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe
    "C:\Users\Admin\AppData\Local\Temp\55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3482203.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3482203.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9604015.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9604015.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2869829.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2869829.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2748
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 268
                7⤵
                • Program crash
                PID:2528
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2448

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3482203.exe

          Filesize

          841KB

          MD5

          2281a7c2af155ec1da27b3d074fcb558

          SHA1

          febfa84687c985df7bef45e31a69b0edfbeb2bbb

          SHA256

          9f8346f2e8c339dd570e821c7d0a352843854da04b8303dbd51fdbd91aa1252b

          SHA512

          9e20e30edb121abe7926a95acfc79702bcce6c009f536661dbd21887a620d9600327f4fa127658cbfe7e3f342e4564c11911782577b7854cca0f89ffd462d5ef

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3482203.exe

          Filesize

          841KB

          MD5

          2281a7c2af155ec1da27b3d074fcb558

          SHA1

          febfa84687c985df7bef45e31a69b0edfbeb2bbb

          SHA256

          9f8346f2e8c339dd570e821c7d0a352843854da04b8303dbd51fdbd91aa1252b

          SHA512

          9e20e30edb121abe7926a95acfc79702bcce6c009f536661dbd21887a620d9600327f4fa127658cbfe7e3f342e4564c11911782577b7854cca0f89ffd462d5ef

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9604015.exe

          Filesize

          563KB

          MD5

          37d36ca7c7d887e14261c617fa477a09

          SHA1

          4fe22821665bf0a10299841ca97f30830c147364

          SHA256

          8902cd20f1ebb20642b77d2fda6fd397039c0f02489ea5bd0be3dccd29a03c54

          SHA512

          3f4113bc44dddd08325ce1ad8e6a59578888ec8fc92635bb8cdbe5def51e72f69b7c4ca34da5e55f59bf5deead88fbe5dc2c512b0a9d63543f77e631bc6ee8e0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9604015.exe

          Filesize

          563KB

          MD5

          37d36ca7c7d887e14261c617fa477a09

          SHA1

          4fe22821665bf0a10299841ca97f30830c147364

          SHA256

          8902cd20f1ebb20642b77d2fda6fd397039c0f02489ea5bd0be3dccd29a03c54

          SHA512

          3f4113bc44dddd08325ce1ad8e6a59578888ec8fc92635bb8cdbe5def51e72f69b7c4ca34da5e55f59bf5deead88fbe5dc2c512b0a9d63543f77e631bc6ee8e0

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2869829.exe

          Filesize

          397KB

          MD5

          9b0a0a5d59c0d341a9f02954db4e9369

          SHA1

          112fe6de33dc20531146eead854e4f96e3f27912

          SHA256

          a2f2524b62e2d953eeffaa3b269d34b5bdc0507c0205c215ef38524807d496a6

          SHA512

          d526ef03e39c9961965c0e2e811c0852a5e59a981f82bd8ad25c410ddad56680aae8ebce833340ca6c5036266cd9e349b03d793027b0c1749d3f2f21f4404002

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2869829.exe

          Filesize

          397KB

          MD5

          9b0a0a5d59c0d341a9f02954db4e9369

          SHA1

          112fe6de33dc20531146eead854e4f96e3f27912

          SHA256

          a2f2524b62e2d953eeffaa3b269d34b5bdc0507c0205c215ef38524807d496a6

          SHA512

          d526ef03e39c9961965c0e2e811c0852a5e59a981f82bd8ad25c410ddad56680aae8ebce833340ca6c5036266cd9e349b03d793027b0c1749d3f2f21f4404002

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3482203.exe

          Filesize

          841KB

          MD5

          2281a7c2af155ec1da27b3d074fcb558

          SHA1

          febfa84687c985df7bef45e31a69b0edfbeb2bbb

          SHA256

          9f8346f2e8c339dd570e821c7d0a352843854da04b8303dbd51fdbd91aa1252b

          SHA512

          9e20e30edb121abe7926a95acfc79702bcce6c009f536661dbd21887a620d9600327f4fa127658cbfe7e3f342e4564c11911782577b7854cca0f89ffd462d5ef

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3482203.exe

          Filesize

          841KB

          MD5

          2281a7c2af155ec1da27b3d074fcb558

          SHA1

          febfa84687c985df7bef45e31a69b0edfbeb2bbb

          SHA256

          9f8346f2e8c339dd570e821c7d0a352843854da04b8303dbd51fdbd91aa1252b

          SHA512

          9e20e30edb121abe7926a95acfc79702bcce6c009f536661dbd21887a620d9600327f4fa127658cbfe7e3f342e4564c11911782577b7854cca0f89ffd462d5ef

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x9604015.exe

          Filesize

          563KB

          MD5

          37d36ca7c7d887e14261c617fa477a09

          SHA1

          4fe22821665bf0a10299841ca97f30830c147364

          SHA256

          8902cd20f1ebb20642b77d2fda6fd397039c0f02489ea5bd0be3dccd29a03c54

          SHA512

          3f4113bc44dddd08325ce1ad8e6a59578888ec8fc92635bb8cdbe5def51e72f69b7c4ca34da5e55f59bf5deead88fbe5dc2c512b0a9d63543f77e631bc6ee8e0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x9604015.exe

          Filesize

          563KB

          MD5

          37d36ca7c7d887e14261c617fa477a09

          SHA1

          4fe22821665bf0a10299841ca97f30830c147364

          SHA256

          8902cd20f1ebb20642b77d2fda6fd397039c0f02489ea5bd0be3dccd29a03c54

          SHA512

          3f4113bc44dddd08325ce1ad8e6a59578888ec8fc92635bb8cdbe5def51e72f69b7c4ca34da5e55f59bf5deead88fbe5dc2c512b0a9d63543f77e631bc6ee8e0

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x2869829.exe

          Filesize

          397KB

          MD5

          9b0a0a5d59c0d341a9f02954db4e9369

          SHA1

          112fe6de33dc20531146eead854e4f96e3f27912

          SHA256

          a2f2524b62e2d953eeffaa3b269d34b5bdc0507c0205c215ef38524807d496a6

          SHA512

          d526ef03e39c9961965c0e2e811c0852a5e59a981f82bd8ad25c410ddad56680aae8ebce833340ca6c5036266cd9e349b03d793027b0c1749d3f2f21f4404002

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x2869829.exe

          Filesize

          397KB

          MD5

          9b0a0a5d59c0d341a9f02954db4e9369

          SHA1

          112fe6de33dc20531146eead854e4f96e3f27912

          SHA256

          a2f2524b62e2d953eeffaa3b269d34b5bdc0507c0205c215ef38524807d496a6

          SHA512

          d526ef03e39c9961965c0e2e811c0852a5e59a981f82bd8ad25c410ddad56680aae8ebce833340ca6c5036266cd9e349b03d793027b0c1749d3f2f21f4404002

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe

          Filesize

          379KB

          MD5

          8e363a1912d25cef180c54846648abd5

          SHA1

          c9a238ea6ca27085aabd381595aff534fa93758a

          SHA256

          9e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682

          SHA512

          ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf

        • memory/2748-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2748-48-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2748-43-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2748-50-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2748-52-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2748-54-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2748-47-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2748-46-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2748-45-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2748-44-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB