Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe
Resource
win10v2004-20230915-en
General
-
Target
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe
-
Size
943KB
-
MD5
e31ab4c222f7e2c4b70cd9a9f34b2ed9
-
SHA1
bc01a00bcced4f40decd3ce0952fc7da2dc47c15
-
SHA256
55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733
-
SHA512
b5038fa5756f9f5320d1bd9fbb629a79a42c2dc2e69d36a5d1fefab20c6779ab0599d3a29fb8d24647041c05b348ecd55ea5b87b55a4f63d19251ca74912a017
-
SSDEEP
24576:syRS1fhUx+W5y4tGccJHohthBM+D9jTQ:b+adGDythBM+Dx
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2748-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2748-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2748-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2748-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2748-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2748-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2120 x3482203.exe 2608 x9604015.exe 2632 x2869829.exe 2812 g7760994.exe -
Loads dropped DLL 13 IoCs
pid Process 2080 55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe 2120 x3482203.exe 2120 x3482203.exe 2608 x9604015.exe 2608 x9604015.exe 2632 x2869829.exe 2632 x2869829.exe 2632 x2869829.exe 2812 g7760994.exe 2448 WerFault.exe 2448 WerFault.exe 2448 WerFault.exe 2448 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3482203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9604015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2869829.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2812 set thread context of 2748 2812 g7760994.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2528 2748 WerFault.exe 32 2448 2812 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2120 2080 55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe 28 PID 2080 wrote to memory of 2120 2080 55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe 28 PID 2080 wrote to memory of 2120 2080 55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe 28 PID 2080 wrote to memory of 2120 2080 55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe 28 PID 2080 wrote to memory of 2120 2080 55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe 28 PID 2080 wrote to memory of 2120 2080 55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe 28 PID 2080 wrote to memory of 2120 2080 55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe 28 PID 2120 wrote to memory of 2608 2120 x3482203.exe 29 PID 2120 wrote to memory of 2608 2120 x3482203.exe 29 PID 2120 wrote to memory of 2608 2120 x3482203.exe 29 PID 2120 wrote to memory of 2608 2120 x3482203.exe 29 PID 2120 wrote to memory of 2608 2120 x3482203.exe 29 PID 2120 wrote to memory of 2608 2120 x3482203.exe 29 PID 2120 wrote to memory of 2608 2120 x3482203.exe 29 PID 2608 wrote to memory of 2632 2608 x9604015.exe 30 PID 2608 wrote to memory of 2632 2608 x9604015.exe 30 PID 2608 wrote to memory of 2632 2608 x9604015.exe 30 PID 2608 wrote to memory of 2632 2608 x9604015.exe 30 PID 2608 wrote to memory of 2632 2608 x9604015.exe 30 PID 2608 wrote to memory of 2632 2608 x9604015.exe 30 PID 2608 wrote to memory of 2632 2608 x9604015.exe 30 PID 2632 wrote to memory of 2812 2632 x2869829.exe 31 PID 2632 wrote to memory of 2812 2632 x2869829.exe 31 PID 2632 wrote to memory of 2812 2632 x2869829.exe 31 PID 2632 wrote to memory of 2812 2632 x2869829.exe 31 PID 2632 wrote to memory of 2812 2632 x2869829.exe 31 PID 2632 wrote to memory of 2812 2632 x2869829.exe 31 PID 2632 wrote to memory of 2812 2632 x2869829.exe 31 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2748 2812 g7760994.exe 32 PID 2812 wrote to memory of 2448 2812 g7760994.exe 34 PID 2812 wrote to memory of 2448 2812 g7760994.exe 34 PID 2812 wrote to memory of 2448 2812 g7760994.exe 34 PID 2812 wrote to memory of 2448 2812 g7760994.exe 34 PID 2812 wrote to memory of 2448 2812 g7760994.exe 34 PID 2812 wrote to memory of 2448 2812 g7760994.exe 34 PID 2812 wrote to memory of 2448 2812 g7760994.exe 34 PID 2748 wrote to memory of 2528 2748 AppLaunch.exe 33 PID 2748 wrote to memory of 2528 2748 AppLaunch.exe 33 PID 2748 wrote to memory of 2528 2748 AppLaunch.exe 33 PID 2748 wrote to memory of 2528 2748 AppLaunch.exe 33 PID 2748 wrote to memory of 2528 2748 AppLaunch.exe 33 PID 2748 wrote to memory of 2528 2748 AppLaunch.exe 33 PID 2748 wrote to memory of 2528 2748 AppLaunch.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe"C:\Users\Admin\AppData\Local\Temp\55a160f1c9f2e195ab3eb9aa9612ccb61d4217161db578aaf05071be4041e733.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3482203.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3482203.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9604015.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9604015.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2869829.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2869829.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7760994.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 2687⤵
- Program crash
PID:2528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2448
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841KB
MD52281a7c2af155ec1da27b3d074fcb558
SHA1febfa84687c985df7bef45e31a69b0edfbeb2bbb
SHA2569f8346f2e8c339dd570e821c7d0a352843854da04b8303dbd51fdbd91aa1252b
SHA5129e20e30edb121abe7926a95acfc79702bcce6c009f536661dbd21887a620d9600327f4fa127658cbfe7e3f342e4564c11911782577b7854cca0f89ffd462d5ef
-
Filesize
841KB
MD52281a7c2af155ec1da27b3d074fcb558
SHA1febfa84687c985df7bef45e31a69b0edfbeb2bbb
SHA2569f8346f2e8c339dd570e821c7d0a352843854da04b8303dbd51fdbd91aa1252b
SHA5129e20e30edb121abe7926a95acfc79702bcce6c009f536661dbd21887a620d9600327f4fa127658cbfe7e3f342e4564c11911782577b7854cca0f89ffd462d5ef
-
Filesize
563KB
MD537d36ca7c7d887e14261c617fa477a09
SHA14fe22821665bf0a10299841ca97f30830c147364
SHA2568902cd20f1ebb20642b77d2fda6fd397039c0f02489ea5bd0be3dccd29a03c54
SHA5123f4113bc44dddd08325ce1ad8e6a59578888ec8fc92635bb8cdbe5def51e72f69b7c4ca34da5e55f59bf5deead88fbe5dc2c512b0a9d63543f77e631bc6ee8e0
-
Filesize
563KB
MD537d36ca7c7d887e14261c617fa477a09
SHA14fe22821665bf0a10299841ca97f30830c147364
SHA2568902cd20f1ebb20642b77d2fda6fd397039c0f02489ea5bd0be3dccd29a03c54
SHA5123f4113bc44dddd08325ce1ad8e6a59578888ec8fc92635bb8cdbe5def51e72f69b7c4ca34da5e55f59bf5deead88fbe5dc2c512b0a9d63543f77e631bc6ee8e0
-
Filesize
397KB
MD59b0a0a5d59c0d341a9f02954db4e9369
SHA1112fe6de33dc20531146eead854e4f96e3f27912
SHA256a2f2524b62e2d953eeffaa3b269d34b5bdc0507c0205c215ef38524807d496a6
SHA512d526ef03e39c9961965c0e2e811c0852a5e59a981f82bd8ad25c410ddad56680aae8ebce833340ca6c5036266cd9e349b03d793027b0c1749d3f2f21f4404002
-
Filesize
397KB
MD59b0a0a5d59c0d341a9f02954db4e9369
SHA1112fe6de33dc20531146eead854e4f96e3f27912
SHA256a2f2524b62e2d953eeffaa3b269d34b5bdc0507c0205c215ef38524807d496a6
SHA512d526ef03e39c9961965c0e2e811c0852a5e59a981f82bd8ad25c410ddad56680aae8ebce833340ca6c5036266cd9e349b03d793027b0c1749d3f2f21f4404002
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf
-
Filesize
841KB
MD52281a7c2af155ec1da27b3d074fcb558
SHA1febfa84687c985df7bef45e31a69b0edfbeb2bbb
SHA2569f8346f2e8c339dd570e821c7d0a352843854da04b8303dbd51fdbd91aa1252b
SHA5129e20e30edb121abe7926a95acfc79702bcce6c009f536661dbd21887a620d9600327f4fa127658cbfe7e3f342e4564c11911782577b7854cca0f89ffd462d5ef
-
Filesize
841KB
MD52281a7c2af155ec1da27b3d074fcb558
SHA1febfa84687c985df7bef45e31a69b0edfbeb2bbb
SHA2569f8346f2e8c339dd570e821c7d0a352843854da04b8303dbd51fdbd91aa1252b
SHA5129e20e30edb121abe7926a95acfc79702bcce6c009f536661dbd21887a620d9600327f4fa127658cbfe7e3f342e4564c11911782577b7854cca0f89ffd462d5ef
-
Filesize
563KB
MD537d36ca7c7d887e14261c617fa477a09
SHA14fe22821665bf0a10299841ca97f30830c147364
SHA2568902cd20f1ebb20642b77d2fda6fd397039c0f02489ea5bd0be3dccd29a03c54
SHA5123f4113bc44dddd08325ce1ad8e6a59578888ec8fc92635bb8cdbe5def51e72f69b7c4ca34da5e55f59bf5deead88fbe5dc2c512b0a9d63543f77e631bc6ee8e0
-
Filesize
563KB
MD537d36ca7c7d887e14261c617fa477a09
SHA14fe22821665bf0a10299841ca97f30830c147364
SHA2568902cd20f1ebb20642b77d2fda6fd397039c0f02489ea5bd0be3dccd29a03c54
SHA5123f4113bc44dddd08325ce1ad8e6a59578888ec8fc92635bb8cdbe5def51e72f69b7c4ca34da5e55f59bf5deead88fbe5dc2c512b0a9d63543f77e631bc6ee8e0
-
Filesize
397KB
MD59b0a0a5d59c0d341a9f02954db4e9369
SHA1112fe6de33dc20531146eead854e4f96e3f27912
SHA256a2f2524b62e2d953eeffaa3b269d34b5bdc0507c0205c215ef38524807d496a6
SHA512d526ef03e39c9961965c0e2e811c0852a5e59a981f82bd8ad25c410ddad56680aae8ebce833340ca6c5036266cd9e349b03d793027b0c1749d3f2f21f4404002
-
Filesize
397KB
MD59b0a0a5d59c0d341a9f02954db4e9369
SHA1112fe6de33dc20531146eead854e4f96e3f27912
SHA256a2f2524b62e2d953eeffaa3b269d34b5bdc0507c0205c215ef38524807d496a6
SHA512d526ef03e39c9961965c0e2e811c0852a5e59a981f82bd8ad25c410ddad56680aae8ebce833340ca6c5036266cd9e349b03d793027b0c1749d3f2f21f4404002
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf
-
Filesize
379KB
MD58e363a1912d25cef180c54846648abd5
SHA1c9a238ea6ca27085aabd381595aff534fa93758a
SHA2569e00622d8ed5819bb618d170eee6590b82cea38b3f1cde0bc405298349029682
SHA512ba3d0c89b2575a7293e7b75e0d47959e0bda0b3beed1131fd426606057e398125e8b390ca013a7530ff133970a684b7b4d5d62a94737b19e06b1edc4efa4cedf