Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 14:56
Static task
static1
Behavioral task
behavioral1
Sample
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe
Resource
win10v2004-20230915-en
General
-
Target
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe
-
Size
929KB
-
MD5
299cd7a2e02c1750355def68009a316e
-
SHA1
1940e007e036b2491e3167792dd13adb74dd231c
-
SHA256
14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d
-
SHA512
0182a16b0990007d380e7a6d02390d27c094e4801f5607053597ed8f6c8afab9aa95373e041c47b7d22d588d0528d42e62ed75922bd3f524ae72938fc7412e04
-
SSDEEP
24576:pyN6kW2AV6b/11GMCW29D6SKE/yWah3n4:cXWBO/vCWCeRJ
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/1952-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1952-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1952-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1952-53-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1952-55-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/1952-57-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2188 x7746723.exe 2796 x1697115.exe 2660 x9833609.exe 2724 g1472671.exe -
Loads dropped DLL 13 IoCs
pid Process 3056 14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe 2188 x7746723.exe 2188 x7746723.exe 2796 x1697115.exe 2796 x1697115.exe 2660 x9833609.exe 2660 x9833609.exe 2660 x9833609.exe 2724 g1472671.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9833609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7746723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1697115.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2724 set thread context of 1952 2724 g1472671.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2540 2724 WerFault.exe 31 2592 1952 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2188 3056 14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe 28 PID 3056 wrote to memory of 2188 3056 14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe 28 PID 3056 wrote to memory of 2188 3056 14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe 28 PID 3056 wrote to memory of 2188 3056 14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe 28 PID 3056 wrote to memory of 2188 3056 14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe 28 PID 3056 wrote to memory of 2188 3056 14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe 28 PID 3056 wrote to memory of 2188 3056 14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe 28 PID 2188 wrote to memory of 2796 2188 x7746723.exe 29 PID 2188 wrote to memory of 2796 2188 x7746723.exe 29 PID 2188 wrote to memory of 2796 2188 x7746723.exe 29 PID 2188 wrote to memory of 2796 2188 x7746723.exe 29 PID 2188 wrote to memory of 2796 2188 x7746723.exe 29 PID 2188 wrote to memory of 2796 2188 x7746723.exe 29 PID 2188 wrote to memory of 2796 2188 x7746723.exe 29 PID 2796 wrote to memory of 2660 2796 x1697115.exe 30 PID 2796 wrote to memory of 2660 2796 x1697115.exe 30 PID 2796 wrote to memory of 2660 2796 x1697115.exe 30 PID 2796 wrote to memory of 2660 2796 x1697115.exe 30 PID 2796 wrote to memory of 2660 2796 x1697115.exe 30 PID 2796 wrote to memory of 2660 2796 x1697115.exe 30 PID 2796 wrote to memory of 2660 2796 x1697115.exe 30 PID 2660 wrote to memory of 2724 2660 x9833609.exe 31 PID 2660 wrote to memory of 2724 2660 x9833609.exe 31 PID 2660 wrote to memory of 2724 2660 x9833609.exe 31 PID 2660 wrote to memory of 2724 2660 x9833609.exe 31 PID 2660 wrote to memory of 2724 2660 x9833609.exe 31 PID 2660 wrote to memory of 2724 2660 x9833609.exe 31 PID 2660 wrote to memory of 2724 2660 x9833609.exe 31 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 2724 wrote to memory of 1952 2724 g1472671.exe 32 PID 1952 wrote to memory of 2592 1952 AppLaunch.exe 34 PID 1952 wrote to memory of 2592 1952 AppLaunch.exe 34 PID 1952 wrote to memory of 2592 1952 AppLaunch.exe 34 PID 1952 wrote to memory of 2592 1952 AppLaunch.exe 34 PID 1952 wrote to memory of 2592 1952 AppLaunch.exe 34 PID 1952 wrote to memory of 2592 1952 AppLaunch.exe 34 PID 1952 wrote to memory of 2592 1952 AppLaunch.exe 34 PID 2724 wrote to memory of 2540 2724 g1472671.exe 33 PID 2724 wrote to memory of 2540 2724 g1472671.exe 33 PID 2724 wrote to memory of 2540 2724 g1472671.exe 33 PID 2724 wrote to memory of 2540 2724 g1472671.exe 33 PID 2724 wrote to memory of 2540 2724 g1472671.exe 33 PID 2724 wrote to memory of 2540 2724 g1472671.exe 33 PID 2724 wrote to memory of 2540 2724 g1472671.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe"C:\Users\Admin\AppData\Local\Temp\14d695c1ec9a73ee2293603902be95508f6378f78737a51ce70901b602a1c85d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7746723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7746723.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1697115.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1697115.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9833609.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9833609.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1472671.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1472671.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 2687⤵
- Program crash
PID:2592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2540
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5c3fdb3b40ca2d65e2e4af55bce498de2
SHA19d151d7809273f241835d541a2a2977861196137
SHA2567b452398ec5d8d7b96497e8825b207f55d5e5b710120508325773a27cb162e4a
SHA5127155d7a6e58a8b574cd964261477eb3e936939e3837356e7efe594f84ab2802a7569c19c9daf265afd72080c7524388ca80c448da07439ef811386c7a69513ff
-
Filesize
827KB
MD5c3fdb3b40ca2d65e2e4af55bce498de2
SHA19d151d7809273f241835d541a2a2977861196137
SHA2567b452398ec5d8d7b96497e8825b207f55d5e5b710120508325773a27cb162e4a
SHA5127155d7a6e58a8b574cd964261477eb3e936939e3837356e7efe594f84ab2802a7569c19c9daf265afd72080c7524388ca80c448da07439ef811386c7a69513ff
-
Filesize
556KB
MD5c33744d8cad19bfd740ce6cabcb9f1ac
SHA13675b10687c7ddd481a0d0fc1d39366a5fe4be3e
SHA256bee2bb9ebd6874d9ff991a9ca87a1d4aea05fe048f1fb267b14e598183654175
SHA512c9024a67cf9a071ea1143adf84951c4f07579bb8fd027020656e1de9212a616e758ee3eeb256b9fc88fb625cb700e3e20e229710c7ab8005b09c8ec66150a9e2
-
Filesize
556KB
MD5c33744d8cad19bfd740ce6cabcb9f1ac
SHA13675b10687c7ddd481a0d0fc1d39366a5fe4be3e
SHA256bee2bb9ebd6874d9ff991a9ca87a1d4aea05fe048f1fb267b14e598183654175
SHA512c9024a67cf9a071ea1143adf84951c4f07579bb8fd027020656e1de9212a616e758ee3eeb256b9fc88fb625cb700e3e20e229710c7ab8005b09c8ec66150a9e2
-
Filesize
390KB
MD5933339ff4765f9e3630baed076868467
SHA1c6b708b7f9f98278d87a1c6ec87921ddb4c217b7
SHA256105a2d1aff2df1fc57b8f8856fe1510ae920588d178186337b16145fcf7ba003
SHA5123eaae45c982559afbdc331a5556f9848377523e98d46ea9b0c29762496ffb0f560132312b7e62a4664835b53e11a09212bf1b9018259f8f19a89c1d43ad0fb29
-
Filesize
390KB
MD5933339ff4765f9e3630baed076868467
SHA1c6b708b7f9f98278d87a1c6ec87921ddb4c217b7
SHA256105a2d1aff2df1fc57b8f8856fe1510ae920588d178186337b16145fcf7ba003
SHA5123eaae45c982559afbdc331a5556f9848377523e98d46ea9b0c29762496ffb0f560132312b7e62a4664835b53e11a09212bf1b9018259f8f19a89c1d43ad0fb29
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992
-
Filesize
827KB
MD5c3fdb3b40ca2d65e2e4af55bce498de2
SHA19d151d7809273f241835d541a2a2977861196137
SHA2567b452398ec5d8d7b96497e8825b207f55d5e5b710120508325773a27cb162e4a
SHA5127155d7a6e58a8b574cd964261477eb3e936939e3837356e7efe594f84ab2802a7569c19c9daf265afd72080c7524388ca80c448da07439ef811386c7a69513ff
-
Filesize
827KB
MD5c3fdb3b40ca2d65e2e4af55bce498de2
SHA19d151d7809273f241835d541a2a2977861196137
SHA2567b452398ec5d8d7b96497e8825b207f55d5e5b710120508325773a27cb162e4a
SHA5127155d7a6e58a8b574cd964261477eb3e936939e3837356e7efe594f84ab2802a7569c19c9daf265afd72080c7524388ca80c448da07439ef811386c7a69513ff
-
Filesize
556KB
MD5c33744d8cad19bfd740ce6cabcb9f1ac
SHA13675b10687c7ddd481a0d0fc1d39366a5fe4be3e
SHA256bee2bb9ebd6874d9ff991a9ca87a1d4aea05fe048f1fb267b14e598183654175
SHA512c9024a67cf9a071ea1143adf84951c4f07579bb8fd027020656e1de9212a616e758ee3eeb256b9fc88fb625cb700e3e20e229710c7ab8005b09c8ec66150a9e2
-
Filesize
556KB
MD5c33744d8cad19bfd740ce6cabcb9f1ac
SHA13675b10687c7ddd481a0d0fc1d39366a5fe4be3e
SHA256bee2bb9ebd6874d9ff991a9ca87a1d4aea05fe048f1fb267b14e598183654175
SHA512c9024a67cf9a071ea1143adf84951c4f07579bb8fd027020656e1de9212a616e758ee3eeb256b9fc88fb625cb700e3e20e229710c7ab8005b09c8ec66150a9e2
-
Filesize
390KB
MD5933339ff4765f9e3630baed076868467
SHA1c6b708b7f9f98278d87a1c6ec87921ddb4c217b7
SHA256105a2d1aff2df1fc57b8f8856fe1510ae920588d178186337b16145fcf7ba003
SHA5123eaae45c982559afbdc331a5556f9848377523e98d46ea9b0c29762496ffb0f560132312b7e62a4664835b53e11a09212bf1b9018259f8f19a89c1d43ad0fb29
-
Filesize
390KB
MD5933339ff4765f9e3630baed076868467
SHA1c6b708b7f9f98278d87a1c6ec87921ddb4c217b7
SHA256105a2d1aff2df1fc57b8f8856fe1510ae920588d178186337b16145fcf7ba003
SHA5123eaae45c982559afbdc331a5556f9848377523e98d46ea9b0c29762496ffb0f560132312b7e62a4664835b53e11a09212bf1b9018259f8f19a89c1d43ad0fb29
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992
-
Filesize
364KB
MD54e1c7fbe3241183f21f6c7a072c0e6f2
SHA194c6fef9d18edee7ac9a5f7e34426a19b6ac66ac
SHA2564ae13bd7742258b4d5a7c0b584ffa5528fb716c39effb970872a7d7206059ae7
SHA51219af1f44c93dd6f93ae8de060b4bde3e3ca4d009249d1f52908673161fa53ccc1c30d5fdf50e41b7b296b384310f75d075fe11b966f3e932a1b4745a424f8992