Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe
Resource
win10v2004-20230915-en
General
-
Target
0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe
-
Size
930KB
-
MD5
b5b8275871d3e90880243c2f63773b44
-
SHA1
68cee9fcc2c3fb423e76f315e6674ad78c5aa470
-
SHA256
0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa
-
SHA512
1797f3f8cf29ef8b3d6f487b5ed8895c8e6f52f40068af26b3a64655ca7abbb2210b530e0a445fa12db73b70fb3dc881d73ff75bb12baf12fa7c7a32797af565
-
SSDEEP
24576:JyGHzE2na/rmOY642zUZO1sGiNptAS3Q+oUji:8Gi/rfYYzUhGiNAQ5oUj
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 8 IoCs
resource yara_rule behavioral1/memory/2620-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2620-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2620-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2620-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2620-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2620-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2620-57-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2620-61-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2024 x8148181.exe 2216 x6430449.exe 2684 x0095840.exe 1252 g9960039.exe -
Loads dropped DLL 13 IoCs
pid Process 2380 0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe 2024 x8148181.exe 2024 x8148181.exe 2216 x6430449.exe 2216 x6430449.exe 2684 x0095840.exe 2684 x0095840.exe 2684 x0095840.exe 1252 g9960039.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6430449.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0095840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8148181.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1252 set thread context of 2620 1252 g9960039.exe 36 -
Program crash 1 IoCs
pid pid_target Process procid_target 2456 1252 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2024 2380 0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe 28 PID 2380 wrote to memory of 2024 2380 0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe 28 PID 2380 wrote to memory of 2024 2380 0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe 28 PID 2380 wrote to memory of 2024 2380 0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe 28 PID 2380 wrote to memory of 2024 2380 0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe 28 PID 2380 wrote to memory of 2024 2380 0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe 28 PID 2380 wrote to memory of 2024 2380 0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe 28 PID 2024 wrote to memory of 2216 2024 x8148181.exe 29 PID 2024 wrote to memory of 2216 2024 x8148181.exe 29 PID 2024 wrote to memory of 2216 2024 x8148181.exe 29 PID 2024 wrote to memory of 2216 2024 x8148181.exe 29 PID 2024 wrote to memory of 2216 2024 x8148181.exe 29 PID 2024 wrote to memory of 2216 2024 x8148181.exe 29 PID 2024 wrote to memory of 2216 2024 x8148181.exe 29 PID 2216 wrote to memory of 2684 2216 x6430449.exe 30 PID 2216 wrote to memory of 2684 2216 x6430449.exe 30 PID 2216 wrote to memory of 2684 2216 x6430449.exe 30 PID 2216 wrote to memory of 2684 2216 x6430449.exe 30 PID 2216 wrote to memory of 2684 2216 x6430449.exe 30 PID 2216 wrote to memory of 2684 2216 x6430449.exe 30 PID 2216 wrote to memory of 2684 2216 x6430449.exe 30 PID 2684 wrote to memory of 1252 2684 x0095840.exe 31 PID 2684 wrote to memory of 1252 2684 x0095840.exe 31 PID 2684 wrote to memory of 1252 2684 x0095840.exe 31 PID 2684 wrote to memory of 1252 2684 x0095840.exe 31 PID 2684 wrote to memory of 1252 2684 x0095840.exe 31 PID 2684 wrote to memory of 1252 2684 x0095840.exe 31 PID 2684 wrote to memory of 1252 2684 x0095840.exe 31 PID 1252 wrote to memory of 2944 1252 g9960039.exe 32 PID 1252 wrote to memory of 2944 1252 g9960039.exe 32 PID 1252 wrote to memory of 2944 1252 g9960039.exe 32 PID 1252 wrote to memory of 2944 1252 g9960039.exe 32 PID 1252 wrote to memory of 2944 1252 g9960039.exe 32 PID 1252 wrote to memory of 2944 1252 g9960039.exe 32 PID 1252 wrote to memory of 2944 1252 g9960039.exe 32 PID 1252 wrote to memory of 2688 1252 g9960039.exe 33 PID 1252 wrote to memory of 2688 1252 g9960039.exe 33 PID 1252 wrote to memory of 2688 1252 g9960039.exe 33 PID 1252 wrote to memory of 2688 1252 g9960039.exe 33 PID 1252 wrote to memory of 2688 1252 g9960039.exe 33 PID 1252 wrote to memory of 2688 1252 g9960039.exe 33 PID 1252 wrote to memory of 2688 1252 g9960039.exe 33 PID 1252 wrote to memory of 2612 1252 g9960039.exe 34 PID 1252 wrote to memory of 2612 1252 g9960039.exe 34 PID 1252 wrote to memory of 2612 1252 g9960039.exe 34 PID 1252 wrote to memory of 2612 1252 g9960039.exe 34 PID 1252 wrote to memory of 2612 1252 g9960039.exe 34 PID 1252 wrote to memory of 2612 1252 g9960039.exe 34 PID 1252 wrote to memory of 2612 1252 g9960039.exe 34 PID 1252 wrote to memory of 2488 1252 g9960039.exe 35 PID 1252 wrote to memory of 2488 1252 g9960039.exe 35 PID 1252 wrote to memory of 2488 1252 g9960039.exe 35 PID 1252 wrote to memory of 2488 1252 g9960039.exe 35 PID 1252 wrote to memory of 2488 1252 g9960039.exe 35 PID 1252 wrote to memory of 2488 1252 g9960039.exe 35 PID 1252 wrote to memory of 2488 1252 g9960039.exe 35 PID 1252 wrote to memory of 2620 1252 g9960039.exe 36 PID 1252 wrote to memory of 2620 1252 g9960039.exe 36 PID 1252 wrote to memory of 2620 1252 g9960039.exe 36 PID 1252 wrote to memory of 2620 1252 g9960039.exe 36 PID 1252 wrote to memory of 2620 1252 g9960039.exe 36 PID 1252 wrote to memory of 2620 1252 g9960039.exe 36 PID 1252 wrote to memory of 2620 1252 g9960039.exe 36 PID 1252 wrote to memory of 2620 1252 g9960039.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe"C:\Users\Admin\AppData\Local\Temp\0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8148181.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8148181.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6430449.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6430449.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0095840.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0095840.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 3046⤵
- Loads dropped DLL
- Program crash
PID:2456
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD52cee37f7b418d91fa7b5886e696508b6
SHA162967c33d35ab853fefbfda14edd2ad0de4e91b2
SHA256373bc546fe541081a6eb9b5263e6bfe4a6d17ebe2860a1647df2091be64ce04a
SHA51290958c9d356a616b0a50771ba8664d614f1a75f28cef3411ea3d78454f8363510f369ed3dda15648c10f4c913afbfd637f2635b2abcd2308d2241570d29c4ac2
-
Filesize
828KB
MD52cee37f7b418d91fa7b5886e696508b6
SHA162967c33d35ab853fefbfda14edd2ad0de4e91b2
SHA256373bc546fe541081a6eb9b5263e6bfe4a6d17ebe2860a1647df2091be64ce04a
SHA51290958c9d356a616b0a50771ba8664d614f1a75f28cef3411ea3d78454f8363510f369ed3dda15648c10f4c913afbfd637f2635b2abcd2308d2241570d29c4ac2
-
Filesize
557KB
MD5748d3a468294e61050acc81bbdf54e93
SHA1dd69ab55168fa6754580494246ad9c632eb65204
SHA2569ca4d2402efa30daed13f1b7f470c838278b3631a75fce8f8f252e177e47ecc1
SHA512ec80dccc618812ae429ecb91030c25436cc0c5f12a775688a3f63424866266e088556a392e2cdc04820795ad1e29f9d7bc3bfa4d47a98092fa0610fd634c0986
-
Filesize
557KB
MD5748d3a468294e61050acc81bbdf54e93
SHA1dd69ab55168fa6754580494246ad9c632eb65204
SHA2569ca4d2402efa30daed13f1b7f470c838278b3631a75fce8f8f252e177e47ecc1
SHA512ec80dccc618812ae429ecb91030c25436cc0c5f12a775688a3f63424866266e088556a392e2cdc04820795ad1e29f9d7bc3bfa4d47a98092fa0610fd634c0986
-
Filesize
391KB
MD54670cf09188d20f44f1e5fa0a799d629
SHA1cd4d95cb5eef8be0dd69b02eca8cb868291105b8
SHA256fbd94623bbe6094166d921a1ae453d9152ed864dd87af31d3dfc98a799d4272f
SHA5127cdcfa4c20a8db9b445ec17001377ec6fd6c294c9ac4ef1bf405eb69e3d4fa75158993fa07ea8f0924575c7caf137bc7cfe9572cba809986b9bac8a19740b2a2
-
Filesize
391KB
MD54670cf09188d20f44f1e5fa0a799d629
SHA1cd4d95cb5eef8be0dd69b02eca8cb868291105b8
SHA256fbd94623bbe6094166d921a1ae453d9152ed864dd87af31d3dfc98a799d4272f
SHA5127cdcfa4c20a8db9b445ec17001377ec6fd6c294c9ac4ef1bf405eb69e3d4fa75158993fa07ea8f0924575c7caf137bc7cfe9572cba809986b9bac8a19740b2a2
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a
-
Filesize
828KB
MD52cee37f7b418d91fa7b5886e696508b6
SHA162967c33d35ab853fefbfda14edd2ad0de4e91b2
SHA256373bc546fe541081a6eb9b5263e6bfe4a6d17ebe2860a1647df2091be64ce04a
SHA51290958c9d356a616b0a50771ba8664d614f1a75f28cef3411ea3d78454f8363510f369ed3dda15648c10f4c913afbfd637f2635b2abcd2308d2241570d29c4ac2
-
Filesize
828KB
MD52cee37f7b418d91fa7b5886e696508b6
SHA162967c33d35ab853fefbfda14edd2ad0de4e91b2
SHA256373bc546fe541081a6eb9b5263e6bfe4a6d17ebe2860a1647df2091be64ce04a
SHA51290958c9d356a616b0a50771ba8664d614f1a75f28cef3411ea3d78454f8363510f369ed3dda15648c10f4c913afbfd637f2635b2abcd2308d2241570d29c4ac2
-
Filesize
557KB
MD5748d3a468294e61050acc81bbdf54e93
SHA1dd69ab55168fa6754580494246ad9c632eb65204
SHA2569ca4d2402efa30daed13f1b7f470c838278b3631a75fce8f8f252e177e47ecc1
SHA512ec80dccc618812ae429ecb91030c25436cc0c5f12a775688a3f63424866266e088556a392e2cdc04820795ad1e29f9d7bc3bfa4d47a98092fa0610fd634c0986
-
Filesize
557KB
MD5748d3a468294e61050acc81bbdf54e93
SHA1dd69ab55168fa6754580494246ad9c632eb65204
SHA2569ca4d2402efa30daed13f1b7f470c838278b3631a75fce8f8f252e177e47ecc1
SHA512ec80dccc618812ae429ecb91030c25436cc0c5f12a775688a3f63424866266e088556a392e2cdc04820795ad1e29f9d7bc3bfa4d47a98092fa0610fd634c0986
-
Filesize
391KB
MD54670cf09188d20f44f1e5fa0a799d629
SHA1cd4d95cb5eef8be0dd69b02eca8cb868291105b8
SHA256fbd94623bbe6094166d921a1ae453d9152ed864dd87af31d3dfc98a799d4272f
SHA5127cdcfa4c20a8db9b445ec17001377ec6fd6c294c9ac4ef1bf405eb69e3d4fa75158993fa07ea8f0924575c7caf137bc7cfe9572cba809986b9bac8a19740b2a2
-
Filesize
391KB
MD54670cf09188d20f44f1e5fa0a799d629
SHA1cd4d95cb5eef8be0dd69b02eca8cb868291105b8
SHA256fbd94623bbe6094166d921a1ae453d9152ed864dd87af31d3dfc98a799d4272f
SHA5127cdcfa4c20a8db9b445ec17001377ec6fd6c294c9ac4ef1bf405eb69e3d4fa75158993fa07ea8f0924575c7caf137bc7cfe9572cba809986b9bac8a19740b2a2
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a
-
Filesize
364KB
MD56ea7375de68b14af3a1c599cb7907a6b
SHA12ce6474ad65fa64454df4863fc0e6df8eaa24b59
SHA256cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193
SHA5121a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a