Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
x0915341.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x0915341.exe
Resource
win10v2004-20230915-en
General
-
Target
x0915341.exe
-
Size
390KB
-
MD5
f5392a029dcc2a47d9fb5d9afe22d331
-
SHA1
6f7d07aaea42087afa71597e9ac041ee29a23bd0
-
SHA256
7ad545bb4737b69c23cdad695529678edf0857220df5c0cf5ffeb6976f09d06e
-
SHA512
7a510e5a2dbe10b448109405da21bc242e714ac41d56f02f10730b5c98e75f317793a5cdc7366e008ceee466e64ecd2541714cdf0cd137023acc6e6bc935e896
-
SSDEEP
12288:JMrcy90SNC9LtC9CMwrxUIAiEZZgJ3Bjzv:dyTNC9LMLwrx1Oizv
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2624-16-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2624-17-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2624-18-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2624-20-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2624-22-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2624-24-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 1 IoCs
pid Process 2852 g0620430.exe -
Loads dropped DLL 7 IoCs
pid Process 2584 x0915341.exe 2584 x0915341.exe 2852 g0620430.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe 2764 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x0915341.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2852 set thread context of 2624 2852 g0620430.exe 30 -
Program crash 2 IoCs
pid pid_target Process procid_target 2764 2852 WerFault.exe 28 2640 2624 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2852 2584 x0915341.exe 28 PID 2584 wrote to memory of 2852 2584 x0915341.exe 28 PID 2584 wrote to memory of 2852 2584 x0915341.exe 28 PID 2584 wrote to memory of 2852 2584 x0915341.exe 28 PID 2584 wrote to memory of 2852 2584 x0915341.exe 28 PID 2584 wrote to memory of 2852 2584 x0915341.exe 28 PID 2584 wrote to memory of 2852 2584 x0915341.exe 28 PID 2852 wrote to memory of 2092 2852 g0620430.exe 29 PID 2852 wrote to memory of 2092 2852 g0620430.exe 29 PID 2852 wrote to memory of 2092 2852 g0620430.exe 29 PID 2852 wrote to memory of 2092 2852 g0620430.exe 29 PID 2852 wrote to memory of 2092 2852 g0620430.exe 29 PID 2852 wrote to memory of 2092 2852 g0620430.exe 29 PID 2852 wrote to memory of 2092 2852 g0620430.exe 29 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2624 2852 g0620430.exe 30 PID 2852 wrote to memory of 2764 2852 g0620430.exe 31 PID 2852 wrote to memory of 2764 2852 g0620430.exe 31 PID 2852 wrote to memory of 2764 2852 g0620430.exe 31 PID 2852 wrote to memory of 2764 2852 g0620430.exe 31 PID 2852 wrote to memory of 2764 2852 g0620430.exe 31 PID 2852 wrote to memory of 2764 2852 g0620430.exe 31 PID 2852 wrote to memory of 2764 2852 g0620430.exe 31 PID 2624 wrote to memory of 2640 2624 AppLaunch.exe 32 PID 2624 wrote to memory of 2640 2624 AppLaunch.exe 32 PID 2624 wrote to memory of 2640 2624 AppLaunch.exe 32 PID 2624 wrote to memory of 2640 2624 AppLaunch.exe 32 PID 2624 wrote to memory of 2640 2624 AppLaunch.exe 32 PID 2624 wrote to memory of 2640 2624 AppLaunch.exe 32 PID 2624 wrote to memory of 2640 2624 AppLaunch.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\x0915341.exe"C:\Users\Admin\AppData\Local\Temp\x0915341.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g0620430.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g0620430.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 2684⤵
- Program crash
PID:2640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476
-
Filesize
364KB
MD5798dea0595c38bbe253a92b81c1ee0e6
SHA1158bca51c0ff64df2302f27350d94f8dab4965d3
SHA2567fabc67597112bb09851de313464014d2cd6edf3594cc77e70775f308609821d
SHA512f78b4d493a67012ede00127b23eb1919a5db90c6f83f2e93275952f003e7f2fe6d16c9d905e952a8f11c67fd72f50456246deb829e7b93c29191af19e48ea476