Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 17:12
Static task
static1
Behavioral task
behavioral1
Sample
5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe
Resource
win10v2004-20230915-en
General
-
Target
5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe
-
Size
929KB
-
MD5
e6c8642ea0ebfcc8b17906e8ddb6c2c2
-
SHA1
48037005a876417d80b4720d4cd591ffe9d7d668
-
SHA256
5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035
-
SHA512
0c22659ab8a497a1a790efe2f33cac8939e2aee0fef4333a11ba738e215651fc5378512c2c2f1e0c4d97c5e80ad67513724fe6df51a432e6a1d133116791d33e
-
SSDEEP
24576:XyXTvxeF9TQZumaeH7jEdWN+MmiR3U8fah74v+V:iXTvxe3UX/w0Nnpy8y7A+
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2548-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2548-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2348 x8199774.exe 2712 x4305766.exe 2652 x5352366.exe 1900 g9970367.exe -
Loads dropped DLL 13 IoCs
pid Process 2928 5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe 2348 x8199774.exe 2348 x8199774.exe 2712 x4305766.exe 2712 x4305766.exe 2652 x5352366.exe 2652 x5352366.exe 2652 x5352366.exe 1900 g9970367.exe 2564 WerFault.exe 2564 WerFault.exe 2564 WerFault.exe 2564 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8199774.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4305766.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5352366.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 2548 1900 g9970367.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2564 1900 WerFault.exe 31 2528 2548 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2348 2928 5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe 28 PID 2928 wrote to memory of 2348 2928 5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe 28 PID 2928 wrote to memory of 2348 2928 5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe 28 PID 2928 wrote to memory of 2348 2928 5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe 28 PID 2928 wrote to memory of 2348 2928 5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe 28 PID 2928 wrote to memory of 2348 2928 5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe 28 PID 2928 wrote to memory of 2348 2928 5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe 28 PID 2348 wrote to memory of 2712 2348 x8199774.exe 29 PID 2348 wrote to memory of 2712 2348 x8199774.exe 29 PID 2348 wrote to memory of 2712 2348 x8199774.exe 29 PID 2348 wrote to memory of 2712 2348 x8199774.exe 29 PID 2348 wrote to memory of 2712 2348 x8199774.exe 29 PID 2348 wrote to memory of 2712 2348 x8199774.exe 29 PID 2348 wrote to memory of 2712 2348 x8199774.exe 29 PID 2712 wrote to memory of 2652 2712 x4305766.exe 30 PID 2712 wrote to memory of 2652 2712 x4305766.exe 30 PID 2712 wrote to memory of 2652 2712 x4305766.exe 30 PID 2712 wrote to memory of 2652 2712 x4305766.exe 30 PID 2712 wrote to memory of 2652 2712 x4305766.exe 30 PID 2712 wrote to memory of 2652 2712 x4305766.exe 30 PID 2712 wrote to memory of 2652 2712 x4305766.exe 30 PID 2652 wrote to memory of 1900 2652 x5352366.exe 31 PID 2652 wrote to memory of 1900 2652 x5352366.exe 31 PID 2652 wrote to memory of 1900 2652 x5352366.exe 31 PID 2652 wrote to memory of 1900 2652 x5352366.exe 31 PID 2652 wrote to memory of 1900 2652 x5352366.exe 31 PID 2652 wrote to memory of 1900 2652 x5352366.exe 31 PID 2652 wrote to memory of 1900 2652 x5352366.exe 31 PID 1900 wrote to memory of 2532 1900 g9970367.exe 32 PID 1900 wrote to memory of 2532 1900 g9970367.exe 32 PID 1900 wrote to memory of 2532 1900 g9970367.exe 32 PID 1900 wrote to memory of 2532 1900 g9970367.exe 32 PID 1900 wrote to memory of 2532 1900 g9970367.exe 32 PID 1900 wrote to memory of 2532 1900 g9970367.exe 32 PID 1900 wrote to memory of 2532 1900 g9970367.exe 32 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2548 1900 g9970367.exe 33 PID 1900 wrote to memory of 2564 1900 g9970367.exe 34 PID 1900 wrote to memory of 2564 1900 g9970367.exe 34 PID 1900 wrote to memory of 2564 1900 g9970367.exe 34 PID 1900 wrote to memory of 2564 1900 g9970367.exe 34 PID 1900 wrote to memory of 2564 1900 g9970367.exe 34 PID 1900 wrote to memory of 2564 1900 g9970367.exe 34 PID 1900 wrote to memory of 2564 1900 g9970367.exe 34 PID 2548 wrote to memory of 2528 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2528 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2528 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2528 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2528 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2528 2548 AppLaunch.exe 35 PID 2548 wrote to memory of 2528 2548 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe"C:\Users\Admin\AppData\Local\Temp\5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8199774.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8199774.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4305766.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4305766.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5352366.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5352366.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 2687⤵
- Program crash
PID:2528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:2564
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5c47edf18c64943a6ce8c7206d53231bc
SHA10d186ec4ad73c23ff44824ca514676634495b422
SHA256a1be417117cb1c0389a4cb9f380fd466f4ee6804bb8d762ab9dbffbee0ce4e30
SHA512602dec0ebaa1d3b2a5bf9b7882aa3595a60ead17c73441600ec92560b4de4bd377d3d06b6333dd9c594c01e8f14ca875eaa417a5170339b484cc30e1906d3e4f
-
Filesize
827KB
MD5c47edf18c64943a6ce8c7206d53231bc
SHA10d186ec4ad73c23ff44824ca514676634495b422
SHA256a1be417117cb1c0389a4cb9f380fd466f4ee6804bb8d762ab9dbffbee0ce4e30
SHA512602dec0ebaa1d3b2a5bf9b7882aa3595a60ead17c73441600ec92560b4de4bd377d3d06b6333dd9c594c01e8f14ca875eaa417a5170339b484cc30e1906d3e4f
-
Filesize
556KB
MD5d9790874fcdd0e8d569ac8797edf7f79
SHA1068363a2c65f6d593fae28d651e9180664489bbe
SHA2566e411f4c2bb2c7cae03aef9adc978bde38a6dd4ba404891ba8a535b9c350d24e
SHA5124f64fb7557fd63c44460b40377112417228c08c6c6390de35ad16d023d1e4b7ed2546ad081b503ac141c31e70372d392922da142439d6563e3fca33efc21503b
-
Filesize
556KB
MD5d9790874fcdd0e8d569ac8797edf7f79
SHA1068363a2c65f6d593fae28d651e9180664489bbe
SHA2566e411f4c2bb2c7cae03aef9adc978bde38a6dd4ba404891ba8a535b9c350d24e
SHA5124f64fb7557fd63c44460b40377112417228c08c6c6390de35ad16d023d1e4b7ed2546ad081b503ac141c31e70372d392922da142439d6563e3fca33efc21503b
-
Filesize
390KB
MD58048be59591c572fd47f9d0bc6d43713
SHA1c70273284c88326bd7ebbba663f6ac37c80b4e2b
SHA256680986f047c80a97731db1d9cc00f321a3f236d389b097ef74bf6b828b8389da
SHA512535dc9be9fb44eba0144972384ced172ffcdfb66d6fc0c9143e388480f4179a3c255342377f7cd6c5d763362403f09e1d0230c014354372421f99626090d37e0
-
Filesize
390KB
MD58048be59591c572fd47f9d0bc6d43713
SHA1c70273284c88326bd7ebbba663f6ac37c80b4e2b
SHA256680986f047c80a97731db1d9cc00f321a3f236d389b097ef74bf6b828b8389da
SHA512535dc9be9fb44eba0144972384ced172ffcdfb66d6fc0c9143e388480f4179a3c255342377f7cd6c5d763362403f09e1d0230c014354372421f99626090d37e0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0
-
Filesize
827KB
MD5c47edf18c64943a6ce8c7206d53231bc
SHA10d186ec4ad73c23ff44824ca514676634495b422
SHA256a1be417117cb1c0389a4cb9f380fd466f4ee6804bb8d762ab9dbffbee0ce4e30
SHA512602dec0ebaa1d3b2a5bf9b7882aa3595a60ead17c73441600ec92560b4de4bd377d3d06b6333dd9c594c01e8f14ca875eaa417a5170339b484cc30e1906d3e4f
-
Filesize
827KB
MD5c47edf18c64943a6ce8c7206d53231bc
SHA10d186ec4ad73c23ff44824ca514676634495b422
SHA256a1be417117cb1c0389a4cb9f380fd466f4ee6804bb8d762ab9dbffbee0ce4e30
SHA512602dec0ebaa1d3b2a5bf9b7882aa3595a60ead17c73441600ec92560b4de4bd377d3d06b6333dd9c594c01e8f14ca875eaa417a5170339b484cc30e1906d3e4f
-
Filesize
556KB
MD5d9790874fcdd0e8d569ac8797edf7f79
SHA1068363a2c65f6d593fae28d651e9180664489bbe
SHA2566e411f4c2bb2c7cae03aef9adc978bde38a6dd4ba404891ba8a535b9c350d24e
SHA5124f64fb7557fd63c44460b40377112417228c08c6c6390de35ad16d023d1e4b7ed2546ad081b503ac141c31e70372d392922da142439d6563e3fca33efc21503b
-
Filesize
556KB
MD5d9790874fcdd0e8d569ac8797edf7f79
SHA1068363a2c65f6d593fae28d651e9180664489bbe
SHA2566e411f4c2bb2c7cae03aef9adc978bde38a6dd4ba404891ba8a535b9c350d24e
SHA5124f64fb7557fd63c44460b40377112417228c08c6c6390de35ad16d023d1e4b7ed2546ad081b503ac141c31e70372d392922da142439d6563e3fca33efc21503b
-
Filesize
390KB
MD58048be59591c572fd47f9d0bc6d43713
SHA1c70273284c88326bd7ebbba663f6ac37c80b4e2b
SHA256680986f047c80a97731db1d9cc00f321a3f236d389b097ef74bf6b828b8389da
SHA512535dc9be9fb44eba0144972384ced172ffcdfb66d6fc0c9143e388480f4179a3c255342377f7cd6c5d763362403f09e1d0230c014354372421f99626090d37e0
-
Filesize
390KB
MD58048be59591c572fd47f9d0bc6d43713
SHA1c70273284c88326bd7ebbba663f6ac37c80b4e2b
SHA256680986f047c80a97731db1d9cc00f321a3f236d389b097ef74bf6b828b8389da
SHA512535dc9be9fb44eba0144972384ced172ffcdfb66d6fc0c9143e388480f4179a3c255342377f7cd6c5d763362403f09e1d0230c014354372421f99626090d37e0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0
-
Filesize
364KB
MD5e12bbd5ba5e1ef8386ce22c90bc00adb
SHA168c79578b2de211911b51d8963e620e29f213659
SHA256d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291
SHA5123c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0