Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 17:12

General

  • Target

    5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe

  • Size

    929KB

  • MD5

    e6c8642ea0ebfcc8b17906e8ddb6c2c2

  • SHA1

    48037005a876417d80b4720d4cd591ffe9d7d668

  • SHA256

    5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035

  • SHA512

    0c22659ab8a497a1a790efe2f33cac8939e2aee0fef4333a11ba738e215651fc5378512c2c2f1e0c4d97c5e80ad67513724fe6df51a432e6a1d133116791d33e

  • SSDEEP

    24576:XyXTvxeF9TQZumaeH7jEdWN+MmiR3U8fah74v+V:iXTvxe3UX/w0Nnpy8y7A+

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe
    "C:\Users\Admin\AppData\Local\Temp\5621453951942437c690dbde858b7b3f6758ee4c625614c64c0e1d7bd17f3035.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8199774.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8199774.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4305766.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4305766.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5352366.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5352366.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1900
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2532
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2548
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 268
                  7⤵
                  • Program crash
                  PID:2528
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 280
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8199774.exe

      Filesize

      827KB

      MD5

      c47edf18c64943a6ce8c7206d53231bc

      SHA1

      0d186ec4ad73c23ff44824ca514676634495b422

      SHA256

      a1be417117cb1c0389a4cb9f380fd466f4ee6804bb8d762ab9dbffbee0ce4e30

      SHA512

      602dec0ebaa1d3b2a5bf9b7882aa3595a60ead17c73441600ec92560b4de4bd377d3d06b6333dd9c594c01e8f14ca875eaa417a5170339b484cc30e1906d3e4f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8199774.exe

      Filesize

      827KB

      MD5

      c47edf18c64943a6ce8c7206d53231bc

      SHA1

      0d186ec4ad73c23ff44824ca514676634495b422

      SHA256

      a1be417117cb1c0389a4cb9f380fd466f4ee6804bb8d762ab9dbffbee0ce4e30

      SHA512

      602dec0ebaa1d3b2a5bf9b7882aa3595a60ead17c73441600ec92560b4de4bd377d3d06b6333dd9c594c01e8f14ca875eaa417a5170339b484cc30e1906d3e4f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4305766.exe

      Filesize

      556KB

      MD5

      d9790874fcdd0e8d569ac8797edf7f79

      SHA1

      068363a2c65f6d593fae28d651e9180664489bbe

      SHA256

      6e411f4c2bb2c7cae03aef9adc978bde38a6dd4ba404891ba8a535b9c350d24e

      SHA512

      4f64fb7557fd63c44460b40377112417228c08c6c6390de35ad16d023d1e4b7ed2546ad081b503ac141c31e70372d392922da142439d6563e3fca33efc21503b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4305766.exe

      Filesize

      556KB

      MD5

      d9790874fcdd0e8d569ac8797edf7f79

      SHA1

      068363a2c65f6d593fae28d651e9180664489bbe

      SHA256

      6e411f4c2bb2c7cae03aef9adc978bde38a6dd4ba404891ba8a535b9c350d24e

      SHA512

      4f64fb7557fd63c44460b40377112417228c08c6c6390de35ad16d023d1e4b7ed2546ad081b503ac141c31e70372d392922da142439d6563e3fca33efc21503b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5352366.exe

      Filesize

      390KB

      MD5

      8048be59591c572fd47f9d0bc6d43713

      SHA1

      c70273284c88326bd7ebbba663f6ac37c80b4e2b

      SHA256

      680986f047c80a97731db1d9cc00f321a3f236d389b097ef74bf6b828b8389da

      SHA512

      535dc9be9fb44eba0144972384ced172ffcdfb66d6fc0c9143e388480f4179a3c255342377f7cd6c5d763362403f09e1d0230c014354372421f99626090d37e0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5352366.exe

      Filesize

      390KB

      MD5

      8048be59591c572fd47f9d0bc6d43713

      SHA1

      c70273284c88326bd7ebbba663f6ac37c80b4e2b

      SHA256

      680986f047c80a97731db1d9cc00f321a3f236d389b097ef74bf6b828b8389da

      SHA512

      535dc9be9fb44eba0144972384ced172ffcdfb66d6fc0c9143e388480f4179a3c255342377f7cd6c5d763362403f09e1d0230c014354372421f99626090d37e0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8199774.exe

      Filesize

      827KB

      MD5

      c47edf18c64943a6ce8c7206d53231bc

      SHA1

      0d186ec4ad73c23ff44824ca514676634495b422

      SHA256

      a1be417117cb1c0389a4cb9f380fd466f4ee6804bb8d762ab9dbffbee0ce4e30

      SHA512

      602dec0ebaa1d3b2a5bf9b7882aa3595a60ead17c73441600ec92560b4de4bd377d3d06b6333dd9c594c01e8f14ca875eaa417a5170339b484cc30e1906d3e4f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8199774.exe

      Filesize

      827KB

      MD5

      c47edf18c64943a6ce8c7206d53231bc

      SHA1

      0d186ec4ad73c23ff44824ca514676634495b422

      SHA256

      a1be417117cb1c0389a4cb9f380fd466f4ee6804bb8d762ab9dbffbee0ce4e30

      SHA512

      602dec0ebaa1d3b2a5bf9b7882aa3595a60ead17c73441600ec92560b4de4bd377d3d06b6333dd9c594c01e8f14ca875eaa417a5170339b484cc30e1906d3e4f

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4305766.exe

      Filesize

      556KB

      MD5

      d9790874fcdd0e8d569ac8797edf7f79

      SHA1

      068363a2c65f6d593fae28d651e9180664489bbe

      SHA256

      6e411f4c2bb2c7cae03aef9adc978bde38a6dd4ba404891ba8a535b9c350d24e

      SHA512

      4f64fb7557fd63c44460b40377112417228c08c6c6390de35ad16d023d1e4b7ed2546ad081b503ac141c31e70372d392922da142439d6563e3fca33efc21503b

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4305766.exe

      Filesize

      556KB

      MD5

      d9790874fcdd0e8d569ac8797edf7f79

      SHA1

      068363a2c65f6d593fae28d651e9180664489bbe

      SHA256

      6e411f4c2bb2c7cae03aef9adc978bde38a6dd4ba404891ba8a535b9c350d24e

      SHA512

      4f64fb7557fd63c44460b40377112417228c08c6c6390de35ad16d023d1e4b7ed2546ad081b503ac141c31e70372d392922da142439d6563e3fca33efc21503b

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5352366.exe

      Filesize

      390KB

      MD5

      8048be59591c572fd47f9d0bc6d43713

      SHA1

      c70273284c88326bd7ebbba663f6ac37c80b4e2b

      SHA256

      680986f047c80a97731db1d9cc00f321a3f236d389b097ef74bf6b828b8389da

      SHA512

      535dc9be9fb44eba0144972384ced172ffcdfb66d6fc0c9143e388480f4179a3c255342377f7cd6c5d763362403f09e1d0230c014354372421f99626090d37e0

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5352366.exe

      Filesize

      390KB

      MD5

      8048be59591c572fd47f9d0bc6d43713

      SHA1

      c70273284c88326bd7ebbba663f6ac37c80b4e2b

      SHA256

      680986f047c80a97731db1d9cc00f321a3f236d389b097ef74bf6b828b8389da

      SHA512

      535dc9be9fb44eba0144972384ced172ffcdfb66d6fc0c9143e388480f4179a3c255342377f7cd6c5d763362403f09e1d0230c014354372421f99626090d37e0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9970367.exe

      Filesize

      364KB

      MD5

      e12bbd5ba5e1ef8386ce22c90bc00adb

      SHA1

      68c79578b2de211911b51d8963e620e29f213659

      SHA256

      d57c3f7c61c9fd2cc51bb975f7bc28fd8e7269ad626ea3b55df3f6c2f6a4c291

      SHA512

      3c7858a05a0b239e3598dc4597d3402be110031945cddb891eeb87fc708d90c3db195e31863f06ec88d8cbf66595b3fa85567b7b3271f8380cd6a73d28e308b0

    • memory/2548-47-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2548-48-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2548-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2548-50-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2548-52-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2548-54-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2548-46-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2548-45-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2548-44-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2548-43-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB