Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe
Resource
win10v2004-20230915-en
General
-
Target
6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe
-
Size
928KB
-
MD5
67f1ace4e9ee8bc91558eaec87a77636
-
SHA1
ec1941040cfc9c6369b5187ebd1e970bd6131e88
-
SHA256
6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e
-
SHA512
4ddef8d3409c97ce40fb13ae5b8e27166e833656ad4b5754ebb079917de7e37fe02eda832ca1241a7fec24148600965ff8f1f067e45bd5f2273b9c7da74287a9
-
SSDEEP
12288:AMrUy90nRBeXIYBP8Q0bOimBo7kPlcrCdPw8KBaNa81VpfyaSpXg8ejjVbdY43GG:EyvrBcbMS7drhBaNasKacIWgr
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 8 IoCs
resource yara_rule behavioral1/memory/2728-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-51-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-53-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-58-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-60-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-61-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2728-66-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2932 x0243303.exe 2992 x5047351.exe 2640 x9022496.exe 2768 g1862720.exe -
Loads dropped DLL 13 IoCs
pid Process 1752 6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe 2932 x0243303.exe 2932 x0243303.exe 2992 x5047351.exe 2992 x5047351.exe 2640 x9022496.exe 2640 x9022496.exe 2640 x9022496.exe 2768 g1862720.exe 2600 WerFault.exe 2600 WerFault.exe 2600 WerFault.exe 2600 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0243303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5047351.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9022496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2768 set thread context of 2728 2768 g1862720.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2600 2768 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2932 1752 6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe 28 PID 1752 wrote to memory of 2932 1752 6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe 28 PID 1752 wrote to memory of 2932 1752 6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe 28 PID 1752 wrote to memory of 2932 1752 6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe 28 PID 1752 wrote to memory of 2932 1752 6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe 28 PID 1752 wrote to memory of 2932 1752 6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe 28 PID 1752 wrote to memory of 2932 1752 6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe 28 PID 2932 wrote to memory of 2992 2932 x0243303.exe 29 PID 2932 wrote to memory of 2992 2932 x0243303.exe 29 PID 2932 wrote to memory of 2992 2932 x0243303.exe 29 PID 2932 wrote to memory of 2992 2932 x0243303.exe 29 PID 2932 wrote to memory of 2992 2932 x0243303.exe 29 PID 2932 wrote to memory of 2992 2932 x0243303.exe 29 PID 2932 wrote to memory of 2992 2932 x0243303.exe 29 PID 2992 wrote to memory of 2640 2992 x5047351.exe 30 PID 2992 wrote to memory of 2640 2992 x5047351.exe 30 PID 2992 wrote to memory of 2640 2992 x5047351.exe 30 PID 2992 wrote to memory of 2640 2992 x5047351.exe 30 PID 2992 wrote to memory of 2640 2992 x5047351.exe 30 PID 2992 wrote to memory of 2640 2992 x5047351.exe 30 PID 2992 wrote to memory of 2640 2992 x5047351.exe 30 PID 2640 wrote to memory of 2768 2640 x9022496.exe 31 PID 2640 wrote to memory of 2768 2640 x9022496.exe 31 PID 2640 wrote to memory of 2768 2640 x9022496.exe 31 PID 2640 wrote to memory of 2768 2640 x9022496.exe 31 PID 2640 wrote to memory of 2768 2640 x9022496.exe 31 PID 2640 wrote to memory of 2768 2640 x9022496.exe 31 PID 2640 wrote to memory of 2768 2640 x9022496.exe 31 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2728 2768 g1862720.exe 32 PID 2768 wrote to memory of 2600 2768 g1862720.exe 33 PID 2768 wrote to memory of 2600 2768 g1862720.exe 33 PID 2768 wrote to memory of 2600 2768 g1862720.exe 33 PID 2768 wrote to memory of 2600 2768 g1862720.exe 33 PID 2768 wrote to memory of 2600 2768 g1862720.exe 33 PID 2768 wrote to memory of 2600 2768 g1862720.exe 33 PID 2768 wrote to memory of 2600 2768 g1862720.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe"C:\Users\Admin\AppData\Local\Temp\6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0243303.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0243303.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5047351.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5047351.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9022496.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9022496.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2600
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5bce02ec329069fb565b97bc03e8d3cbd
SHA18bb2a838e5d1bd7ec476307da3651694849029b3
SHA25676663eb4338197b88ff34f14e3339bb0a66b120bc598384c18b74e9db71d558d
SHA512bae4e099a8d5767fcb1f0d6e5a7cf23e61bbbb91177fb9576db37a10a2c2708d1533fa0e8cf32584069dabae88a992faf415f6b716cdef5b9dee515b5ad6f49b
-
Filesize
827KB
MD5bce02ec329069fb565b97bc03e8d3cbd
SHA18bb2a838e5d1bd7ec476307da3651694849029b3
SHA25676663eb4338197b88ff34f14e3339bb0a66b120bc598384c18b74e9db71d558d
SHA512bae4e099a8d5767fcb1f0d6e5a7cf23e61bbbb91177fb9576db37a10a2c2708d1533fa0e8cf32584069dabae88a992faf415f6b716cdef5b9dee515b5ad6f49b
-
Filesize
556KB
MD58de840ce62b7fcecbe5028105d9c0727
SHA10d5bc59c3cbf4675c83477fa7b44c878ed894ebb
SHA2560d1633d6e884ff20f487ce20a49a1eacdc85e394487da2708728a9c3c73b15af
SHA512924d11f3d9a26f9f3928369745584cb38b2c480cb592795c50c4e73b4f85639fb52532a87cfee53715b4095521d7625fc5b7643c970afde0dd61359cb77a31a0
-
Filesize
556KB
MD58de840ce62b7fcecbe5028105d9c0727
SHA10d5bc59c3cbf4675c83477fa7b44c878ed894ebb
SHA2560d1633d6e884ff20f487ce20a49a1eacdc85e394487da2708728a9c3c73b15af
SHA512924d11f3d9a26f9f3928369745584cb38b2c480cb592795c50c4e73b4f85639fb52532a87cfee53715b4095521d7625fc5b7643c970afde0dd61359cb77a31a0
-
Filesize
390KB
MD5849234cb5df1b282d4c52bc12fedcbce
SHA1ad767c5587699eae9460afd45abc4aca365a4093
SHA2562dc02641bc82d2f8e637bd698a69d86ee86ed120fb128e1791e42bda8059b0bb
SHA5128656781911354e6f3121f61442da803eaaf812977686ae205c8dbf2d21710f8282d78ff3f4f5839dca020c0f1116963daf83de37dad0cae6fce6f41b3b248396
-
Filesize
390KB
MD5849234cb5df1b282d4c52bc12fedcbce
SHA1ad767c5587699eae9460afd45abc4aca365a4093
SHA2562dc02641bc82d2f8e637bd698a69d86ee86ed120fb128e1791e42bda8059b0bb
SHA5128656781911354e6f3121f61442da803eaaf812977686ae205c8dbf2d21710f8282d78ff3f4f5839dca020c0f1116963daf83de37dad0cae6fce6f41b3b248396
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f
-
Filesize
827KB
MD5bce02ec329069fb565b97bc03e8d3cbd
SHA18bb2a838e5d1bd7ec476307da3651694849029b3
SHA25676663eb4338197b88ff34f14e3339bb0a66b120bc598384c18b74e9db71d558d
SHA512bae4e099a8d5767fcb1f0d6e5a7cf23e61bbbb91177fb9576db37a10a2c2708d1533fa0e8cf32584069dabae88a992faf415f6b716cdef5b9dee515b5ad6f49b
-
Filesize
827KB
MD5bce02ec329069fb565b97bc03e8d3cbd
SHA18bb2a838e5d1bd7ec476307da3651694849029b3
SHA25676663eb4338197b88ff34f14e3339bb0a66b120bc598384c18b74e9db71d558d
SHA512bae4e099a8d5767fcb1f0d6e5a7cf23e61bbbb91177fb9576db37a10a2c2708d1533fa0e8cf32584069dabae88a992faf415f6b716cdef5b9dee515b5ad6f49b
-
Filesize
556KB
MD58de840ce62b7fcecbe5028105d9c0727
SHA10d5bc59c3cbf4675c83477fa7b44c878ed894ebb
SHA2560d1633d6e884ff20f487ce20a49a1eacdc85e394487da2708728a9c3c73b15af
SHA512924d11f3d9a26f9f3928369745584cb38b2c480cb592795c50c4e73b4f85639fb52532a87cfee53715b4095521d7625fc5b7643c970afde0dd61359cb77a31a0
-
Filesize
556KB
MD58de840ce62b7fcecbe5028105d9c0727
SHA10d5bc59c3cbf4675c83477fa7b44c878ed894ebb
SHA2560d1633d6e884ff20f487ce20a49a1eacdc85e394487da2708728a9c3c73b15af
SHA512924d11f3d9a26f9f3928369745584cb38b2c480cb592795c50c4e73b4f85639fb52532a87cfee53715b4095521d7625fc5b7643c970afde0dd61359cb77a31a0
-
Filesize
390KB
MD5849234cb5df1b282d4c52bc12fedcbce
SHA1ad767c5587699eae9460afd45abc4aca365a4093
SHA2562dc02641bc82d2f8e637bd698a69d86ee86ed120fb128e1791e42bda8059b0bb
SHA5128656781911354e6f3121f61442da803eaaf812977686ae205c8dbf2d21710f8282d78ff3f4f5839dca020c0f1116963daf83de37dad0cae6fce6f41b3b248396
-
Filesize
390KB
MD5849234cb5df1b282d4c52bc12fedcbce
SHA1ad767c5587699eae9460afd45abc4aca365a4093
SHA2562dc02641bc82d2f8e637bd698a69d86ee86ed120fb128e1791e42bda8059b0bb
SHA5128656781911354e6f3121f61442da803eaaf812977686ae205c8dbf2d21710f8282d78ff3f4f5839dca020c0f1116963daf83de37dad0cae6fce6f41b3b248396
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f
-
Filesize
364KB
MD5a1838fe574b9b433baae72b33e645d10
SHA1b5c7051dde7a58bbcca4ecea3667a37a94d965af
SHA256de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087
SHA51284b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f