Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 19:10

General

  • Target

    a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe

  • Size

    929KB

  • MD5

    c298354853bdfefc7f0e0511f1fa7ef6

  • SHA1

    f26312fec5557d4b2f005524b2cc682dca1e7c7a

  • SHA256

    a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622

  • SHA512

    f27affb5f4b1eb3af469a73ebec530912cd62717c575d2778334d408a737c4adf7b38eaa64c460b18a6bee2582df6b081cbbdee77d3ca91737fba4fe94fad270

  • SSDEEP

    24576:kyBBP9IENUOJf8YSC9klMoThbTTNdZ4irnn:zLPaSnTT9IZThbP/Z4Sn

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe
    "C:\Users\Admin\AppData\Local\Temp\a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0506755.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0506755.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8209745.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8209745.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5234842.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5234842.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2752
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2680
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 268
                7⤵
                • Program crash
                PID:2476
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0506755.exe

    Filesize

    827KB

    MD5

    06296d77ed4a209aec3876c82733eabf

    SHA1

    c61ea2a23b6204a1b3a6cdbde93c2230bc8f8dc3

    SHA256

    f05d1e608de876d99af6cb39468076e62387d46e74ac58fe0f274ae653bfd46c

    SHA512

    855ab8978dd21fac9084719e4eb226e5b24d2a31dbf1abe8325a67bafcc76cbae5a196b65564079765ed5df9d5bce984efddb376c587de42e3002b30de3a3e83

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0506755.exe

    Filesize

    827KB

    MD5

    06296d77ed4a209aec3876c82733eabf

    SHA1

    c61ea2a23b6204a1b3a6cdbde93c2230bc8f8dc3

    SHA256

    f05d1e608de876d99af6cb39468076e62387d46e74ac58fe0f274ae653bfd46c

    SHA512

    855ab8978dd21fac9084719e4eb226e5b24d2a31dbf1abe8325a67bafcc76cbae5a196b65564079765ed5df9d5bce984efddb376c587de42e3002b30de3a3e83

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8209745.exe

    Filesize

    556KB

    MD5

    2c6564b4f1530bad6ef01536cadbfe9c

    SHA1

    80454719b2e27df07cb40c504b07c32c4436ff7f

    SHA256

    ea809b33af2eef8f006039bb2e3862e140a0450f423c4e4d46bd7d06b0bb9f2f

    SHA512

    65e966d36f219dc0d312dc3d0ba8378f65bf0371d6cdd7c28c5abe1416fc61e850f32b5c8c008630f6fa7b659444714ecb9c7e9a19168e899a822d3c5e93acd0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8209745.exe

    Filesize

    556KB

    MD5

    2c6564b4f1530bad6ef01536cadbfe9c

    SHA1

    80454719b2e27df07cb40c504b07c32c4436ff7f

    SHA256

    ea809b33af2eef8f006039bb2e3862e140a0450f423c4e4d46bd7d06b0bb9f2f

    SHA512

    65e966d36f219dc0d312dc3d0ba8378f65bf0371d6cdd7c28c5abe1416fc61e850f32b5c8c008630f6fa7b659444714ecb9c7e9a19168e899a822d3c5e93acd0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5234842.exe

    Filesize

    390KB

    MD5

    55c01f0271241393470aa37902ab0c86

    SHA1

    878cc857b132052cc12da7c1e9e14ffcfd74f823

    SHA256

    c2dd352716f40627cdfdd009613b8630a48c1784e6b05ef5ac9ebf1f4a5fddaf

    SHA512

    b79cc80761269bd8350df65080300c2df5ac0990b5763d2064bf77eb95b9db967cb86f9959e456e727dcf68ebbde4a411b27df545837908d7045862ce26d8bd4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5234842.exe

    Filesize

    390KB

    MD5

    55c01f0271241393470aa37902ab0c86

    SHA1

    878cc857b132052cc12da7c1e9e14ffcfd74f823

    SHA256

    c2dd352716f40627cdfdd009613b8630a48c1784e6b05ef5ac9ebf1f4a5fddaf

    SHA512

    b79cc80761269bd8350df65080300c2df5ac0990b5763d2064bf77eb95b9db967cb86f9959e456e727dcf68ebbde4a411b27df545837908d7045862ce26d8bd4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0506755.exe

    Filesize

    827KB

    MD5

    06296d77ed4a209aec3876c82733eabf

    SHA1

    c61ea2a23b6204a1b3a6cdbde93c2230bc8f8dc3

    SHA256

    f05d1e608de876d99af6cb39468076e62387d46e74ac58fe0f274ae653bfd46c

    SHA512

    855ab8978dd21fac9084719e4eb226e5b24d2a31dbf1abe8325a67bafcc76cbae5a196b65564079765ed5df9d5bce984efddb376c587de42e3002b30de3a3e83

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0506755.exe

    Filesize

    827KB

    MD5

    06296d77ed4a209aec3876c82733eabf

    SHA1

    c61ea2a23b6204a1b3a6cdbde93c2230bc8f8dc3

    SHA256

    f05d1e608de876d99af6cb39468076e62387d46e74ac58fe0f274ae653bfd46c

    SHA512

    855ab8978dd21fac9084719e4eb226e5b24d2a31dbf1abe8325a67bafcc76cbae5a196b65564079765ed5df9d5bce984efddb376c587de42e3002b30de3a3e83

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x8209745.exe

    Filesize

    556KB

    MD5

    2c6564b4f1530bad6ef01536cadbfe9c

    SHA1

    80454719b2e27df07cb40c504b07c32c4436ff7f

    SHA256

    ea809b33af2eef8f006039bb2e3862e140a0450f423c4e4d46bd7d06b0bb9f2f

    SHA512

    65e966d36f219dc0d312dc3d0ba8378f65bf0371d6cdd7c28c5abe1416fc61e850f32b5c8c008630f6fa7b659444714ecb9c7e9a19168e899a822d3c5e93acd0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x8209745.exe

    Filesize

    556KB

    MD5

    2c6564b4f1530bad6ef01536cadbfe9c

    SHA1

    80454719b2e27df07cb40c504b07c32c4436ff7f

    SHA256

    ea809b33af2eef8f006039bb2e3862e140a0450f423c4e4d46bd7d06b0bb9f2f

    SHA512

    65e966d36f219dc0d312dc3d0ba8378f65bf0371d6cdd7c28c5abe1416fc61e850f32b5c8c008630f6fa7b659444714ecb9c7e9a19168e899a822d3c5e93acd0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5234842.exe

    Filesize

    390KB

    MD5

    55c01f0271241393470aa37902ab0c86

    SHA1

    878cc857b132052cc12da7c1e9e14ffcfd74f823

    SHA256

    c2dd352716f40627cdfdd009613b8630a48c1784e6b05ef5ac9ebf1f4a5fddaf

    SHA512

    b79cc80761269bd8350df65080300c2df5ac0990b5763d2064bf77eb95b9db967cb86f9959e456e727dcf68ebbde4a411b27df545837908d7045862ce26d8bd4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5234842.exe

    Filesize

    390KB

    MD5

    55c01f0271241393470aa37902ab0c86

    SHA1

    878cc857b132052cc12da7c1e9e14ffcfd74f823

    SHA256

    c2dd352716f40627cdfdd009613b8630a48c1784e6b05ef5ac9ebf1f4a5fddaf

    SHA512

    b79cc80761269bd8350df65080300c2df5ac0990b5763d2064bf77eb95b9db967cb86f9959e456e727dcf68ebbde4a411b27df545837908d7045862ce26d8bd4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe

    Filesize

    364KB

    MD5

    c4af96d39fe984b514f6bdf1836239f9

    SHA1

    c05f84fdfe6576ff40294352da41c3218ae51674

    SHA256

    50114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9

    SHA512

    d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35

  • memory/2680-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2680-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2680-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB