Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe
Resource
win10v2004-20230915-en
General
-
Target
a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe
-
Size
929KB
-
MD5
c298354853bdfefc7f0e0511f1fa7ef6
-
SHA1
f26312fec5557d4b2f005524b2cc682dca1e7c7a
-
SHA256
a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622
-
SHA512
f27affb5f4b1eb3af469a73ebec530912cd62717c575d2778334d408a737c4adf7b38eaa64c460b18a6bee2582df6b081cbbdee77d3ca91737fba4fe94fad270
-
SSDEEP
24576:kyBBP9IENUOJf8YSC9klMoThbTTNdZ4irnn:zLPaSnTT9IZThbP/Z4Sn
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2680-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2680-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2104 x0506755.exe 2744 x8209745.exe 2588 x5234842.exe 2752 g1912165.exe -
Loads dropped DLL 13 IoCs
pid Process 2416 a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe 2104 x0506755.exe 2104 x0506755.exe 2744 x8209745.exe 2744 x8209745.exe 2588 x5234842.exe 2588 x5234842.exe 2588 x5234842.exe 2752 g1912165.exe 2796 WerFault.exe 2796 WerFault.exe 2796 WerFault.exe 2796 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5234842.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0506755.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8209745.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2680 2752 g1912165.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2796 2752 WerFault.exe 31 2476 2680 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2104 2416 a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe 28 PID 2416 wrote to memory of 2104 2416 a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe 28 PID 2416 wrote to memory of 2104 2416 a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe 28 PID 2416 wrote to memory of 2104 2416 a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe 28 PID 2416 wrote to memory of 2104 2416 a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe 28 PID 2416 wrote to memory of 2104 2416 a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe 28 PID 2416 wrote to memory of 2104 2416 a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe 28 PID 2104 wrote to memory of 2744 2104 x0506755.exe 29 PID 2104 wrote to memory of 2744 2104 x0506755.exe 29 PID 2104 wrote to memory of 2744 2104 x0506755.exe 29 PID 2104 wrote to memory of 2744 2104 x0506755.exe 29 PID 2104 wrote to memory of 2744 2104 x0506755.exe 29 PID 2104 wrote to memory of 2744 2104 x0506755.exe 29 PID 2104 wrote to memory of 2744 2104 x0506755.exe 29 PID 2744 wrote to memory of 2588 2744 x8209745.exe 30 PID 2744 wrote to memory of 2588 2744 x8209745.exe 30 PID 2744 wrote to memory of 2588 2744 x8209745.exe 30 PID 2744 wrote to memory of 2588 2744 x8209745.exe 30 PID 2744 wrote to memory of 2588 2744 x8209745.exe 30 PID 2744 wrote to memory of 2588 2744 x8209745.exe 30 PID 2744 wrote to memory of 2588 2744 x8209745.exe 30 PID 2588 wrote to memory of 2752 2588 x5234842.exe 31 PID 2588 wrote to memory of 2752 2588 x5234842.exe 31 PID 2588 wrote to memory of 2752 2588 x5234842.exe 31 PID 2588 wrote to memory of 2752 2588 x5234842.exe 31 PID 2588 wrote to memory of 2752 2588 x5234842.exe 31 PID 2588 wrote to memory of 2752 2588 x5234842.exe 31 PID 2588 wrote to memory of 2752 2588 x5234842.exe 31 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2680 2752 g1912165.exe 32 PID 2752 wrote to memory of 2796 2752 g1912165.exe 33 PID 2752 wrote to memory of 2796 2752 g1912165.exe 33 PID 2752 wrote to memory of 2796 2752 g1912165.exe 33 PID 2752 wrote to memory of 2796 2752 g1912165.exe 33 PID 2752 wrote to memory of 2796 2752 g1912165.exe 33 PID 2752 wrote to memory of 2796 2752 g1912165.exe 33 PID 2752 wrote to memory of 2796 2752 g1912165.exe 33 PID 2680 wrote to memory of 2476 2680 AppLaunch.exe 34 PID 2680 wrote to memory of 2476 2680 AppLaunch.exe 34 PID 2680 wrote to memory of 2476 2680 AppLaunch.exe 34 PID 2680 wrote to memory of 2476 2680 AppLaunch.exe 34 PID 2680 wrote to memory of 2476 2680 AppLaunch.exe 34 PID 2680 wrote to memory of 2476 2680 AppLaunch.exe 34 PID 2680 wrote to memory of 2476 2680 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe"C:\Users\Admin\AppData\Local\Temp\a594ed3cf56254592297367c1de0f736b27489f1a693e99740190bd87d912622.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0506755.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0506755.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8209745.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8209745.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5234842.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5234842.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1912165.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2687⤵
- Program crash
PID:2476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2796
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD506296d77ed4a209aec3876c82733eabf
SHA1c61ea2a23b6204a1b3a6cdbde93c2230bc8f8dc3
SHA256f05d1e608de876d99af6cb39468076e62387d46e74ac58fe0f274ae653bfd46c
SHA512855ab8978dd21fac9084719e4eb226e5b24d2a31dbf1abe8325a67bafcc76cbae5a196b65564079765ed5df9d5bce984efddb376c587de42e3002b30de3a3e83
-
Filesize
827KB
MD506296d77ed4a209aec3876c82733eabf
SHA1c61ea2a23b6204a1b3a6cdbde93c2230bc8f8dc3
SHA256f05d1e608de876d99af6cb39468076e62387d46e74ac58fe0f274ae653bfd46c
SHA512855ab8978dd21fac9084719e4eb226e5b24d2a31dbf1abe8325a67bafcc76cbae5a196b65564079765ed5df9d5bce984efddb376c587de42e3002b30de3a3e83
-
Filesize
556KB
MD52c6564b4f1530bad6ef01536cadbfe9c
SHA180454719b2e27df07cb40c504b07c32c4436ff7f
SHA256ea809b33af2eef8f006039bb2e3862e140a0450f423c4e4d46bd7d06b0bb9f2f
SHA51265e966d36f219dc0d312dc3d0ba8378f65bf0371d6cdd7c28c5abe1416fc61e850f32b5c8c008630f6fa7b659444714ecb9c7e9a19168e899a822d3c5e93acd0
-
Filesize
556KB
MD52c6564b4f1530bad6ef01536cadbfe9c
SHA180454719b2e27df07cb40c504b07c32c4436ff7f
SHA256ea809b33af2eef8f006039bb2e3862e140a0450f423c4e4d46bd7d06b0bb9f2f
SHA51265e966d36f219dc0d312dc3d0ba8378f65bf0371d6cdd7c28c5abe1416fc61e850f32b5c8c008630f6fa7b659444714ecb9c7e9a19168e899a822d3c5e93acd0
-
Filesize
390KB
MD555c01f0271241393470aa37902ab0c86
SHA1878cc857b132052cc12da7c1e9e14ffcfd74f823
SHA256c2dd352716f40627cdfdd009613b8630a48c1784e6b05ef5ac9ebf1f4a5fddaf
SHA512b79cc80761269bd8350df65080300c2df5ac0990b5763d2064bf77eb95b9db967cb86f9959e456e727dcf68ebbde4a411b27df545837908d7045862ce26d8bd4
-
Filesize
390KB
MD555c01f0271241393470aa37902ab0c86
SHA1878cc857b132052cc12da7c1e9e14ffcfd74f823
SHA256c2dd352716f40627cdfdd009613b8630a48c1784e6b05ef5ac9ebf1f4a5fddaf
SHA512b79cc80761269bd8350df65080300c2df5ac0990b5763d2064bf77eb95b9db967cb86f9959e456e727dcf68ebbde4a411b27df545837908d7045862ce26d8bd4
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35
-
Filesize
827KB
MD506296d77ed4a209aec3876c82733eabf
SHA1c61ea2a23b6204a1b3a6cdbde93c2230bc8f8dc3
SHA256f05d1e608de876d99af6cb39468076e62387d46e74ac58fe0f274ae653bfd46c
SHA512855ab8978dd21fac9084719e4eb226e5b24d2a31dbf1abe8325a67bafcc76cbae5a196b65564079765ed5df9d5bce984efddb376c587de42e3002b30de3a3e83
-
Filesize
827KB
MD506296d77ed4a209aec3876c82733eabf
SHA1c61ea2a23b6204a1b3a6cdbde93c2230bc8f8dc3
SHA256f05d1e608de876d99af6cb39468076e62387d46e74ac58fe0f274ae653bfd46c
SHA512855ab8978dd21fac9084719e4eb226e5b24d2a31dbf1abe8325a67bafcc76cbae5a196b65564079765ed5df9d5bce984efddb376c587de42e3002b30de3a3e83
-
Filesize
556KB
MD52c6564b4f1530bad6ef01536cadbfe9c
SHA180454719b2e27df07cb40c504b07c32c4436ff7f
SHA256ea809b33af2eef8f006039bb2e3862e140a0450f423c4e4d46bd7d06b0bb9f2f
SHA51265e966d36f219dc0d312dc3d0ba8378f65bf0371d6cdd7c28c5abe1416fc61e850f32b5c8c008630f6fa7b659444714ecb9c7e9a19168e899a822d3c5e93acd0
-
Filesize
556KB
MD52c6564b4f1530bad6ef01536cadbfe9c
SHA180454719b2e27df07cb40c504b07c32c4436ff7f
SHA256ea809b33af2eef8f006039bb2e3862e140a0450f423c4e4d46bd7d06b0bb9f2f
SHA51265e966d36f219dc0d312dc3d0ba8378f65bf0371d6cdd7c28c5abe1416fc61e850f32b5c8c008630f6fa7b659444714ecb9c7e9a19168e899a822d3c5e93acd0
-
Filesize
390KB
MD555c01f0271241393470aa37902ab0c86
SHA1878cc857b132052cc12da7c1e9e14ffcfd74f823
SHA256c2dd352716f40627cdfdd009613b8630a48c1784e6b05ef5ac9ebf1f4a5fddaf
SHA512b79cc80761269bd8350df65080300c2df5ac0990b5763d2064bf77eb95b9db967cb86f9959e456e727dcf68ebbde4a411b27df545837908d7045862ce26d8bd4
-
Filesize
390KB
MD555c01f0271241393470aa37902ab0c86
SHA1878cc857b132052cc12da7c1e9e14ffcfd74f823
SHA256c2dd352716f40627cdfdd009613b8630a48c1784e6b05ef5ac9ebf1f4a5fddaf
SHA512b79cc80761269bd8350df65080300c2df5ac0990b5763d2064bf77eb95b9db967cb86f9959e456e727dcf68ebbde4a411b27df545837908d7045862ce26d8bd4
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35
-
Filesize
364KB
MD5c4af96d39fe984b514f6bdf1836239f9
SHA1c05f84fdfe6576ff40294352da41c3218ae51674
SHA25650114b4234955fba5ded5d200b9bc97e76a7973bec3e1fc3fb17f6cb115511c9
SHA512d2af4c6066058ef9cb80efc915ac202898915c9f4219ba885ec40dc070539b0d9f216b6657d776c9a3c16dda1788c5bee37e481aefa4398e9a03c3a9b6f79e35