Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:18

General

  • Target

    dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe

  • Size

    934KB

  • MD5

    16f75e6948aea5b4091733a349935d39

  • SHA1

    6d08e6f492368742ed349b83a9f371b34c573689

  • SHA256

    dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88

  • SHA512

    166f663ecff98556bf379d625e12402bb1142e2bfe5ba7ad35e635ff15452ec6cd735a575e795e9371427912f82436979e29dac36c919409920be43286740490

  • SSDEEP

    24576:YygrgVgfCSQEvADXG8/clHJg/kafVSIzRHiPPf:fgrgKfEEwXGvH68wiP

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe
    "C:\Users\Admin\AppData\Local\Temp\dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4047096.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4047096.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9614348.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9614348.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2136
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5602023.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5602023.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2288
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2748
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2628
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 268
                7⤵
                • Program crash
                PID:2768
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4047096.exe

    Filesize

    832KB

    MD5

    c15830aa5816dac37d73495e79c4bf46

    SHA1

    3e2587c8512c06e082b31821d3841f36646debc4

    SHA256

    93a2e8d45340f4c8a907cd4996e75776d48610d5c84a03493b146b1af08cb690

    SHA512

    50a9cb51ae5695d6d842ecad311fd7fe34c17b9a630b35d2758ad5ae4983922b6a25f533a7170cc02ea50c72bccc986ee2eb9011d442227f116e225dd4a8227c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4047096.exe

    Filesize

    832KB

    MD5

    c15830aa5816dac37d73495e79c4bf46

    SHA1

    3e2587c8512c06e082b31821d3841f36646debc4

    SHA256

    93a2e8d45340f4c8a907cd4996e75776d48610d5c84a03493b146b1af08cb690

    SHA512

    50a9cb51ae5695d6d842ecad311fd7fe34c17b9a630b35d2758ad5ae4983922b6a25f533a7170cc02ea50c72bccc986ee2eb9011d442227f116e225dd4a8227c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9614348.exe

    Filesize

    559KB

    MD5

    e494b926589f7783083b4fb87ddbd304

    SHA1

    138c4ca0efd239c12c2fe549b140182b93c7fc1b

    SHA256

    ca0de10506321636f3f3e4d26b3f4735c568ffe4370e096f67d8d22182c4d14f

    SHA512

    a9eedb9b12863c5cd442b98122c1de32b10bd5f4670cfac318bfaa74428be3af8058b1791d9c6f3789c61ceef403376f34a6b2d4ec1dec0d290046157d2061a9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9614348.exe

    Filesize

    559KB

    MD5

    e494b926589f7783083b4fb87ddbd304

    SHA1

    138c4ca0efd239c12c2fe549b140182b93c7fc1b

    SHA256

    ca0de10506321636f3f3e4d26b3f4735c568ffe4370e096f67d8d22182c4d14f

    SHA512

    a9eedb9b12863c5cd442b98122c1de32b10bd5f4670cfac318bfaa74428be3af8058b1791d9c6f3789c61ceef403376f34a6b2d4ec1dec0d290046157d2061a9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5602023.exe

    Filesize

    393KB

    MD5

    95639971fca02bbeeb58eea9db54b3af

    SHA1

    d062d9ebc96185d426eedf4c73d0817212ae10cc

    SHA256

    a4ae621ed81c8049fb044e538abad5a9a1cfa1c735e9defdf6db756de42788fa

    SHA512

    20943948f1ae39a816a43db5552ed43ca552887a4b377ba658680f685045b6cbbf134613a3baef3fa58880514ef48e1a61a2e2403e3ee2314694bbe54fec63bc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5602023.exe

    Filesize

    393KB

    MD5

    95639971fca02bbeeb58eea9db54b3af

    SHA1

    d062d9ebc96185d426eedf4c73d0817212ae10cc

    SHA256

    a4ae621ed81c8049fb044e538abad5a9a1cfa1c735e9defdf6db756de42788fa

    SHA512

    20943948f1ae39a816a43db5552ed43ca552887a4b377ba658680f685045b6cbbf134613a3baef3fa58880514ef48e1a61a2e2403e3ee2314694bbe54fec63bc

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x4047096.exe

    Filesize

    832KB

    MD5

    c15830aa5816dac37d73495e79c4bf46

    SHA1

    3e2587c8512c06e082b31821d3841f36646debc4

    SHA256

    93a2e8d45340f4c8a907cd4996e75776d48610d5c84a03493b146b1af08cb690

    SHA512

    50a9cb51ae5695d6d842ecad311fd7fe34c17b9a630b35d2758ad5ae4983922b6a25f533a7170cc02ea50c72bccc986ee2eb9011d442227f116e225dd4a8227c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x4047096.exe

    Filesize

    832KB

    MD5

    c15830aa5816dac37d73495e79c4bf46

    SHA1

    3e2587c8512c06e082b31821d3841f36646debc4

    SHA256

    93a2e8d45340f4c8a907cd4996e75776d48610d5c84a03493b146b1af08cb690

    SHA512

    50a9cb51ae5695d6d842ecad311fd7fe34c17b9a630b35d2758ad5ae4983922b6a25f533a7170cc02ea50c72bccc986ee2eb9011d442227f116e225dd4a8227c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x9614348.exe

    Filesize

    559KB

    MD5

    e494b926589f7783083b4fb87ddbd304

    SHA1

    138c4ca0efd239c12c2fe549b140182b93c7fc1b

    SHA256

    ca0de10506321636f3f3e4d26b3f4735c568ffe4370e096f67d8d22182c4d14f

    SHA512

    a9eedb9b12863c5cd442b98122c1de32b10bd5f4670cfac318bfaa74428be3af8058b1791d9c6f3789c61ceef403376f34a6b2d4ec1dec0d290046157d2061a9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x9614348.exe

    Filesize

    559KB

    MD5

    e494b926589f7783083b4fb87ddbd304

    SHA1

    138c4ca0efd239c12c2fe549b140182b93c7fc1b

    SHA256

    ca0de10506321636f3f3e4d26b3f4735c568ffe4370e096f67d8d22182c4d14f

    SHA512

    a9eedb9b12863c5cd442b98122c1de32b10bd5f4670cfac318bfaa74428be3af8058b1791d9c6f3789c61ceef403376f34a6b2d4ec1dec0d290046157d2061a9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5602023.exe

    Filesize

    393KB

    MD5

    95639971fca02bbeeb58eea9db54b3af

    SHA1

    d062d9ebc96185d426eedf4c73d0817212ae10cc

    SHA256

    a4ae621ed81c8049fb044e538abad5a9a1cfa1c735e9defdf6db756de42788fa

    SHA512

    20943948f1ae39a816a43db5552ed43ca552887a4b377ba658680f685045b6cbbf134613a3baef3fa58880514ef48e1a61a2e2403e3ee2314694bbe54fec63bc

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5602023.exe

    Filesize

    393KB

    MD5

    95639971fca02bbeeb58eea9db54b3af

    SHA1

    d062d9ebc96185d426eedf4c73d0817212ae10cc

    SHA256

    a4ae621ed81c8049fb044e538abad5a9a1cfa1c735e9defdf6db756de42788fa

    SHA512

    20943948f1ae39a816a43db5552ed43ca552887a4b377ba658680f685045b6cbbf134613a3baef3fa58880514ef48e1a61a2e2403e3ee2314694bbe54fec63bc

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe

    Filesize

    380KB

    MD5

    baf09289845963adb3b4c7e96408a5a1

    SHA1

    ff3814c94ae0aa2f66cb7070997e784155c7ee58

    SHA256

    84a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2

    SHA512

    e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681

  • memory/2628-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2628-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2628-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB