Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe
Resource
win10v2004-20230915-en
General
-
Target
dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe
-
Size
934KB
-
MD5
16f75e6948aea5b4091733a349935d39
-
SHA1
6d08e6f492368742ed349b83a9f371b34c573689
-
SHA256
dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88
-
SHA512
166f663ecff98556bf379d625e12402bb1142e2bfe5ba7ad35e635ff15452ec6cd735a575e795e9371427912f82436979e29dac36c919409920be43286740490
-
SSDEEP
24576:YygrgVgfCSQEvADXG8/clHJg/kafVSIzRHiPPf:fgrgKfEEwXGvH68wiP
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2628-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2628-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2628-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2628-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2628-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2628-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2196 x4047096.exe 2136 x9614348.exe 2288 x5602023.exe 2748 g6467222.exe -
Loads dropped DLL 13 IoCs
pid Process 1964 dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe 2196 x4047096.exe 2196 x4047096.exe 2136 x9614348.exe 2136 x9614348.exe 2288 x5602023.exe 2288 x5602023.exe 2288 x5602023.exe 2748 g6467222.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe 2080 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5602023.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4047096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9614348.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 2628 2748 g6467222.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2080 2748 WerFault.exe 31 2768 2628 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2196 1964 dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe 28 PID 1964 wrote to memory of 2196 1964 dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe 28 PID 1964 wrote to memory of 2196 1964 dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe 28 PID 1964 wrote to memory of 2196 1964 dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe 28 PID 1964 wrote to memory of 2196 1964 dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe 28 PID 1964 wrote to memory of 2196 1964 dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe 28 PID 1964 wrote to memory of 2196 1964 dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe 28 PID 2196 wrote to memory of 2136 2196 x4047096.exe 29 PID 2196 wrote to memory of 2136 2196 x4047096.exe 29 PID 2196 wrote to memory of 2136 2196 x4047096.exe 29 PID 2196 wrote to memory of 2136 2196 x4047096.exe 29 PID 2196 wrote to memory of 2136 2196 x4047096.exe 29 PID 2196 wrote to memory of 2136 2196 x4047096.exe 29 PID 2196 wrote to memory of 2136 2196 x4047096.exe 29 PID 2136 wrote to memory of 2288 2136 x9614348.exe 30 PID 2136 wrote to memory of 2288 2136 x9614348.exe 30 PID 2136 wrote to memory of 2288 2136 x9614348.exe 30 PID 2136 wrote to memory of 2288 2136 x9614348.exe 30 PID 2136 wrote to memory of 2288 2136 x9614348.exe 30 PID 2136 wrote to memory of 2288 2136 x9614348.exe 30 PID 2136 wrote to memory of 2288 2136 x9614348.exe 30 PID 2288 wrote to memory of 2748 2288 x5602023.exe 31 PID 2288 wrote to memory of 2748 2288 x5602023.exe 31 PID 2288 wrote to memory of 2748 2288 x5602023.exe 31 PID 2288 wrote to memory of 2748 2288 x5602023.exe 31 PID 2288 wrote to memory of 2748 2288 x5602023.exe 31 PID 2288 wrote to memory of 2748 2288 x5602023.exe 31 PID 2288 wrote to memory of 2748 2288 x5602023.exe 31 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2628 2748 g6467222.exe 32 PID 2748 wrote to memory of 2080 2748 g6467222.exe 33 PID 2748 wrote to memory of 2080 2748 g6467222.exe 33 PID 2748 wrote to memory of 2080 2748 g6467222.exe 33 PID 2748 wrote to memory of 2080 2748 g6467222.exe 33 PID 2748 wrote to memory of 2080 2748 g6467222.exe 33 PID 2748 wrote to memory of 2080 2748 g6467222.exe 33 PID 2748 wrote to memory of 2080 2748 g6467222.exe 33 PID 2628 wrote to memory of 2768 2628 AppLaunch.exe 34 PID 2628 wrote to memory of 2768 2628 AppLaunch.exe 34 PID 2628 wrote to memory of 2768 2628 AppLaunch.exe 34 PID 2628 wrote to memory of 2768 2628 AppLaunch.exe 34 PID 2628 wrote to memory of 2768 2628 AppLaunch.exe 34 PID 2628 wrote to memory of 2768 2628 AppLaunch.exe 34 PID 2628 wrote to memory of 2768 2628 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe"C:\Users\Admin\AppData\Local\Temp\dd181ef0af895efee71476ba9880e433bfa6c763bead4a3e4dedc726791d0d88.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4047096.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4047096.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9614348.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9614348.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5602023.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5602023.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6467222.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 2687⤵
- Program crash
PID:2768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2080
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD5c15830aa5816dac37d73495e79c4bf46
SHA13e2587c8512c06e082b31821d3841f36646debc4
SHA25693a2e8d45340f4c8a907cd4996e75776d48610d5c84a03493b146b1af08cb690
SHA51250a9cb51ae5695d6d842ecad311fd7fe34c17b9a630b35d2758ad5ae4983922b6a25f533a7170cc02ea50c72bccc986ee2eb9011d442227f116e225dd4a8227c
-
Filesize
832KB
MD5c15830aa5816dac37d73495e79c4bf46
SHA13e2587c8512c06e082b31821d3841f36646debc4
SHA25693a2e8d45340f4c8a907cd4996e75776d48610d5c84a03493b146b1af08cb690
SHA51250a9cb51ae5695d6d842ecad311fd7fe34c17b9a630b35d2758ad5ae4983922b6a25f533a7170cc02ea50c72bccc986ee2eb9011d442227f116e225dd4a8227c
-
Filesize
559KB
MD5e494b926589f7783083b4fb87ddbd304
SHA1138c4ca0efd239c12c2fe549b140182b93c7fc1b
SHA256ca0de10506321636f3f3e4d26b3f4735c568ffe4370e096f67d8d22182c4d14f
SHA512a9eedb9b12863c5cd442b98122c1de32b10bd5f4670cfac318bfaa74428be3af8058b1791d9c6f3789c61ceef403376f34a6b2d4ec1dec0d290046157d2061a9
-
Filesize
559KB
MD5e494b926589f7783083b4fb87ddbd304
SHA1138c4ca0efd239c12c2fe549b140182b93c7fc1b
SHA256ca0de10506321636f3f3e4d26b3f4735c568ffe4370e096f67d8d22182c4d14f
SHA512a9eedb9b12863c5cd442b98122c1de32b10bd5f4670cfac318bfaa74428be3af8058b1791d9c6f3789c61ceef403376f34a6b2d4ec1dec0d290046157d2061a9
-
Filesize
393KB
MD595639971fca02bbeeb58eea9db54b3af
SHA1d062d9ebc96185d426eedf4c73d0817212ae10cc
SHA256a4ae621ed81c8049fb044e538abad5a9a1cfa1c735e9defdf6db756de42788fa
SHA51220943948f1ae39a816a43db5552ed43ca552887a4b377ba658680f685045b6cbbf134613a3baef3fa58880514ef48e1a61a2e2403e3ee2314694bbe54fec63bc
-
Filesize
393KB
MD595639971fca02bbeeb58eea9db54b3af
SHA1d062d9ebc96185d426eedf4c73d0817212ae10cc
SHA256a4ae621ed81c8049fb044e538abad5a9a1cfa1c735e9defdf6db756de42788fa
SHA51220943948f1ae39a816a43db5552ed43ca552887a4b377ba658680f685045b6cbbf134613a3baef3fa58880514ef48e1a61a2e2403e3ee2314694bbe54fec63bc
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681
-
Filesize
832KB
MD5c15830aa5816dac37d73495e79c4bf46
SHA13e2587c8512c06e082b31821d3841f36646debc4
SHA25693a2e8d45340f4c8a907cd4996e75776d48610d5c84a03493b146b1af08cb690
SHA51250a9cb51ae5695d6d842ecad311fd7fe34c17b9a630b35d2758ad5ae4983922b6a25f533a7170cc02ea50c72bccc986ee2eb9011d442227f116e225dd4a8227c
-
Filesize
832KB
MD5c15830aa5816dac37d73495e79c4bf46
SHA13e2587c8512c06e082b31821d3841f36646debc4
SHA25693a2e8d45340f4c8a907cd4996e75776d48610d5c84a03493b146b1af08cb690
SHA51250a9cb51ae5695d6d842ecad311fd7fe34c17b9a630b35d2758ad5ae4983922b6a25f533a7170cc02ea50c72bccc986ee2eb9011d442227f116e225dd4a8227c
-
Filesize
559KB
MD5e494b926589f7783083b4fb87ddbd304
SHA1138c4ca0efd239c12c2fe549b140182b93c7fc1b
SHA256ca0de10506321636f3f3e4d26b3f4735c568ffe4370e096f67d8d22182c4d14f
SHA512a9eedb9b12863c5cd442b98122c1de32b10bd5f4670cfac318bfaa74428be3af8058b1791d9c6f3789c61ceef403376f34a6b2d4ec1dec0d290046157d2061a9
-
Filesize
559KB
MD5e494b926589f7783083b4fb87ddbd304
SHA1138c4ca0efd239c12c2fe549b140182b93c7fc1b
SHA256ca0de10506321636f3f3e4d26b3f4735c568ffe4370e096f67d8d22182c4d14f
SHA512a9eedb9b12863c5cd442b98122c1de32b10bd5f4670cfac318bfaa74428be3af8058b1791d9c6f3789c61ceef403376f34a6b2d4ec1dec0d290046157d2061a9
-
Filesize
393KB
MD595639971fca02bbeeb58eea9db54b3af
SHA1d062d9ebc96185d426eedf4c73d0817212ae10cc
SHA256a4ae621ed81c8049fb044e538abad5a9a1cfa1c735e9defdf6db756de42788fa
SHA51220943948f1ae39a816a43db5552ed43ca552887a4b377ba658680f685045b6cbbf134613a3baef3fa58880514ef48e1a61a2e2403e3ee2314694bbe54fec63bc
-
Filesize
393KB
MD595639971fca02bbeeb58eea9db54b3af
SHA1d062d9ebc96185d426eedf4c73d0817212ae10cc
SHA256a4ae621ed81c8049fb044e538abad5a9a1cfa1c735e9defdf6db756de42788fa
SHA51220943948f1ae39a816a43db5552ed43ca552887a4b377ba658680f685045b6cbbf134613a3baef3fa58880514ef48e1a61a2e2403e3ee2314694bbe54fec63bc
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681
-
Filesize
380KB
MD5baf09289845963adb3b4c7e96408a5a1
SHA1ff3814c94ae0aa2f66cb7070997e784155c7ee58
SHA25684a1acdf99989416c41e9b59d50552c6929f2e635df6c53785dd47c3e626ffa2
SHA512e9c00a123c32b8cfc062054bb0f9f6b2c3132709f0b5504af9988ed84e72634963091cd3e0c7ce3aa3316fb3f0214a43559e87163f42761a0cdfa6cd5cd29681