Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 19:46
Static task
static1
Behavioral task
behavioral1
Sample
e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe
Resource
win10v2004-20230915-en
General
-
Target
e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe
-
Size
929KB
-
MD5
ff37fd162b15b7eafaf0b7b821f19178
-
SHA1
d2515f3bd875468ce553a3b5efdfc8fcda0195b7
-
SHA256
e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139
-
SHA512
d1bceb0d3eb0e7e73717800e75cd13b030d67a2d78f4e497da83b26839420d1796c576da2f6aa87cdf81716d5d4ac4b17c3c6474eab9755c8c270b22f70bcf5c
-
SSDEEP
24576:cyvl+9SDkouXpcqOHCA69cYTPXTq5gigccDiqWfvf:Lvg9wkouiPmpTfT6JgE5
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2944-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2944-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2944-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2944-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2944-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2944-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 1732 x1008481.exe 2344 x7986400.exe 2808 x3502606.exe 2580 g3476423.exe -
Loads dropped DLL 13 IoCs
pid Process 1312 e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe 1732 x1008481.exe 1732 x1008481.exe 2344 x7986400.exe 2344 x7986400.exe 2808 x3502606.exe 2808 x3502606.exe 2808 x3502606.exe 2580 g3476423.exe 2308 WerFault.exe 2308 WerFault.exe 2308 WerFault.exe 2308 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1008481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7986400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3502606.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2580 set thread context of 2944 2580 g3476423.exe 35 -
Program crash 2 IoCs
pid pid_target Process procid_target 2308 2580 WerFault.exe 31 2776 2944 WerFault.exe 35 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1732 1312 e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe 28 PID 1312 wrote to memory of 1732 1312 e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe 28 PID 1312 wrote to memory of 1732 1312 e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe 28 PID 1312 wrote to memory of 1732 1312 e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe 28 PID 1312 wrote to memory of 1732 1312 e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe 28 PID 1312 wrote to memory of 1732 1312 e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe 28 PID 1312 wrote to memory of 1732 1312 e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe 28 PID 1732 wrote to memory of 2344 1732 x1008481.exe 29 PID 1732 wrote to memory of 2344 1732 x1008481.exe 29 PID 1732 wrote to memory of 2344 1732 x1008481.exe 29 PID 1732 wrote to memory of 2344 1732 x1008481.exe 29 PID 1732 wrote to memory of 2344 1732 x1008481.exe 29 PID 1732 wrote to memory of 2344 1732 x1008481.exe 29 PID 1732 wrote to memory of 2344 1732 x1008481.exe 29 PID 2344 wrote to memory of 2808 2344 x7986400.exe 30 PID 2344 wrote to memory of 2808 2344 x7986400.exe 30 PID 2344 wrote to memory of 2808 2344 x7986400.exe 30 PID 2344 wrote to memory of 2808 2344 x7986400.exe 30 PID 2344 wrote to memory of 2808 2344 x7986400.exe 30 PID 2344 wrote to memory of 2808 2344 x7986400.exe 30 PID 2344 wrote to memory of 2808 2344 x7986400.exe 30 PID 2808 wrote to memory of 2580 2808 x3502606.exe 31 PID 2808 wrote to memory of 2580 2808 x3502606.exe 31 PID 2808 wrote to memory of 2580 2808 x3502606.exe 31 PID 2808 wrote to memory of 2580 2808 x3502606.exe 31 PID 2808 wrote to memory of 2580 2808 x3502606.exe 31 PID 2808 wrote to memory of 2580 2808 x3502606.exe 31 PID 2808 wrote to memory of 2580 2808 x3502606.exe 31 PID 2580 wrote to memory of 2744 2580 g3476423.exe 32 PID 2580 wrote to memory of 2744 2580 g3476423.exe 32 PID 2580 wrote to memory of 2744 2580 g3476423.exe 32 PID 2580 wrote to memory of 2744 2580 g3476423.exe 32 PID 2580 wrote to memory of 2744 2580 g3476423.exe 32 PID 2580 wrote to memory of 2744 2580 g3476423.exe 32 PID 2580 wrote to memory of 2744 2580 g3476423.exe 32 PID 2580 wrote to memory of 2760 2580 g3476423.exe 33 PID 2580 wrote to memory of 2760 2580 g3476423.exe 33 PID 2580 wrote to memory of 2760 2580 g3476423.exe 33 PID 2580 wrote to memory of 2760 2580 g3476423.exe 33 PID 2580 wrote to memory of 2760 2580 g3476423.exe 33 PID 2580 wrote to memory of 2760 2580 g3476423.exe 33 PID 2580 wrote to memory of 2760 2580 g3476423.exe 33 PID 2580 wrote to memory of 2624 2580 g3476423.exe 34 PID 2580 wrote to memory of 2624 2580 g3476423.exe 34 PID 2580 wrote to memory of 2624 2580 g3476423.exe 34 PID 2580 wrote to memory of 2624 2580 g3476423.exe 34 PID 2580 wrote to memory of 2624 2580 g3476423.exe 34 PID 2580 wrote to memory of 2624 2580 g3476423.exe 34 PID 2580 wrote to memory of 2624 2580 g3476423.exe 34 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2944 2580 g3476423.exe 35 PID 2580 wrote to memory of 2308 2580 g3476423.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe"C:\Users\Admin\AppData\Local\Temp\e3cb20023011b9406d72f39d90fa28df90e9da515843252428f7c85383232139.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1008481.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1008481.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7986400.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7986400.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3502606.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3502606.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3476423.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3476423.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 2687⤵
- Program crash
PID:2776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 2966⤵
- Loads dropped DLL
- Program crash
PID:2308
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5fc86786b95636fedab8d25b405c17e28
SHA1ac75de85d50d1b4b6673c91c96d13976484d28e0
SHA2568001c7954fb3ae1960576d5de1288c67793650e2f22e08e99fcbeb3d7e133a9a
SHA51280764d40d45826ed9f09a268e21109f2ecc4d06589f934c4ecf79e0306d5f43a9221111e952c45a5570a26c4c6a7b816ac655f954fe588dbf528e638887612d8
-
Filesize
827KB
MD5fc86786b95636fedab8d25b405c17e28
SHA1ac75de85d50d1b4b6673c91c96d13976484d28e0
SHA2568001c7954fb3ae1960576d5de1288c67793650e2f22e08e99fcbeb3d7e133a9a
SHA51280764d40d45826ed9f09a268e21109f2ecc4d06589f934c4ecf79e0306d5f43a9221111e952c45a5570a26c4c6a7b816ac655f954fe588dbf528e638887612d8
-
Filesize
556KB
MD5abbe1197fc49a0b00aac86a204c11e12
SHA196adf47d3b42bcbb3a7225f7f20e060a86f3bbfa
SHA256c1a1e542e518731a7f563ea9650f6738c494a39e4b85d1b8853dd4a66fa7dbcf
SHA5124c13d0b2048601cfe89ef1d13147596256f6efe9574710e24c7ab69da1e988cd10eee3b474c2d3a07cb06c8ed6b04aa2807f19af867b178f7031c4bdc2e19e86
-
Filesize
556KB
MD5abbe1197fc49a0b00aac86a204c11e12
SHA196adf47d3b42bcbb3a7225f7f20e060a86f3bbfa
SHA256c1a1e542e518731a7f563ea9650f6738c494a39e4b85d1b8853dd4a66fa7dbcf
SHA5124c13d0b2048601cfe89ef1d13147596256f6efe9574710e24c7ab69da1e988cd10eee3b474c2d3a07cb06c8ed6b04aa2807f19af867b178f7031c4bdc2e19e86
-
Filesize
390KB
MD54dcdf3c808cf74fc4a559c6bad4d7c4f
SHA19b170f9a5c7d388ac8ddc697beff3bf688086377
SHA256f9326d03831d942f334db713e10a15a82eb75cb152ec9c72bc9e1f5305520a0b
SHA5122fda2b25e77aed2810ce7df17245e8510b90e8d89273372328c81dd2e952521da63fcdc7dca21531b96ae7703c29cc472fc336e608272415b11163600c69dbbf
-
Filesize
390KB
MD54dcdf3c808cf74fc4a559c6bad4d7c4f
SHA19b170f9a5c7d388ac8ddc697beff3bf688086377
SHA256f9326d03831d942f334db713e10a15a82eb75cb152ec9c72bc9e1f5305520a0b
SHA5122fda2b25e77aed2810ce7df17245e8510b90e8d89273372328c81dd2e952521da63fcdc7dca21531b96ae7703c29cc472fc336e608272415b11163600c69dbbf
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d
-
Filesize
827KB
MD5fc86786b95636fedab8d25b405c17e28
SHA1ac75de85d50d1b4b6673c91c96d13976484d28e0
SHA2568001c7954fb3ae1960576d5de1288c67793650e2f22e08e99fcbeb3d7e133a9a
SHA51280764d40d45826ed9f09a268e21109f2ecc4d06589f934c4ecf79e0306d5f43a9221111e952c45a5570a26c4c6a7b816ac655f954fe588dbf528e638887612d8
-
Filesize
827KB
MD5fc86786b95636fedab8d25b405c17e28
SHA1ac75de85d50d1b4b6673c91c96d13976484d28e0
SHA2568001c7954fb3ae1960576d5de1288c67793650e2f22e08e99fcbeb3d7e133a9a
SHA51280764d40d45826ed9f09a268e21109f2ecc4d06589f934c4ecf79e0306d5f43a9221111e952c45a5570a26c4c6a7b816ac655f954fe588dbf528e638887612d8
-
Filesize
556KB
MD5abbe1197fc49a0b00aac86a204c11e12
SHA196adf47d3b42bcbb3a7225f7f20e060a86f3bbfa
SHA256c1a1e542e518731a7f563ea9650f6738c494a39e4b85d1b8853dd4a66fa7dbcf
SHA5124c13d0b2048601cfe89ef1d13147596256f6efe9574710e24c7ab69da1e988cd10eee3b474c2d3a07cb06c8ed6b04aa2807f19af867b178f7031c4bdc2e19e86
-
Filesize
556KB
MD5abbe1197fc49a0b00aac86a204c11e12
SHA196adf47d3b42bcbb3a7225f7f20e060a86f3bbfa
SHA256c1a1e542e518731a7f563ea9650f6738c494a39e4b85d1b8853dd4a66fa7dbcf
SHA5124c13d0b2048601cfe89ef1d13147596256f6efe9574710e24c7ab69da1e988cd10eee3b474c2d3a07cb06c8ed6b04aa2807f19af867b178f7031c4bdc2e19e86
-
Filesize
390KB
MD54dcdf3c808cf74fc4a559c6bad4d7c4f
SHA19b170f9a5c7d388ac8ddc697beff3bf688086377
SHA256f9326d03831d942f334db713e10a15a82eb75cb152ec9c72bc9e1f5305520a0b
SHA5122fda2b25e77aed2810ce7df17245e8510b90e8d89273372328c81dd2e952521da63fcdc7dca21531b96ae7703c29cc472fc336e608272415b11163600c69dbbf
-
Filesize
390KB
MD54dcdf3c808cf74fc4a559c6bad4d7c4f
SHA19b170f9a5c7d388ac8ddc697beff3bf688086377
SHA256f9326d03831d942f334db713e10a15a82eb75cb152ec9c72bc9e1f5305520a0b
SHA5122fda2b25e77aed2810ce7df17245e8510b90e8d89273372328c81dd2e952521da63fcdc7dca21531b96ae7703c29cc472fc336e608272415b11163600c69dbbf
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d
-
Filesize
364KB
MD5f03c7917f162cbfbf695328899a2c303
SHA12678359e67bd285fba5a7d3b2b4d83fcdda53fea
SHA25608adc45177a100c83212e697f90572d938a21942600bdb997867583a7a55f314
SHA51274e3f61ef20077dc5804586b523a88fa152b931a7c239ea2d60fdda84cc1822a5bf40e55c83a397382a030c71b86fef0689014a4ada28832cf847f26598e6b5d