Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe
Resource
win10v2004-20230915-en
General
-
Target
e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe
-
Size
929KB
-
MD5
a10e189d757ab223cccdf11043c65023
-
SHA1
65581b22142f08689c9c96e06c64a1cae9355a59
-
SHA256
e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919
-
SHA512
aa0f05c0405d74430e789102338a14d211f636c723ee29c3d19ef6db7de4e411da003796153f57e89d21b0b4203810960d7d49b936a1d0b65b0ce20d436896f3
-
SSDEEP
24576:lydRJdHHTZ4MLfDyXXKH4dYa18bZt8y+138emTwPuK:AldHd48eXXKHGGwO0P
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2836-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2836-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2836-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2836-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2836-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2836-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2224 x7754740.exe 2704 x5435411.exe 2652 x3339809.exe 2720 g8320300.exe -
Loads dropped DLL 13 IoCs
pid Process 1720 e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe 2224 x7754740.exe 2224 x7754740.exe 2704 x5435411.exe 2704 x5435411.exe 2652 x3339809.exe 2652 x3339809.exe 2652 x3339809.exe 2720 g8320300.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7754740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5435411.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x3339809.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 2836 2720 g8320300.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2684 2720 WerFault.exe 31 2552 2836 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2224 1720 e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe 28 PID 1720 wrote to memory of 2224 1720 e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe 28 PID 1720 wrote to memory of 2224 1720 e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe 28 PID 1720 wrote to memory of 2224 1720 e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe 28 PID 1720 wrote to memory of 2224 1720 e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe 28 PID 1720 wrote to memory of 2224 1720 e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe 28 PID 1720 wrote to memory of 2224 1720 e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe 28 PID 2224 wrote to memory of 2704 2224 x7754740.exe 29 PID 2224 wrote to memory of 2704 2224 x7754740.exe 29 PID 2224 wrote to memory of 2704 2224 x7754740.exe 29 PID 2224 wrote to memory of 2704 2224 x7754740.exe 29 PID 2224 wrote to memory of 2704 2224 x7754740.exe 29 PID 2224 wrote to memory of 2704 2224 x7754740.exe 29 PID 2224 wrote to memory of 2704 2224 x7754740.exe 29 PID 2704 wrote to memory of 2652 2704 x5435411.exe 30 PID 2704 wrote to memory of 2652 2704 x5435411.exe 30 PID 2704 wrote to memory of 2652 2704 x5435411.exe 30 PID 2704 wrote to memory of 2652 2704 x5435411.exe 30 PID 2704 wrote to memory of 2652 2704 x5435411.exe 30 PID 2704 wrote to memory of 2652 2704 x5435411.exe 30 PID 2704 wrote to memory of 2652 2704 x5435411.exe 30 PID 2652 wrote to memory of 2720 2652 x3339809.exe 31 PID 2652 wrote to memory of 2720 2652 x3339809.exe 31 PID 2652 wrote to memory of 2720 2652 x3339809.exe 31 PID 2652 wrote to memory of 2720 2652 x3339809.exe 31 PID 2652 wrote to memory of 2720 2652 x3339809.exe 31 PID 2652 wrote to memory of 2720 2652 x3339809.exe 31 PID 2652 wrote to memory of 2720 2652 x3339809.exe 31 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2836 2720 g8320300.exe 32 PID 2720 wrote to memory of 2684 2720 g8320300.exe 33 PID 2720 wrote to memory of 2684 2720 g8320300.exe 33 PID 2720 wrote to memory of 2684 2720 g8320300.exe 33 PID 2720 wrote to memory of 2684 2720 g8320300.exe 33 PID 2720 wrote to memory of 2684 2720 g8320300.exe 33 PID 2720 wrote to memory of 2684 2720 g8320300.exe 33 PID 2720 wrote to memory of 2684 2720 g8320300.exe 33 PID 2836 wrote to memory of 2552 2836 AppLaunch.exe 34 PID 2836 wrote to memory of 2552 2836 AppLaunch.exe 34 PID 2836 wrote to memory of 2552 2836 AppLaunch.exe 34 PID 2836 wrote to memory of 2552 2836 AppLaunch.exe 34 PID 2836 wrote to memory of 2552 2836 AppLaunch.exe 34 PID 2836 wrote to memory of 2552 2836 AppLaunch.exe 34 PID 2836 wrote to memory of 2552 2836 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe"C:\Users\Admin\AppData\Local\Temp\e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7754740.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7754740.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5435411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5435411.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3339809.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3339809.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 2687⤵
- Program crash
PID:2552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2684
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5c4edcf6b06d02da88390147a95679b7c
SHA16bf3f35fd3b2eb13b1ea9177f9578a5f52479fde
SHA256986ca927f12925740741e8508b3dcf117d6bb3570f4db657fb8df054b39bc7a0
SHA5126ef2d30e16078c6c15fbdb587aa28bfd4fe42ae23c53bbffd6d90abdc8f233abf13d58389cbad802671b89dffba5daf2b56d3d468cbe810d90570f1c962e9a68
-
Filesize
827KB
MD5c4edcf6b06d02da88390147a95679b7c
SHA16bf3f35fd3b2eb13b1ea9177f9578a5f52479fde
SHA256986ca927f12925740741e8508b3dcf117d6bb3570f4db657fb8df054b39bc7a0
SHA5126ef2d30e16078c6c15fbdb587aa28bfd4fe42ae23c53bbffd6d90abdc8f233abf13d58389cbad802671b89dffba5daf2b56d3d468cbe810d90570f1c962e9a68
-
Filesize
556KB
MD582bbfa1bdd8b5e3301fbccb27998061f
SHA10f62f11f8f5ede520759f95e57a315056d634101
SHA256f3ea18f696e50e1c605b663f31939e2acc0c3a7d8aaf6c69135a447b45868f23
SHA51234d0f1bea7440682ff776dbce9ca467bbcddb647625ebc20be45884057d9878155f45ca5b9466148c5f58bcd9a84a4424224a7ae15b86a34c072f65dd83f1375
-
Filesize
556KB
MD582bbfa1bdd8b5e3301fbccb27998061f
SHA10f62f11f8f5ede520759f95e57a315056d634101
SHA256f3ea18f696e50e1c605b663f31939e2acc0c3a7d8aaf6c69135a447b45868f23
SHA51234d0f1bea7440682ff776dbce9ca467bbcddb647625ebc20be45884057d9878155f45ca5b9466148c5f58bcd9a84a4424224a7ae15b86a34c072f65dd83f1375
-
Filesize
390KB
MD512b1f74e9cec213fbd65e8d2df77f1f7
SHA1311257b6c1c339ee87fbd6ff8739c05cfeb12f9c
SHA256eeb88353239a33fd52663039a901fa8ebf9be8e55edc03baf31f61bc1c422f11
SHA512fc2df45ff5575601e3f811d127109f7faf7f9252c533a292a0a55885cb774080c85a45427207027c1a168743f3d27a4caec3cc36b276df32f66870489bd81b4a
-
Filesize
390KB
MD512b1f74e9cec213fbd65e8d2df77f1f7
SHA1311257b6c1c339ee87fbd6ff8739c05cfeb12f9c
SHA256eeb88353239a33fd52663039a901fa8ebf9be8e55edc03baf31f61bc1c422f11
SHA512fc2df45ff5575601e3f811d127109f7faf7f9252c533a292a0a55885cb774080c85a45427207027c1a168743f3d27a4caec3cc36b276df32f66870489bd81b4a
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3
-
Filesize
827KB
MD5c4edcf6b06d02da88390147a95679b7c
SHA16bf3f35fd3b2eb13b1ea9177f9578a5f52479fde
SHA256986ca927f12925740741e8508b3dcf117d6bb3570f4db657fb8df054b39bc7a0
SHA5126ef2d30e16078c6c15fbdb587aa28bfd4fe42ae23c53bbffd6d90abdc8f233abf13d58389cbad802671b89dffba5daf2b56d3d468cbe810d90570f1c962e9a68
-
Filesize
827KB
MD5c4edcf6b06d02da88390147a95679b7c
SHA16bf3f35fd3b2eb13b1ea9177f9578a5f52479fde
SHA256986ca927f12925740741e8508b3dcf117d6bb3570f4db657fb8df054b39bc7a0
SHA5126ef2d30e16078c6c15fbdb587aa28bfd4fe42ae23c53bbffd6d90abdc8f233abf13d58389cbad802671b89dffba5daf2b56d3d468cbe810d90570f1c962e9a68
-
Filesize
556KB
MD582bbfa1bdd8b5e3301fbccb27998061f
SHA10f62f11f8f5ede520759f95e57a315056d634101
SHA256f3ea18f696e50e1c605b663f31939e2acc0c3a7d8aaf6c69135a447b45868f23
SHA51234d0f1bea7440682ff776dbce9ca467bbcddb647625ebc20be45884057d9878155f45ca5b9466148c5f58bcd9a84a4424224a7ae15b86a34c072f65dd83f1375
-
Filesize
556KB
MD582bbfa1bdd8b5e3301fbccb27998061f
SHA10f62f11f8f5ede520759f95e57a315056d634101
SHA256f3ea18f696e50e1c605b663f31939e2acc0c3a7d8aaf6c69135a447b45868f23
SHA51234d0f1bea7440682ff776dbce9ca467bbcddb647625ebc20be45884057d9878155f45ca5b9466148c5f58bcd9a84a4424224a7ae15b86a34c072f65dd83f1375
-
Filesize
390KB
MD512b1f74e9cec213fbd65e8d2df77f1f7
SHA1311257b6c1c339ee87fbd6ff8739c05cfeb12f9c
SHA256eeb88353239a33fd52663039a901fa8ebf9be8e55edc03baf31f61bc1c422f11
SHA512fc2df45ff5575601e3f811d127109f7faf7f9252c533a292a0a55885cb774080c85a45427207027c1a168743f3d27a4caec3cc36b276df32f66870489bd81b4a
-
Filesize
390KB
MD512b1f74e9cec213fbd65e8d2df77f1f7
SHA1311257b6c1c339ee87fbd6ff8739c05cfeb12f9c
SHA256eeb88353239a33fd52663039a901fa8ebf9be8e55edc03baf31f61bc1c422f11
SHA512fc2df45ff5575601e3f811d127109f7faf7f9252c533a292a0a55885cb774080c85a45427207027c1a168743f3d27a4caec3cc36b276df32f66870489bd81b4a
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3
-
Filesize
364KB
MD52ae05cf48329bd1f7ccd75aa4c9b72f1
SHA1de1568eb901fa76a74bcc0b28793449fd5cbbb42
SHA256bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10
SHA512235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3