Analysis

  • max time kernel
    122s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 19:49

General

  • Target

    e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe

  • Size

    929KB

  • MD5

    a10e189d757ab223cccdf11043c65023

  • SHA1

    65581b22142f08689c9c96e06c64a1cae9355a59

  • SHA256

    e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919

  • SHA512

    aa0f05c0405d74430e789102338a14d211f636c723ee29c3d19ef6db7de4e411da003796153f57e89d21b0b4203810960d7d49b936a1d0b65b0ce20d436896f3

  • SSDEEP

    24576:lydRJdHHTZ4MLfDyXXKH4dYa18bZt8y+138emTwPuK:AldHd48eXXKHGGwO0P

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe
    "C:\Users\Admin\AppData\Local\Temp\e13a66c0b375afd7f0c96eebce2dbec1f29e21befd58b11cebb22007ee846919.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7754740.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7754740.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5435411.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5435411.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3339809.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3339809.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2836
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 268
                7⤵
                • Program crash
                PID:2552
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7754740.exe

    Filesize

    827KB

    MD5

    c4edcf6b06d02da88390147a95679b7c

    SHA1

    6bf3f35fd3b2eb13b1ea9177f9578a5f52479fde

    SHA256

    986ca927f12925740741e8508b3dcf117d6bb3570f4db657fb8df054b39bc7a0

    SHA512

    6ef2d30e16078c6c15fbdb587aa28bfd4fe42ae23c53bbffd6d90abdc8f233abf13d58389cbad802671b89dffba5daf2b56d3d468cbe810d90570f1c962e9a68

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7754740.exe

    Filesize

    827KB

    MD5

    c4edcf6b06d02da88390147a95679b7c

    SHA1

    6bf3f35fd3b2eb13b1ea9177f9578a5f52479fde

    SHA256

    986ca927f12925740741e8508b3dcf117d6bb3570f4db657fb8df054b39bc7a0

    SHA512

    6ef2d30e16078c6c15fbdb587aa28bfd4fe42ae23c53bbffd6d90abdc8f233abf13d58389cbad802671b89dffba5daf2b56d3d468cbe810d90570f1c962e9a68

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5435411.exe

    Filesize

    556KB

    MD5

    82bbfa1bdd8b5e3301fbccb27998061f

    SHA1

    0f62f11f8f5ede520759f95e57a315056d634101

    SHA256

    f3ea18f696e50e1c605b663f31939e2acc0c3a7d8aaf6c69135a447b45868f23

    SHA512

    34d0f1bea7440682ff776dbce9ca467bbcddb647625ebc20be45884057d9878155f45ca5b9466148c5f58bcd9a84a4424224a7ae15b86a34c072f65dd83f1375

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5435411.exe

    Filesize

    556KB

    MD5

    82bbfa1bdd8b5e3301fbccb27998061f

    SHA1

    0f62f11f8f5ede520759f95e57a315056d634101

    SHA256

    f3ea18f696e50e1c605b663f31939e2acc0c3a7d8aaf6c69135a447b45868f23

    SHA512

    34d0f1bea7440682ff776dbce9ca467bbcddb647625ebc20be45884057d9878155f45ca5b9466148c5f58bcd9a84a4424224a7ae15b86a34c072f65dd83f1375

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3339809.exe

    Filesize

    390KB

    MD5

    12b1f74e9cec213fbd65e8d2df77f1f7

    SHA1

    311257b6c1c339ee87fbd6ff8739c05cfeb12f9c

    SHA256

    eeb88353239a33fd52663039a901fa8ebf9be8e55edc03baf31f61bc1c422f11

    SHA512

    fc2df45ff5575601e3f811d127109f7faf7f9252c533a292a0a55885cb774080c85a45427207027c1a168743f3d27a4caec3cc36b276df32f66870489bd81b4a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x3339809.exe

    Filesize

    390KB

    MD5

    12b1f74e9cec213fbd65e8d2df77f1f7

    SHA1

    311257b6c1c339ee87fbd6ff8739c05cfeb12f9c

    SHA256

    eeb88353239a33fd52663039a901fa8ebf9be8e55edc03baf31f61bc1c422f11

    SHA512

    fc2df45ff5575601e3f811d127109f7faf7f9252c533a292a0a55885cb774080c85a45427207027c1a168743f3d27a4caec3cc36b276df32f66870489bd81b4a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7754740.exe

    Filesize

    827KB

    MD5

    c4edcf6b06d02da88390147a95679b7c

    SHA1

    6bf3f35fd3b2eb13b1ea9177f9578a5f52479fde

    SHA256

    986ca927f12925740741e8508b3dcf117d6bb3570f4db657fb8df054b39bc7a0

    SHA512

    6ef2d30e16078c6c15fbdb587aa28bfd4fe42ae23c53bbffd6d90abdc8f233abf13d58389cbad802671b89dffba5daf2b56d3d468cbe810d90570f1c962e9a68

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7754740.exe

    Filesize

    827KB

    MD5

    c4edcf6b06d02da88390147a95679b7c

    SHA1

    6bf3f35fd3b2eb13b1ea9177f9578a5f52479fde

    SHA256

    986ca927f12925740741e8508b3dcf117d6bb3570f4db657fb8df054b39bc7a0

    SHA512

    6ef2d30e16078c6c15fbdb587aa28bfd4fe42ae23c53bbffd6d90abdc8f233abf13d58389cbad802671b89dffba5daf2b56d3d468cbe810d90570f1c962e9a68

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5435411.exe

    Filesize

    556KB

    MD5

    82bbfa1bdd8b5e3301fbccb27998061f

    SHA1

    0f62f11f8f5ede520759f95e57a315056d634101

    SHA256

    f3ea18f696e50e1c605b663f31939e2acc0c3a7d8aaf6c69135a447b45868f23

    SHA512

    34d0f1bea7440682ff776dbce9ca467bbcddb647625ebc20be45884057d9878155f45ca5b9466148c5f58bcd9a84a4424224a7ae15b86a34c072f65dd83f1375

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5435411.exe

    Filesize

    556KB

    MD5

    82bbfa1bdd8b5e3301fbccb27998061f

    SHA1

    0f62f11f8f5ede520759f95e57a315056d634101

    SHA256

    f3ea18f696e50e1c605b663f31939e2acc0c3a7d8aaf6c69135a447b45868f23

    SHA512

    34d0f1bea7440682ff776dbce9ca467bbcddb647625ebc20be45884057d9878155f45ca5b9466148c5f58bcd9a84a4424224a7ae15b86a34c072f65dd83f1375

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3339809.exe

    Filesize

    390KB

    MD5

    12b1f74e9cec213fbd65e8d2df77f1f7

    SHA1

    311257b6c1c339ee87fbd6ff8739c05cfeb12f9c

    SHA256

    eeb88353239a33fd52663039a901fa8ebf9be8e55edc03baf31f61bc1c422f11

    SHA512

    fc2df45ff5575601e3f811d127109f7faf7f9252c533a292a0a55885cb774080c85a45427207027c1a168743f3d27a4caec3cc36b276df32f66870489bd81b4a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x3339809.exe

    Filesize

    390KB

    MD5

    12b1f74e9cec213fbd65e8d2df77f1f7

    SHA1

    311257b6c1c339ee87fbd6ff8739c05cfeb12f9c

    SHA256

    eeb88353239a33fd52663039a901fa8ebf9be8e55edc03baf31f61bc1c422f11

    SHA512

    fc2df45ff5575601e3f811d127109f7faf7f9252c533a292a0a55885cb774080c85a45427207027c1a168743f3d27a4caec3cc36b276df32f66870489bd81b4a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8320300.exe

    Filesize

    364KB

    MD5

    2ae05cf48329bd1f7ccd75aa4c9b72f1

    SHA1

    de1568eb901fa76a74bcc0b28793449fd5cbbb42

    SHA256

    bce29f052e58f5fa2edb5462d9902729ddd0fbcb2d378e5d790dd2819ebb5c10

    SHA512

    235577d8e4a3f944c5a4ab69740980b3c398933a36f56c3ce89e5dde45ea689bd7a3ed5e45ea6784c89ad42d406bf540cbad3f581670949675dd7f55be67cda3

  • memory/2836-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2836-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2836-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2836-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2836-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2836-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2836-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2836-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2836-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2836-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB