Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe
Resource
win10v2004-20230915-en
General
-
Target
72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe
-
Size
929KB
-
MD5
b443b37cd169a45b9a88962d5634d522
-
SHA1
d6902fedf9c4e3c7c634ad60c5f6208df62742c5
-
SHA256
72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf
-
SHA512
5cb45adf45f9b2f73a34a531ed1cb4710c40f53834c347aebf4fca686f1795d3ae280b23186a308bf1d76fe9c4fc5af15d0eaa4e6adbc4ac212ecc9c0f21998a
-
SSDEEP
24576:pyfrpBL7pDqMGnzpKP9RPPdlaJ6SZhPeBLjPUDmZBBsIpc:czXt5Gn8PTPPduZpeFBBT
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2252-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2252-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2252-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2252-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2252-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2252-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2428 x2144494.exe 2228 x4097857.exe 2676 x9688147.exe 2712 g7953764.exe -
Loads dropped DLL 13 IoCs
pid Process 1716 72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe 2428 x2144494.exe 2428 x2144494.exe 2228 x4097857.exe 2228 x4097857.exe 2676 x9688147.exe 2676 x9688147.exe 2676 x9688147.exe 2712 g7953764.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe 2896 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9688147.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2144494.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4097857.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2712 set thread context of 2252 2712 g7953764.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2896 2712 WerFault.exe 31 2112 2252 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2428 1716 72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe 28 PID 1716 wrote to memory of 2428 1716 72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe 28 PID 1716 wrote to memory of 2428 1716 72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe 28 PID 1716 wrote to memory of 2428 1716 72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe 28 PID 1716 wrote to memory of 2428 1716 72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe 28 PID 1716 wrote to memory of 2428 1716 72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe 28 PID 1716 wrote to memory of 2428 1716 72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe 28 PID 2428 wrote to memory of 2228 2428 x2144494.exe 29 PID 2428 wrote to memory of 2228 2428 x2144494.exe 29 PID 2428 wrote to memory of 2228 2428 x2144494.exe 29 PID 2428 wrote to memory of 2228 2428 x2144494.exe 29 PID 2428 wrote to memory of 2228 2428 x2144494.exe 29 PID 2428 wrote to memory of 2228 2428 x2144494.exe 29 PID 2428 wrote to memory of 2228 2428 x2144494.exe 29 PID 2228 wrote to memory of 2676 2228 x4097857.exe 30 PID 2228 wrote to memory of 2676 2228 x4097857.exe 30 PID 2228 wrote to memory of 2676 2228 x4097857.exe 30 PID 2228 wrote to memory of 2676 2228 x4097857.exe 30 PID 2228 wrote to memory of 2676 2228 x4097857.exe 30 PID 2228 wrote to memory of 2676 2228 x4097857.exe 30 PID 2228 wrote to memory of 2676 2228 x4097857.exe 30 PID 2676 wrote to memory of 2712 2676 x9688147.exe 31 PID 2676 wrote to memory of 2712 2676 x9688147.exe 31 PID 2676 wrote to memory of 2712 2676 x9688147.exe 31 PID 2676 wrote to memory of 2712 2676 x9688147.exe 31 PID 2676 wrote to memory of 2712 2676 x9688147.exe 31 PID 2676 wrote to memory of 2712 2676 x9688147.exe 31 PID 2676 wrote to memory of 2712 2676 x9688147.exe 31 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2252 2712 g7953764.exe 32 PID 2712 wrote to memory of 2896 2712 g7953764.exe 33 PID 2712 wrote to memory of 2896 2712 g7953764.exe 33 PID 2712 wrote to memory of 2896 2712 g7953764.exe 33 PID 2712 wrote to memory of 2896 2712 g7953764.exe 33 PID 2712 wrote to memory of 2896 2712 g7953764.exe 33 PID 2712 wrote to memory of 2896 2712 g7953764.exe 33 PID 2712 wrote to memory of 2896 2712 g7953764.exe 33 PID 2252 wrote to memory of 2112 2252 AppLaunch.exe 34 PID 2252 wrote to memory of 2112 2252 AppLaunch.exe 34 PID 2252 wrote to memory of 2112 2252 AppLaunch.exe 34 PID 2252 wrote to memory of 2112 2252 AppLaunch.exe 34 PID 2252 wrote to memory of 2112 2252 AppLaunch.exe 34 PID 2252 wrote to memory of 2112 2252 AppLaunch.exe 34 PID 2252 wrote to memory of 2112 2252 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe"C:\Users\Admin\AppData\Local\Temp\72ac41e28f827e4671e5eae4cf41870d128a5ebbd19dab04afee72eae5f769bf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2144494.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2144494.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4097857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4097857.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9688147.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9688147.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7953764.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7953764.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 2687⤵
- Program crash
PID:2112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2896
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5c6477bafe4a9f608333387108eef3eae
SHA13a3527777266ab725256c9f8f7e642dd890adf1c
SHA256e8448c1c39d53897abd328d1b1f1ced9997113f92ff1d8e848d8127b26b7dd16
SHA5120aad4306670bef5074068c0fa367b743ed23a96657e8720a6c552460f5e3486d455e6db4775f5e485a6e96d7194d34b3e3f68fbe0c798179f476d982e59e137a
-
Filesize
827KB
MD5c6477bafe4a9f608333387108eef3eae
SHA13a3527777266ab725256c9f8f7e642dd890adf1c
SHA256e8448c1c39d53897abd328d1b1f1ced9997113f92ff1d8e848d8127b26b7dd16
SHA5120aad4306670bef5074068c0fa367b743ed23a96657e8720a6c552460f5e3486d455e6db4775f5e485a6e96d7194d34b3e3f68fbe0c798179f476d982e59e137a
-
Filesize
555KB
MD5402b21cee374545c11ea5dd9f96a6d79
SHA12df0d15df1562121c6f0a611866226460422029d
SHA256f9b545f42bdaa1d08a5f3bc11031f70e7f6870db50013ec9fcb91c99f88efaf4
SHA5122c0a52f8ec96a31857728709a970f0987225ea6c6f1efc6ed7f5f4d5927cd3cdc7f07daeeebecc6823141ee74fc675ed7a51b9dbf83acb5e79026342a8b7b341
-
Filesize
555KB
MD5402b21cee374545c11ea5dd9f96a6d79
SHA12df0d15df1562121c6f0a611866226460422029d
SHA256f9b545f42bdaa1d08a5f3bc11031f70e7f6870db50013ec9fcb91c99f88efaf4
SHA5122c0a52f8ec96a31857728709a970f0987225ea6c6f1efc6ed7f5f4d5927cd3cdc7f07daeeebecc6823141ee74fc675ed7a51b9dbf83acb5e79026342a8b7b341
-
Filesize
390KB
MD5bab08590a2f28a41b71b47784e466faa
SHA1911bdfebf746dc1383d5a876fc881b964e3bf8a6
SHA25681995deab6e21df618a52172ebf83331c7ae2439b43b311cdecadbb7992a2d93
SHA512eee63b99894d976f51817fd0d504c6b8682b1b787fe82f746c7f5c4e276212a7e9bf96dc4298d40fb51e4449cd754e23185e4f9cd62d1aaa9170b0676a79873f
-
Filesize
390KB
MD5bab08590a2f28a41b71b47784e466faa
SHA1911bdfebf746dc1383d5a876fc881b964e3bf8a6
SHA25681995deab6e21df618a52172ebf83331c7ae2439b43b311cdecadbb7992a2d93
SHA512eee63b99894d976f51817fd0d504c6b8682b1b787fe82f746c7f5c4e276212a7e9bf96dc4298d40fb51e4449cd754e23185e4f9cd62d1aaa9170b0676a79873f
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b
-
Filesize
827KB
MD5c6477bafe4a9f608333387108eef3eae
SHA13a3527777266ab725256c9f8f7e642dd890adf1c
SHA256e8448c1c39d53897abd328d1b1f1ced9997113f92ff1d8e848d8127b26b7dd16
SHA5120aad4306670bef5074068c0fa367b743ed23a96657e8720a6c552460f5e3486d455e6db4775f5e485a6e96d7194d34b3e3f68fbe0c798179f476d982e59e137a
-
Filesize
827KB
MD5c6477bafe4a9f608333387108eef3eae
SHA13a3527777266ab725256c9f8f7e642dd890adf1c
SHA256e8448c1c39d53897abd328d1b1f1ced9997113f92ff1d8e848d8127b26b7dd16
SHA5120aad4306670bef5074068c0fa367b743ed23a96657e8720a6c552460f5e3486d455e6db4775f5e485a6e96d7194d34b3e3f68fbe0c798179f476d982e59e137a
-
Filesize
555KB
MD5402b21cee374545c11ea5dd9f96a6d79
SHA12df0d15df1562121c6f0a611866226460422029d
SHA256f9b545f42bdaa1d08a5f3bc11031f70e7f6870db50013ec9fcb91c99f88efaf4
SHA5122c0a52f8ec96a31857728709a970f0987225ea6c6f1efc6ed7f5f4d5927cd3cdc7f07daeeebecc6823141ee74fc675ed7a51b9dbf83acb5e79026342a8b7b341
-
Filesize
555KB
MD5402b21cee374545c11ea5dd9f96a6d79
SHA12df0d15df1562121c6f0a611866226460422029d
SHA256f9b545f42bdaa1d08a5f3bc11031f70e7f6870db50013ec9fcb91c99f88efaf4
SHA5122c0a52f8ec96a31857728709a970f0987225ea6c6f1efc6ed7f5f4d5927cd3cdc7f07daeeebecc6823141ee74fc675ed7a51b9dbf83acb5e79026342a8b7b341
-
Filesize
390KB
MD5bab08590a2f28a41b71b47784e466faa
SHA1911bdfebf746dc1383d5a876fc881b964e3bf8a6
SHA25681995deab6e21df618a52172ebf83331c7ae2439b43b311cdecadbb7992a2d93
SHA512eee63b99894d976f51817fd0d504c6b8682b1b787fe82f746c7f5c4e276212a7e9bf96dc4298d40fb51e4449cd754e23185e4f9cd62d1aaa9170b0676a79873f
-
Filesize
390KB
MD5bab08590a2f28a41b71b47784e466faa
SHA1911bdfebf746dc1383d5a876fc881b964e3bf8a6
SHA25681995deab6e21df618a52172ebf83331c7ae2439b43b311cdecadbb7992a2d93
SHA512eee63b99894d976f51817fd0d504c6b8682b1b787fe82f746c7f5c4e276212a7e9bf96dc4298d40fb51e4449cd754e23185e4f9cd62d1aaa9170b0676a79873f
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b
-
Filesize
364KB
MD51b38a59a659a2677aaf6345f74f1597f
SHA1288bb00164d7ba1288efbada2db8ce9120f773fa
SHA2560bb9042073f5b091793924b31bf54e07cc30b4ceb38375a6ce4a8d8989f4e805
SHA5124b78a50033a8ee974a4d6cd1624d9ce67b552a61067555f9f73b6668b5f0308e255bd83625c6dfc3d115f1b98347e6b9f0504ea06ce9975c5344d978a262a90b