Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 06:39
Static task
static1
Behavioral task
behavioral1
Sample
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe
Resource
win10v2004-20230915-en
General
-
Target
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe
-
Size
1.0MB
-
MD5
4974f00ab78a24cc927bebd02e889e1c
-
SHA1
aef336f55e3a99c2a9f06fad2ce86917a325a187
-
SHA256
b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f
-
SHA512
79ec05228e97ab6b8cb7ef66c0c70ac2869f81d29128b6b6312d870006728841c27db98655f40252bf624a1ff65b54b6f4e5a9cfb674911af4c7e8f2703bffd7
-
SSDEEP
24576:uyt1Qe5Ee8zTEEWPpLv/hMZ6auCL0hXJkMN1u:9t1l58zVENpmpuCL0H
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2988 x8047049.exe 2696 x6215517.exe 796 x2524502.exe 2508 g2580705.exe -
Loads dropped DLL 13 IoCs
pid Process 1424 b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe 2988 x8047049.exe 2988 x8047049.exe 2696 x6215517.exe 2696 x6215517.exe 796 x2524502.exe 796 x2524502.exe 796 x2524502.exe 2508 g2580705.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe 2868 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8047049.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6215517.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2524502.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2508 set thread context of 1944 2508 g2580705.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 2868 2508 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2988 1424 b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe 28 PID 1424 wrote to memory of 2988 1424 b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe 28 PID 1424 wrote to memory of 2988 1424 b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe 28 PID 1424 wrote to memory of 2988 1424 b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe 28 PID 1424 wrote to memory of 2988 1424 b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe 28 PID 1424 wrote to memory of 2988 1424 b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe 28 PID 1424 wrote to memory of 2988 1424 b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe 28 PID 2988 wrote to memory of 2696 2988 x8047049.exe 30 PID 2988 wrote to memory of 2696 2988 x8047049.exe 30 PID 2988 wrote to memory of 2696 2988 x8047049.exe 30 PID 2988 wrote to memory of 2696 2988 x8047049.exe 30 PID 2988 wrote to memory of 2696 2988 x8047049.exe 30 PID 2988 wrote to memory of 2696 2988 x8047049.exe 30 PID 2988 wrote to memory of 2696 2988 x8047049.exe 30 PID 2696 wrote to memory of 796 2696 x6215517.exe 31 PID 2696 wrote to memory of 796 2696 x6215517.exe 31 PID 2696 wrote to memory of 796 2696 x6215517.exe 31 PID 2696 wrote to memory of 796 2696 x6215517.exe 31 PID 2696 wrote to memory of 796 2696 x6215517.exe 31 PID 2696 wrote to memory of 796 2696 x6215517.exe 31 PID 2696 wrote to memory of 796 2696 x6215517.exe 31 PID 796 wrote to memory of 2508 796 x2524502.exe 32 PID 796 wrote to memory of 2508 796 x2524502.exe 32 PID 796 wrote to memory of 2508 796 x2524502.exe 32 PID 796 wrote to memory of 2508 796 x2524502.exe 32 PID 796 wrote to memory of 2508 796 x2524502.exe 32 PID 796 wrote to memory of 2508 796 x2524502.exe 32 PID 796 wrote to memory of 2508 796 x2524502.exe 32 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 1944 2508 g2580705.exe 34 PID 2508 wrote to memory of 2868 2508 g2580705.exe 35 PID 2508 wrote to memory of 2868 2508 g2580705.exe 35 PID 2508 wrote to memory of 2868 2508 g2580705.exe 35 PID 2508 wrote to memory of 2868 2508 g2580705.exe 35 PID 2508 wrote to memory of 2868 2508 g2580705.exe 35 PID 2508 wrote to memory of 2868 2508 g2580705.exe 35 PID 2508 wrote to memory of 2868 2508 g2580705.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe"C:\Users\Admin\AppData\Local\Temp\b0cd60e59830e0d9e86ce5c9a382c628fd2c2e68c7323e82b795afd0678b137f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8047049.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8047049.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6215517.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6215517.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2524502.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2524502.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2580705.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2580705.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2868
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD56e1d2fb9072a4f6af5fd29a06703862d
SHA19c116fa6e59672a5de23bf3734a5868a8d1d670f
SHA2567eb80e9079c4a85fb44635e2fa6897aa5de876ab26c73b53b1f0f6591c256d45
SHA512985e2f792170912732ee8be7477a3ec9bb13ac74790f2b7effb4ff9b641c22e81afcfd9c2b90e50f1e08717333aa124df7a478fcd7d9f25a454817ec72766e15
-
Filesize
932KB
MD56e1d2fb9072a4f6af5fd29a06703862d
SHA19c116fa6e59672a5de23bf3734a5868a8d1d670f
SHA2567eb80e9079c4a85fb44635e2fa6897aa5de876ab26c73b53b1f0f6591c256d45
SHA512985e2f792170912732ee8be7477a3ec9bb13ac74790f2b7effb4ff9b641c22e81afcfd9c2b90e50f1e08717333aa124df7a478fcd7d9f25a454817ec72766e15
-
Filesize
627KB
MD5d84b87f7de3e8421776af69d01b528af
SHA162a033f9a0fa97af6548b6f403150d8f043028ea
SHA25618d01fe0d21882c55efc9d1f7f0c5bdb1dd35853cdd9de16fcd56c920167762e
SHA512556bd199c10e53bcb5cd4cfcaddf43db494d628d61d73c0607dfdb174a5f080b273817d2055d1e0a126acc4d22818d32848d7d730de010f87d1652e0d0b4b30a
-
Filesize
627KB
MD5d84b87f7de3e8421776af69d01b528af
SHA162a033f9a0fa97af6548b6f403150d8f043028ea
SHA25618d01fe0d21882c55efc9d1f7f0c5bdb1dd35853cdd9de16fcd56c920167762e
SHA512556bd199c10e53bcb5cd4cfcaddf43db494d628d61d73c0607dfdb174a5f080b273817d2055d1e0a126acc4d22818d32848d7d730de010f87d1652e0d0b4b30a
-
Filesize
442KB
MD58d7f8f4d28c5c49b773ed67838662f61
SHA1b9ee8d90e3f697bd2120f94f6a81d646955e24ea
SHA2561b840b188ee3cee39c4d0c15726af22f14f604b7c48c9c1748b277ef22810193
SHA512a123f3fa88d9d661479499af589b2b6a7d0afb403c12cf83a1882692ac9d6173b2ced70c095556d256d38552e599d652d4ef68bf79c4ee18fd4213a99367a6ac
-
Filesize
442KB
MD58d7f8f4d28c5c49b773ed67838662f61
SHA1b9ee8d90e3f697bd2120f94f6a81d646955e24ea
SHA2561b840b188ee3cee39c4d0c15726af22f14f604b7c48c9c1748b277ef22810193
SHA512a123f3fa88d9d661479499af589b2b6a7d0afb403c12cf83a1882692ac9d6173b2ced70c095556d256d38552e599d652d4ef68bf79c4ee18fd4213a99367a6ac
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9
-
Filesize
932KB
MD56e1d2fb9072a4f6af5fd29a06703862d
SHA19c116fa6e59672a5de23bf3734a5868a8d1d670f
SHA2567eb80e9079c4a85fb44635e2fa6897aa5de876ab26c73b53b1f0f6591c256d45
SHA512985e2f792170912732ee8be7477a3ec9bb13ac74790f2b7effb4ff9b641c22e81afcfd9c2b90e50f1e08717333aa124df7a478fcd7d9f25a454817ec72766e15
-
Filesize
932KB
MD56e1d2fb9072a4f6af5fd29a06703862d
SHA19c116fa6e59672a5de23bf3734a5868a8d1d670f
SHA2567eb80e9079c4a85fb44635e2fa6897aa5de876ab26c73b53b1f0f6591c256d45
SHA512985e2f792170912732ee8be7477a3ec9bb13ac74790f2b7effb4ff9b641c22e81afcfd9c2b90e50f1e08717333aa124df7a478fcd7d9f25a454817ec72766e15
-
Filesize
627KB
MD5d84b87f7de3e8421776af69d01b528af
SHA162a033f9a0fa97af6548b6f403150d8f043028ea
SHA25618d01fe0d21882c55efc9d1f7f0c5bdb1dd35853cdd9de16fcd56c920167762e
SHA512556bd199c10e53bcb5cd4cfcaddf43db494d628d61d73c0607dfdb174a5f080b273817d2055d1e0a126acc4d22818d32848d7d730de010f87d1652e0d0b4b30a
-
Filesize
627KB
MD5d84b87f7de3e8421776af69d01b528af
SHA162a033f9a0fa97af6548b6f403150d8f043028ea
SHA25618d01fe0d21882c55efc9d1f7f0c5bdb1dd35853cdd9de16fcd56c920167762e
SHA512556bd199c10e53bcb5cd4cfcaddf43db494d628d61d73c0607dfdb174a5f080b273817d2055d1e0a126acc4d22818d32848d7d730de010f87d1652e0d0b4b30a
-
Filesize
442KB
MD58d7f8f4d28c5c49b773ed67838662f61
SHA1b9ee8d90e3f697bd2120f94f6a81d646955e24ea
SHA2561b840b188ee3cee39c4d0c15726af22f14f604b7c48c9c1748b277ef22810193
SHA512a123f3fa88d9d661479499af589b2b6a7d0afb403c12cf83a1882692ac9d6173b2ced70c095556d256d38552e599d652d4ef68bf79c4ee18fd4213a99367a6ac
-
Filesize
442KB
MD58d7f8f4d28c5c49b773ed67838662f61
SHA1b9ee8d90e3f697bd2120f94f6a81d646955e24ea
SHA2561b840b188ee3cee39c4d0c15726af22f14f604b7c48c9c1748b277ef22810193
SHA512a123f3fa88d9d661479499af589b2b6a7d0afb403c12cf83a1882692ac9d6173b2ced70c095556d256d38552e599d652d4ef68bf79c4ee18fd4213a99367a6ac
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9
-
Filesize
700KB
MD509d46306e95405d79b84d7f23a3bfc6b
SHA1b41e9d2a3fb36a5c5651dbaabe05a49669a8614e
SHA2563868c076437d8d022069fbbb190fc3aebca6cac97ea0b254c8d2ed8c35a1023e
SHA512623b2f2134855a976c02d312b23fe40e61166aad88ae00d494d0b74d1da8d9b80be6ca6765771cd3ce226af4d4cf85c0774345d6b4a731800a248e946c4307f9