Resubmissions

05-04-2024 07:57

240405-js9mjaeh5y 10

10-11-2023 04:48

231110-fe873ada44 10

Analysis

  • max time kernel
    299s
  • max time network
    319s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2023 04:48

General

  • Target

    40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe

  • Size

    330KB

  • MD5

    73337493b31c5c10d102c7d42153c864

  • SHA1

    903d8ba2dab13ea55e0b6f13f607caff4df56aaa

  • SHA256

    40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46

  • SHA512

    7848c05fe05430d48556acc5c75ee5b2b33df29356e5f20e204fd69ae3b2fde3abb515220cb515b962ae533dea5de2f093af84d8c66f5daff6e865be58eba23e

  • SSDEEP

    6144:KLy+bnr+fp0yN90QEE0ST8+kRAUXHx39ONZAQnJv8KW/4CMz5D+:9Mrny90pSTxymuQB8PAL+

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe
    "C:\Users\Admin\AppData\Local\Temp\40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 268
          4⤵
          • Program crash
          PID:2712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\is64.bat" "
        3⤵
          PID:2916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exe

      Filesize

      300KB

      MD5

      029cf82638b1154788b6282d98145bd2

      SHA1

      eeb8c589b10cdd5a74c59003b39b241e4e1a76a6

      SHA256

      58a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709

      SHA512

      c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exe

      Filesize

      300KB

      MD5

      029cf82638b1154788b6282d98145bd2

      SHA1

      eeb8c589b10cdd5a74c59003b39b241e4e1a76a6

      SHA256

      58a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709

      SHA512

      c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exe

      Filesize

      300KB

      MD5

      029cf82638b1154788b6282d98145bd2

      SHA1

      eeb8c589b10cdd5a74c59003b39b241e4e1a76a6

      SHA256

      58a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709

      SHA512

      c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exe

      Filesize

      73KB

      MD5

      b3ec308b68f91a6a792a9b150cf7447e

      SHA1

      c29903c1ccf07cb06147bee1990df0bf9c214561

      SHA256

      50221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b

      SHA512

      8f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exe

      Filesize

      73KB

      MD5

      b3ec308b68f91a6a792a9b150cf7447e

      SHA1

      c29903c1ccf07cb06147bee1990df0bf9c214561

      SHA256

      50221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b

      SHA512

      8f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exe

      Filesize

      73KB

      MD5

      b3ec308b68f91a6a792a9b150cf7447e

      SHA1

      c29903c1ccf07cb06147bee1990df0bf9c214561

      SHA256

      50221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b

      SHA512

      8f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f

    • C:\Users\Admin\AppData\Local\Temp\is64.bat

      Filesize

      181B

      MD5

      225edee1d46e0a80610db26b275d72fb

      SHA1

      ce206abf11aaf19278b72f5021cc64b1b427b7e8

      SHA256

      e1befb57d724c9dc760cf42d7e0609212b22faeb2dc0c3ffe2fbd7134ff69559

      SHA512

      4f01a2a248a1322cb690b7395b818d2780e46f4884e59f1ab96125d642b6358eea97c7fad6023ef17209b218daa9c88d15ea2b92f124ecb8434c0c7b4a710504

    • C:\Users\Admin\AppData\Local\Temp\is64.bat

      Filesize

      181B

      MD5

      225edee1d46e0a80610db26b275d72fb

      SHA1

      ce206abf11aaf19278b72f5021cc64b1b427b7e8

      SHA256

      e1befb57d724c9dc760cf42d7e0609212b22faeb2dc0c3ffe2fbd7134ff69559

      SHA512

      4f01a2a248a1322cb690b7395b818d2780e46f4884e59f1ab96125d642b6358eea97c7fad6023ef17209b218daa9c88d15ea2b92f124ecb8434c0c7b4a710504

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exe

      Filesize

      300KB

      MD5

      029cf82638b1154788b6282d98145bd2

      SHA1

      eeb8c589b10cdd5a74c59003b39b241e4e1a76a6

      SHA256

      58a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709

      SHA512

      c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exe

      Filesize

      300KB

      MD5

      029cf82638b1154788b6282d98145bd2

      SHA1

      eeb8c589b10cdd5a74c59003b39b241e4e1a76a6

      SHA256

      58a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709

      SHA512

      c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exe

      Filesize

      300KB

      MD5

      029cf82638b1154788b6282d98145bd2

      SHA1

      eeb8c589b10cdd5a74c59003b39b241e4e1a76a6

      SHA256

      58a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709

      SHA512

      c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exe

      Filesize

      73KB

      MD5

      b3ec308b68f91a6a792a9b150cf7447e

      SHA1

      c29903c1ccf07cb06147bee1990df0bf9c214561

      SHA256

      50221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b

      SHA512

      8f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exe

      Filesize

      73KB

      MD5

      b3ec308b68f91a6a792a9b150cf7447e

      SHA1

      c29903c1ccf07cb06147bee1990df0bf9c214561

      SHA256

      50221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b

      SHA512

      8f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exe

      Filesize

      73KB

      MD5

      b3ec308b68f91a6a792a9b150cf7447e

      SHA1

      c29903c1ccf07cb06147bee1990df0bf9c214561

      SHA256

      50221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b

      SHA512

      8f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f

    • memory/2120-13-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2120-24-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2120-22-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2120-20-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2120-19-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2120-18-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2120-17-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2120-16-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2120-15-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2120-14-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB