Analysis
-
max time kernel
299s -
max time network
319s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
10-11-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe
Resource
win10-20231020-en
General
-
Target
40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe
-
Size
330KB
-
MD5
73337493b31c5c10d102c7d42153c864
-
SHA1
903d8ba2dab13ea55e0b6f13f607caff4df56aaa
-
SHA256
40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46
-
SHA512
7848c05fe05430d48556acc5c75ee5b2b33df29356e5f20e204fd69ae3b2fde3abb515220cb515b962ae533dea5de2f093af84d8c66f5daff6e865be58eba23e
-
SSDEEP
6144:KLy+bnr+fp0yN90QEE0ST8+kRAUXHx39ONZAQnJv8KW/4CMz5D+:9Mrny90pSTxymuQB8PAL+
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2120-16-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2120-17-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2120-18-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2120-20-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2120-22-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/2120-24-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
Executes dropped EXE 2 IoCs
pid Process 1088 4ty923ky.exe 2772 5Qt9WY4.exe -
Loads dropped DLL 6 IoCs
pid Process 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 1088 4ty923ky.exe 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 2772 5Qt9WY4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1088 set thread context of 2120 1088 4ty923ky.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2712 2120 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1088 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 28 PID 2000 wrote to memory of 1088 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 28 PID 2000 wrote to memory of 1088 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 28 PID 2000 wrote to memory of 1088 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 28 PID 2000 wrote to memory of 1088 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 28 PID 2000 wrote to memory of 1088 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 28 PID 2000 wrote to memory of 1088 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 28 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 1088 wrote to memory of 2120 1088 4ty923ky.exe 30 PID 2000 wrote to memory of 2772 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 31 PID 2000 wrote to memory of 2772 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 31 PID 2000 wrote to memory of 2772 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 31 PID 2000 wrote to memory of 2772 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 31 PID 2000 wrote to memory of 2772 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 31 PID 2000 wrote to memory of 2772 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 31 PID 2000 wrote to memory of 2772 2000 40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe 31 PID 2120 wrote to memory of 2712 2120 AppLaunch.exe 32 PID 2120 wrote to memory of 2712 2120 AppLaunch.exe 32 PID 2120 wrote to memory of 2712 2120 AppLaunch.exe 32 PID 2120 wrote to memory of 2712 2120 AppLaunch.exe 32 PID 2120 wrote to memory of 2712 2120 AppLaunch.exe 32 PID 2120 wrote to memory of 2712 2120 AppLaunch.exe 32 PID 2120 wrote to memory of 2712 2120 AppLaunch.exe 32 PID 2772 wrote to memory of 2916 2772 5Qt9WY4.exe 33 PID 2772 wrote to memory of 2916 2772 5Qt9WY4.exe 33 PID 2772 wrote to memory of 2916 2772 5Qt9WY4.exe 33 PID 2772 wrote to memory of 2916 2772 5Qt9WY4.exe 33 PID 2772 wrote to memory of 2916 2772 5Qt9WY4.exe 33 PID 2772 wrote to memory of 2916 2772 5Qt9WY4.exe 33 PID 2772 wrote to memory of 2916 2772 5Qt9WY4.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe"C:\Users\Admin\AppData\Local\Temp\40c83fd2fe671b3d0c79e15c6aea427042d50fe7ca29435a38feb0685e8d1b46.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4ty923ky.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 2684⤵
- Program crash
PID:2712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Qt9WY4.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\is64.bat" "3⤵PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5029cf82638b1154788b6282d98145bd2
SHA1eeb8c589b10cdd5a74c59003b39b241e4e1a76a6
SHA25658a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709
SHA512c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435
-
Filesize
300KB
MD5029cf82638b1154788b6282d98145bd2
SHA1eeb8c589b10cdd5a74c59003b39b241e4e1a76a6
SHA25658a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709
SHA512c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435
-
Filesize
300KB
MD5029cf82638b1154788b6282d98145bd2
SHA1eeb8c589b10cdd5a74c59003b39b241e4e1a76a6
SHA25658a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709
SHA512c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435
-
Filesize
73KB
MD5b3ec308b68f91a6a792a9b150cf7447e
SHA1c29903c1ccf07cb06147bee1990df0bf9c214561
SHA25650221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b
SHA5128f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f
-
Filesize
73KB
MD5b3ec308b68f91a6a792a9b150cf7447e
SHA1c29903c1ccf07cb06147bee1990df0bf9c214561
SHA25650221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b
SHA5128f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f
-
Filesize
73KB
MD5b3ec308b68f91a6a792a9b150cf7447e
SHA1c29903c1ccf07cb06147bee1990df0bf9c214561
SHA25650221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b
SHA5128f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f
-
Filesize
181B
MD5225edee1d46e0a80610db26b275d72fb
SHA1ce206abf11aaf19278b72f5021cc64b1b427b7e8
SHA256e1befb57d724c9dc760cf42d7e0609212b22faeb2dc0c3ffe2fbd7134ff69559
SHA5124f01a2a248a1322cb690b7395b818d2780e46f4884e59f1ab96125d642b6358eea97c7fad6023ef17209b218daa9c88d15ea2b92f124ecb8434c0c7b4a710504
-
Filesize
181B
MD5225edee1d46e0a80610db26b275d72fb
SHA1ce206abf11aaf19278b72f5021cc64b1b427b7e8
SHA256e1befb57d724c9dc760cf42d7e0609212b22faeb2dc0c3ffe2fbd7134ff69559
SHA5124f01a2a248a1322cb690b7395b818d2780e46f4884e59f1ab96125d642b6358eea97c7fad6023ef17209b218daa9c88d15ea2b92f124ecb8434c0c7b4a710504
-
Filesize
300KB
MD5029cf82638b1154788b6282d98145bd2
SHA1eeb8c589b10cdd5a74c59003b39b241e4e1a76a6
SHA25658a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709
SHA512c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435
-
Filesize
300KB
MD5029cf82638b1154788b6282d98145bd2
SHA1eeb8c589b10cdd5a74c59003b39b241e4e1a76a6
SHA25658a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709
SHA512c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435
-
Filesize
300KB
MD5029cf82638b1154788b6282d98145bd2
SHA1eeb8c589b10cdd5a74c59003b39b241e4e1a76a6
SHA25658a01049db4cd0c261a020d67cfbf650879435720ab9815f40372046316a4709
SHA512c768c11e940501e92785ad1989bc7905be585a3b3363ce4aa9ec7e20c1dce069185c68f2294a4b2c6e389bf9360ce68a2046b877d38aa3aa80853a15cd0a5435
-
Filesize
73KB
MD5b3ec308b68f91a6a792a9b150cf7447e
SHA1c29903c1ccf07cb06147bee1990df0bf9c214561
SHA25650221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b
SHA5128f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f
-
Filesize
73KB
MD5b3ec308b68f91a6a792a9b150cf7447e
SHA1c29903c1ccf07cb06147bee1990df0bf9c214561
SHA25650221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b
SHA5128f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f
-
Filesize
73KB
MD5b3ec308b68f91a6a792a9b150cf7447e
SHA1c29903c1ccf07cb06147bee1990df0bf9c214561
SHA25650221e85d5d46abd1682c85cdf175f0140521a3c3c90606136965c045a48490b
SHA5128f25ec293fda40ac2e57033c73918ebbd6d45d991dc30fa442f611934b36fc78c00b877240aba0c131d4a058e8ec9fb506f9d4ea892cd508a51880d2849b186f