Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
13-11-2023 17:21
Static task
static1
Behavioral task
behavioral1
Sample
2eeb5813bcefb62b20b1431ef85d44be708b89beeaafbff2c4b36e2913afcb4e.exe
Resource
win10-20231023-en
General
-
Target
2eeb5813bcefb62b20b1431ef85d44be708b89beeaafbff2c4b36e2913afcb4e.exe
-
Size
1.3MB
-
MD5
73d5dd5ced2905ef76857df18511fa9f
-
SHA1
984f3a1e5cedc0c26acdca22d62e9ce68acb5bdb
-
SHA256
2eeb5813bcefb62b20b1431ef85d44be708b89beeaafbff2c4b36e2913afcb4e
-
SHA512
84103291f9680b11a4ea57cdda8a23d6519eb0b0642a979543d005c19b1c577a1cd91df45f6dd72efbbf8d71940230423e9759c78cffb674027c994bab013597
-
SSDEEP
24576:HywMMxgDQw3Aa9mSPdNiqeE6p3doUlvtmgScQGJY/hmlewhBLuI0xXxC8/lzO:SwScw3ASHFNiqG3C+tmgfHKhWT0xXxCa
Malware Config
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1436-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1436-26-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1436-27-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/1436-29-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
Executes dropped EXE 4 IoCs
pid Process 4256 SQ2si95.exe 4280 Co9YO11.exe 2132 11ae3121.exe 4928 12Ro178.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Co9YO11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2eeb5813bcefb62b20b1431ef85d44be708b89beeaafbff2c4b36e2913afcb4e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" SQ2si95.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2132 set thread context of 1436 2132 11ae3121.exe 75 -
Program crash 1 IoCs
pid pid_target Process procid_target 688 1436 WerFault.exe 75 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3888 wrote to memory of 4256 3888 2eeb5813bcefb62b20b1431ef85d44be708b89beeaafbff2c4b36e2913afcb4e.exe 71 PID 3888 wrote to memory of 4256 3888 2eeb5813bcefb62b20b1431ef85d44be708b89beeaafbff2c4b36e2913afcb4e.exe 71 PID 3888 wrote to memory of 4256 3888 2eeb5813bcefb62b20b1431ef85d44be708b89beeaafbff2c4b36e2913afcb4e.exe 71 PID 4256 wrote to memory of 4280 4256 SQ2si95.exe 72 PID 4256 wrote to memory of 4280 4256 SQ2si95.exe 72 PID 4256 wrote to memory of 4280 4256 SQ2si95.exe 72 PID 4280 wrote to memory of 2132 4280 Co9YO11.exe 73 PID 4280 wrote to memory of 2132 4280 Co9YO11.exe 73 PID 4280 wrote to memory of 2132 4280 Co9YO11.exe 73 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 2132 wrote to memory of 1436 2132 11ae3121.exe 75 PID 4280 wrote to memory of 4928 4280 Co9YO11.exe 76 PID 4280 wrote to memory of 4928 4280 Co9YO11.exe 76 PID 4280 wrote to memory of 4928 4280 Co9YO11.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eeb5813bcefb62b20b1431ef85d44be708b89beeaafbff2c4b36e2913afcb4e.exe"C:\Users\Admin\AppData\Local\Temp\2eeb5813bcefb62b20b1431ef85d44be708b89beeaafbff2c4b36e2913afcb4e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SQ2si95.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SQ2si95.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Co9YO11.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Co9YO11.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11ae3121.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11ae3121.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 5686⤵
- Program crash
PID:688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12Ro178.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12Ro178.exe4⤵
- Executes dropped EXE
PID:4928
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
880KB
MD5acb68b7a3b092995eb12227ed0f83229
SHA18684bbfc6105a5c2488b55a264e0892a79556447
SHA25661e8be173392345b20263b5943f4a1b4cc992e4c1291484128d3a3afcf1f59a0
SHA5120fc46df3d1781b2f6d493b89bbf318f33cd4bb8810d9465233ccc96d8621a773901d245b1c04a36d5e0baf9c916d9921abffff0973f0c9692a4325d5e23c46c0
-
Filesize
880KB
MD5acb68b7a3b092995eb12227ed0f83229
SHA18684bbfc6105a5c2488b55a264e0892a79556447
SHA25661e8be173392345b20263b5943f4a1b4cc992e4c1291484128d3a3afcf1f59a0
SHA5120fc46df3d1781b2f6d493b89bbf318f33cd4bb8810d9465233ccc96d8621a773901d245b1c04a36d5e0baf9c916d9921abffff0973f0c9692a4325d5e23c46c0
-
Filesize
419KB
MD5b2cc7177962605348c378a59f8e07ab0
SHA18e4629b44e0fead30bdcbb058a4ddb063f73e158
SHA25613e8bcc1746a867d5fffce461395b52430a9294ecc0b29090330165cc826dd5b
SHA512bd61ca2cff2b1ca5d692739c39ae9fae96c27309584ecd19654ee47b2e9fd77e35f6da27900b55136261c0600d96420b2a04ccf15de81fd2c3fe4151238346ab
-
Filesize
419KB
MD5b2cc7177962605348c378a59f8e07ab0
SHA18e4629b44e0fead30bdcbb058a4ddb063f73e158
SHA25613e8bcc1746a867d5fffce461395b52430a9294ecc0b29090330165cc826dd5b
SHA512bd61ca2cff2b1ca5d692739c39ae9fae96c27309584ecd19654ee47b2e9fd77e35f6da27900b55136261c0600d96420b2a04ccf15de81fd2c3fe4151238346ab
-
Filesize
369KB
MD5a2b145121c7a9e43905ada670016023c
SHA16e362230ff21eb2c4a602b94970151b5650c06f2
SHA256d07ce86fb03cb100724b7ead3cfc052c977a212d88af6cb60e9841315635ad7f
SHA512e54bd034dabdf6fac510b8f89fb8389e8d83c078c0e5dc6b12882d7751917abbb1dd4566a4e48ad7e76e50546b3f18dc0ff58fb219a99c8b80b2aadeb63c415b
-
Filesize
369KB
MD5a2b145121c7a9e43905ada670016023c
SHA16e362230ff21eb2c4a602b94970151b5650c06f2
SHA256d07ce86fb03cb100724b7ead3cfc052c977a212d88af6cb60e9841315635ad7f
SHA512e54bd034dabdf6fac510b8f89fb8389e8d83c078c0e5dc6b12882d7751917abbb1dd4566a4e48ad7e76e50546b3f18dc0ff58fb219a99c8b80b2aadeb63c415b
-
Filesize
408KB
MD5a14c4b3ff85a1af54541847bd2bbfb7b
SHA19d7b1190a52aba8c143b1756f712a0d8a003366d
SHA256eb0f69216d07a8e50051bc34af15e4a6337bd90fb9d68e3b3a4bb779b7d9801b
SHA5121f1daa0af85c5fcfe5587e4e75009cc187d2ecccc74cc080a5edf94dc056b5e207ef69773072553e2b3f2ffecc082ad325197f4a75b1c3e13d1e493031056acd
-
Filesize
408KB
MD5a14c4b3ff85a1af54541847bd2bbfb7b
SHA19d7b1190a52aba8c143b1756f712a0d8a003366d
SHA256eb0f69216d07a8e50051bc34af15e4a6337bd90fb9d68e3b3a4bb779b7d9801b
SHA5121f1daa0af85c5fcfe5587e4e75009cc187d2ecccc74cc080a5edf94dc056b5e207ef69773072553e2b3f2ffecc082ad325197f4a75b1c3e13d1e493031056acd