Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2023 04:47

General

  • Target

    0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe

  • Size

    928KB

  • MD5

    e86e3225cbacf1340b9b8f894a653510

  • SHA1

    e951652fe627d615003be92c28360a1fb2f69bab

  • SHA256

    0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad

  • SHA512

    b1be99d54f011e30e323524956b7f9a4663d68deabb99eaeb54cf3f648b72954782cf7298ef6ad89db10ae94cb5fa78cbf38a39c26fa5ba1db6c6950b900ea3c

  • SSDEEP

    12288:BMrny905rxdMWUV/6GO8yvUKq/UuxEdUXYSDOi9rDhAUuIQPoEAjRae6zyTXuE:iy4U56G5UuxEdUXY+9rDhAzIo9ylR

Malware Config

Signatures

  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe
    "C:\Users\Admin\AppData\Local\Temp\0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6796756.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6796756.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4014442.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4014442.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8240295.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8240295.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2504
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2956
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 276
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6796756.exe

      Filesize

      826KB

      MD5

      b31e85f9f9a77fd4b808e6ce6b0cf9c3

      SHA1

      f746f5513362788d58a9e916e33df2b28ba0c173

      SHA256

      5094ee6cfc4fd0f47a91a0e36a1f7a4f2678b6d107ec010e15dd956f4110c75e

      SHA512

      b452e987419bd02d5dca828e0406f7d40b5b3fea89dbd1471a70a61fa4c1a59fb7d7ec5762469b8161b371663770a7f0ef8dad702d1bf4c16db8fa256e35fe55

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6796756.exe

      Filesize

      826KB

      MD5

      b31e85f9f9a77fd4b808e6ce6b0cf9c3

      SHA1

      f746f5513362788d58a9e916e33df2b28ba0c173

      SHA256

      5094ee6cfc4fd0f47a91a0e36a1f7a4f2678b6d107ec010e15dd956f4110c75e

      SHA512

      b452e987419bd02d5dca828e0406f7d40b5b3fea89dbd1471a70a61fa4c1a59fb7d7ec5762469b8161b371663770a7f0ef8dad702d1bf4c16db8fa256e35fe55

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4014442.exe

      Filesize

      556KB

      MD5

      ee2d5ab0c8e4cb51075308649b521df7

      SHA1

      5720be513f8b944464c80a8486abd6a0971b8fe1

      SHA256

      fec46ed603f2bcca18ba46485cb2a5d5175a0e7a69f217bf0549062fa05c1bbf

      SHA512

      486e20f37b0237428b5d25c82c2075a48c51d7be34b78641a71cb0b5728e792b50d478cb23dba34d5c88e7b05697c344fa2cf1e1a7095f01d9bb14f2c066b0c6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4014442.exe

      Filesize

      556KB

      MD5

      ee2d5ab0c8e4cb51075308649b521df7

      SHA1

      5720be513f8b944464c80a8486abd6a0971b8fe1

      SHA256

      fec46ed603f2bcca18ba46485cb2a5d5175a0e7a69f217bf0549062fa05c1bbf

      SHA512

      486e20f37b0237428b5d25c82c2075a48c51d7be34b78641a71cb0b5728e792b50d478cb23dba34d5c88e7b05697c344fa2cf1e1a7095f01d9bb14f2c066b0c6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8240295.exe

      Filesize

      390KB

      MD5

      2edfec9b922c03e66dc843caf2fa2bfa

      SHA1

      c64d441e7514024e3b78c7811f4807dc3ee1ef2a

      SHA256

      8784cc7467954f84aefde0b4fdae2235dd6d5ce255a9a355dcaeb25abf80ff07

      SHA512

      68ccd2d852b18e61c353c7bd974dfbea4c56143fa1c044b291c718b5886e4b67270514f77e0c06ae78e7101f377828a256f42cee92506b126568deb083610cea

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8240295.exe

      Filesize

      390KB

      MD5

      2edfec9b922c03e66dc843caf2fa2bfa

      SHA1

      c64d441e7514024e3b78c7811f4807dc3ee1ef2a

      SHA256

      8784cc7467954f84aefde0b4fdae2235dd6d5ce255a9a355dcaeb25abf80ff07

      SHA512

      68ccd2d852b18e61c353c7bd974dfbea4c56143fa1c044b291c718b5886e4b67270514f77e0c06ae78e7101f377828a256f42cee92506b126568deb083610cea

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x6796756.exe

      Filesize

      826KB

      MD5

      b31e85f9f9a77fd4b808e6ce6b0cf9c3

      SHA1

      f746f5513362788d58a9e916e33df2b28ba0c173

      SHA256

      5094ee6cfc4fd0f47a91a0e36a1f7a4f2678b6d107ec010e15dd956f4110c75e

      SHA512

      b452e987419bd02d5dca828e0406f7d40b5b3fea89dbd1471a70a61fa4c1a59fb7d7ec5762469b8161b371663770a7f0ef8dad702d1bf4c16db8fa256e35fe55

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x6796756.exe

      Filesize

      826KB

      MD5

      b31e85f9f9a77fd4b808e6ce6b0cf9c3

      SHA1

      f746f5513362788d58a9e916e33df2b28ba0c173

      SHA256

      5094ee6cfc4fd0f47a91a0e36a1f7a4f2678b6d107ec010e15dd956f4110c75e

      SHA512

      b452e987419bd02d5dca828e0406f7d40b5b3fea89dbd1471a70a61fa4c1a59fb7d7ec5762469b8161b371663770a7f0ef8dad702d1bf4c16db8fa256e35fe55

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4014442.exe

      Filesize

      556KB

      MD5

      ee2d5ab0c8e4cb51075308649b521df7

      SHA1

      5720be513f8b944464c80a8486abd6a0971b8fe1

      SHA256

      fec46ed603f2bcca18ba46485cb2a5d5175a0e7a69f217bf0549062fa05c1bbf

      SHA512

      486e20f37b0237428b5d25c82c2075a48c51d7be34b78641a71cb0b5728e792b50d478cb23dba34d5c88e7b05697c344fa2cf1e1a7095f01d9bb14f2c066b0c6

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4014442.exe

      Filesize

      556KB

      MD5

      ee2d5ab0c8e4cb51075308649b521df7

      SHA1

      5720be513f8b944464c80a8486abd6a0971b8fe1

      SHA256

      fec46ed603f2bcca18ba46485cb2a5d5175a0e7a69f217bf0549062fa05c1bbf

      SHA512

      486e20f37b0237428b5d25c82c2075a48c51d7be34b78641a71cb0b5728e792b50d478cb23dba34d5c88e7b05697c344fa2cf1e1a7095f01d9bb14f2c066b0c6

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8240295.exe

      Filesize

      390KB

      MD5

      2edfec9b922c03e66dc843caf2fa2bfa

      SHA1

      c64d441e7514024e3b78c7811f4807dc3ee1ef2a

      SHA256

      8784cc7467954f84aefde0b4fdae2235dd6d5ce255a9a355dcaeb25abf80ff07

      SHA512

      68ccd2d852b18e61c353c7bd974dfbea4c56143fa1c044b291c718b5886e4b67270514f77e0c06ae78e7101f377828a256f42cee92506b126568deb083610cea

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8240295.exe

      Filesize

      390KB

      MD5

      2edfec9b922c03e66dc843caf2fa2bfa

      SHA1

      c64d441e7514024e3b78c7811f4807dc3ee1ef2a

      SHA256

      8784cc7467954f84aefde0b4fdae2235dd6d5ce255a9a355dcaeb25abf80ff07

      SHA512

      68ccd2d852b18e61c353c7bd974dfbea4c56143fa1c044b291c718b5886e4b67270514f77e0c06ae78e7101f377828a256f42cee92506b126568deb083610cea

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe

      Filesize

      356KB

      MD5

      f706f76ef00ab183d88d4a073037c016

      SHA1

      acb5f024d70cc21913b34f7634c70fd6c19b584c

      SHA256

      06b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461

      SHA512

      bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16

    • memory/2956-45-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-53-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-56-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-55-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2956-58-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-60-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-61-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-49-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-51-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-47-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-65-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2956-43-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB