Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2023, 17:20

General

  • Target

    77de4f32ab13cbadea92a7e63f98aff55d4b7a01d8fc1322a2c80ca2ec11b72d_JC.exe

  • Size

    1.7MB

  • MD5

    900b9e8d03d2745f3e6fdbc273058eba

  • SHA1

    a479033b766b65bced7b30547d41dfd37e88d50f

  • SHA256

    77de4f32ab13cbadea92a7e63f98aff55d4b7a01d8fc1322a2c80ca2ec11b72d

  • SHA512

    b4d1e6ca772883b3ec0a4c126e0fb039b85660684538f9c8f975a11ed7a1cdc0635f9a1adcf45a100a85fc30c94db6ac552fa4cafbc3451106c74d19b975e7dc

  • SSDEEP

    49152:rXgXqfaj9XS8XGZaiv1N7iSpZKnRUgkUSTi0BT:7iEaj9XPX6FLmSueUIi

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77de4f32ab13cbadea92a7e63f98aff55d4b7a01d8fc1322a2c80ca2ec11b72d_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\77de4f32ab13cbadea92a7e63f98aff55d4b7a01d8fc1322a2c80ca2ec11b72d_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EI3zC9nt.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EI3zC9nt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rh8ex4hv.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rh8ex4hv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dR8fR9VS.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dR8fR9VS.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1740
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\uH2li6lg.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\uH2li6lg.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2608
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2440
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 268
                  8⤵
                  • Program crash
                  PID:2480
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EI3zC9nt.exe

    Filesize

    1.5MB

    MD5

    9de79eeff0edeee74d442927fa576adb

    SHA1

    9d555202c6097d83f9d7d6727c12979ae4e6283c

    SHA256

    e1e1988520d6e5ae6d7095ba95f2b25e6f2429fda972433a6af13926ea8ee8d4

    SHA512

    3a3b4b9b675592e8ff074f85e855a37b047a2538930d938555aef2e345df8b8dc8712b4217211d4e332792497236ccf44315887f1c6e34d6f15edc3e884e995a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EI3zC9nt.exe

    Filesize

    1.5MB

    MD5

    9de79eeff0edeee74d442927fa576adb

    SHA1

    9d555202c6097d83f9d7d6727c12979ae4e6283c

    SHA256

    e1e1988520d6e5ae6d7095ba95f2b25e6f2429fda972433a6af13926ea8ee8d4

    SHA512

    3a3b4b9b675592e8ff074f85e855a37b047a2538930d938555aef2e345df8b8dc8712b4217211d4e332792497236ccf44315887f1c6e34d6f15edc3e884e995a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rh8ex4hv.exe

    Filesize

    1.3MB

    MD5

    9c192d88e4b5b908c2ba410e1eb0a23d

    SHA1

    4c183d8f0c12e60bdfbcb93d70cae99382bae571

    SHA256

    26cd8c355778ed820a79d95fc91c658ab8f2a34a1cd787a7b9115ea0fbe29b2f

    SHA512

    e51b45f1b2ffc75b0e38b958e2f57e9fff7c403edb05c4f5f68b0e4808fdb1a42cfb94aa5bc2024f0cf6a2d7548209c103a48228eafd2561d33477e48a48aa31

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rh8ex4hv.exe

    Filesize

    1.3MB

    MD5

    9c192d88e4b5b908c2ba410e1eb0a23d

    SHA1

    4c183d8f0c12e60bdfbcb93d70cae99382bae571

    SHA256

    26cd8c355778ed820a79d95fc91c658ab8f2a34a1cd787a7b9115ea0fbe29b2f

    SHA512

    e51b45f1b2ffc75b0e38b958e2f57e9fff7c403edb05c4f5f68b0e4808fdb1a42cfb94aa5bc2024f0cf6a2d7548209c103a48228eafd2561d33477e48a48aa31

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dR8fR9VS.exe

    Filesize

    824KB

    MD5

    702a2d79b1608e4b58a97d178676463e

    SHA1

    ad38c4a5ee9171d140f2549710df5387d8fca5c5

    SHA256

    d4c79462fa7fc84514db0631ccfa4e856d74d6a0ecea78a74c135d4ccf925de6

    SHA512

    27744f14065e78dc7fb63ebb9afae168f456b501ac9a1a8ddb7c2e56a242c2e8cbfa61c639df11df92f3cd0d19e55a531b97a759e46050887834f28311b1ee49

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dR8fR9VS.exe

    Filesize

    824KB

    MD5

    702a2d79b1608e4b58a97d178676463e

    SHA1

    ad38c4a5ee9171d140f2549710df5387d8fca5c5

    SHA256

    d4c79462fa7fc84514db0631ccfa4e856d74d6a0ecea78a74c135d4ccf925de6

    SHA512

    27744f14065e78dc7fb63ebb9afae168f456b501ac9a1a8ddb7c2e56a242c2e8cbfa61c639df11df92f3cd0d19e55a531b97a759e46050887834f28311b1ee49

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\uH2li6lg.exe

    Filesize

    652KB

    MD5

    f1d1db2ab3969659938c27ec67828dcf

    SHA1

    f017bed1487ce73298c37be08624a0892ac492a1

    SHA256

    4cca87d55afd3419f4a48f1ae88e014b8b3604bdb0485f902a8d57eaf182e008

    SHA512

    2575ae68dbe4d987e0df2a76b847e9233ef9176efda168c3f3bf5b1a799c10887dc6c0965c5e0fcf966e3e8d2199f7b9073a44aa8c283138f3a26cb21b3fb27e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\uH2li6lg.exe

    Filesize

    652KB

    MD5

    f1d1db2ab3969659938c27ec67828dcf

    SHA1

    f017bed1487ce73298c37be08624a0892ac492a1

    SHA256

    4cca87d55afd3419f4a48f1ae88e014b8b3604bdb0485f902a8d57eaf182e008

    SHA512

    2575ae68dbe4d987e0df2a76b847e9233ef9176efda168c3f3bf5b1a799c10887dc6c0965c5e0fcf966e3e8d2199f7b9073a44aa8c283138f3a26cb21b3fb27e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\EI3zC9nt.exe

    Filesize

    1.5MB

    MD5

    9de79eeff0edeee74d442927fa576adb

    SHA1

    9d555202c6097d83f9d7d6727c12979ae4e6283c

    SHA256

    e1e1988520d6e5ae6d7095ba95f2b25e6f2429fda972433a6af13926ea8ee8d4

    SHA512

    3a3b4b9b675592e8ff074f85e855a37b047a2538930d938555aef2e345df8b8dc8712b4217211d4e332792497236ccf44315887f1c6e34d6f15edc3e884e995a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\EI3zC9nt.exe

    Filesize

    1.5MB

    MD5

    9de79eeff0edeee74d442927fa576adb

    SHA1

    9d555202c6097d83f9d7d6727c12979ae4e6283c

    SHA256

    e1e1988520d6e5ae6d7095ba95f2b25e6f2429fda972433a6af13926ea8ee8d4

    SHA512

    3a3b4b9b675592e8ff074f85e855a37b047a2538930d938555aef2e345df8b8dc8712b4217211d4e332792497236ccf44315887f1c6e34d6f15edc3e884e995a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rh8ex4hv.exe

    Filesize

    1.3MB

    MD5

    9c192d88e4b5b908c2ba410e1eb0a23d

    SHA1

    4c183d8f0c12e60bdfbcb93d70cae99382bae571

    SHA256

    26cd8c355778ed820a79d95fc91c658ab8f2a34a1cd787a7b9115ea0fbe29b2f

    SHA512

    e51b45f1b2ffc75b0e38b958e2f57e9fff7c403edb05c4f5f68b0e4808fdb1a42cfb94aa5bc2024f0cf6a2d7548209c103a48228eafd2561d33477e48a48aa31

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rh8ex4hv.exe

    Filesize

    1.3MB

    MD5

    9c192d88e4b5b908c2ba410e1eb0a23d

    SHA1

    4c183d8f0c12e60bdfbcb93d70cae99382bae571

    SHA256

    26cd8c355778ed820a79d95fc91c658ab8f2a34a1cd787a7b9115ea0fbe29b2f

    SHA512

    e51b45f1b2ffc75b0e38b958e2f57e9fff7c403edb05c4f5f68b0e4808fdb1a42cfb94aa5bc2024f0cf6a2d7548209c103a48228eafd2561d33477e48a48aa31

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\dR8fR9VS.exe

    Filesize

    824KB

    MD5

    702a2d79b1608e4b58a97d178676463e

    SHA1

    ad38c4a5ee9171d140f2549710df5387d8fca5c5

    SHA256

    d4c79462fa7fc84514db0631ccfa4e856d74d6a0ecea78a74c135d4ccf925de6

    SHA512

    27744f14065e78dc7fb63ebb9afae168f456b501ac9a1a8ddb7c2e56a242c2e8cbfa61c639df11df92f3cd0d19e55a531b97a759e46050887834f28311b1ee49

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\dR8fR9VS.exe

    Filesize

    824KB

    MD5

    702a2d79b1608e4b58a97d178676463e

    SHA1

    ad38c4a5ee9171d140f2549710df5387d8fca5c5

    SHA256

    d4c79462fa7fc84514db0631ccfa4e856d74d6a0ecea78a74c135d4ccf925de6

    SHA512

    27744f14065e78dc7fb63ebb9afae168f456b501ac9a1a8ddb7c2e56a242c2e8cbfa61c639df11df92f3cd0d19e55a531b97a759e46050887834f28311b1ee49

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\uH2li6lg.exe

    Filesize

    652KB

    MD5

    f1d1db2ab3969659938c27ec67828dcf

    SHA1

    f017bed1487ce73298c37be08624a0892ac492a1

    SHA256

    4cca87d55afd3419f4a48f1ae88e014b8b3604bdb0485f902a8d57eaf182e008

    SHA512

    2575ae68dbe4d987e0df2a76b847e9233ef9176efda168c3f3bf5b1a799c10887dc6c0965c5e0fcf966e3e8d2199f7b9073a44aa8c283138f3a26cb21b3fb27e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\uH2li6lg.exe

    Filesize

    652KB

    MD5

    f1d1db2ab3969659938c27ec67828dcf

    SHA1

    f017bed1487ce73298c37be08624a0892ac492a1

    SHA256

    4cca87d55afd3419f4a48f1ae88e014b8b3604bdb0485f902a8d57eaf182e008

    SHA512

    2575ae68dbe4d987e0df2a76b847e9233ef9176efda168c3f3bf5b1a799c10887dc6c0965c5e0fcf966e3e8d2199f7b9073a44aa8c283138f3a26cb21b3fb27e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1mg38Dp4.exe

    Filesize

    1.8MB

    MD5

    f3f2f8b5752ef75807bb50f7cdca9813

    SHA1

    0b4c8a7da527a45432922e8f6eaddc5959165ae1

    SHA256

    0fef3487fff91a01030ad443e6e548c323825a6c9d354d406c5d224b25dc880d

    SHA512

    6bd7f737e4490756f520f21d3f3c5c08b36f70c001f861c6cea9b75ae59254a1fa42d265f121c2ba54d0f12bdfd6b03580cf5a4a8e037fd0331732bddd95d09e

  • memory/2440-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2440-60-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2440-62-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2440-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2440-65-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2440-67-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2440-58-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2440-56-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2440-55-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2440-53-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB