Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2023, 20:29

General

  • Target

    NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe

  • Size

    1.2MB

  • MD5

    35e6d0d83c1a24d784a25f6703554fd3

  • SHA1

    f6f0c985a6f9a000fe2556deafa9c3b912d1ba20

  • SHA256

    1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5

  • SHA512

    237b1ed4159b01ad9f791bbfb3730e9b083d617c23897fb0497b36e050ecfd609d291ba0dbc5213d270d35de0a2c80dee2ef0d668deaf1d2167c16185cbceadc

  • SSDEEP

    24576:9yWk+rsN4JbSgZwfzyR9r0Tt+uFSXbiNxVhWJluxKHqVI:YWk+rsN4bS2R9KSbKjhyU1

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1b5d23e79b8a2c7ec5533b09ee34fc523a5eaddb994ee1d37e2f92a32c1be4d5_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2256
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2708
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2740
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2492
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 268
                  8⤵
                  • Program crash
                  PID:2464
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe

    Filesize

    1.0MB

    MD5

    3e2f06d41b144a52aa1260e35397c477

    SHA1

    5e3dbadae95600f804aa64e1241ded7796a360b2

    SHA256

    c2515a5127ee8f97cc34d5010c9d3ed1f321e07f3299975b251556776ed58c9b

    SHA512

    e1f60bd589bf995fbc0ef866ce85873470f4350e5d6c1149058ca9508b7f16c87ba3fb53c19731ed77ea70aad60d60eafe048d862c7e8cd1bc6bb3076bd838ea

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe

    Filesize

    1.0MB

    MD5

    3e2f06d41b144a52aa1260e35397c477

    SHA1

    5e3dbadae95600f804aa64e1241ded7796a360b2

    SHA256

    c2515a5127ee8f97cc34d5010c9d3ed1f321e07f3299975b251556776ed58c9b

    SHA512

    e1f60bd589bf995fbc0ef866ce85873470f4350e5d6c1149058ca9508b7f16c87ba3fb53c19731ed77ea70aad60d60eafe048d862c7e8cd1bc6bb3076bd838ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe

    Filesize

    884KB

    MD5

    af694cbed9b219484d7444110f71c64e

    SHA1

    a5f2813bd3bb0bec6b30fc299b86d6a684921f28

    SHA256

    b45f5479a171613b80d9e6131c720039fe54fa34a05a693c389e39fe860d3ca8

    SHA512

    a99e9b531c8f8573c9ede6066a6aad551a3a249ade9b0ce7cbc788257865e9592d27e395408f122b9aec8a322ec093bc42f3003b4f727b28122f8f304386bc60

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe

    Filesize

    884KB

    MD5

    af694cbed9b219484d7444110f71c64e

    SHA1

    a5f2813bd3bb0bec6b30fc299b86d6a684921f28

    SHA256

    b45f5479a171613b80d9e6131c720039fe54fa34a05a693c389e39fe860d3ca8

    SHA512

    a99e9b531c8f8573c9ede6066a6aad551a3a249ade9b0ce7cbc788257865e9592d27e395408f122b9aec8a322ec093bc42f3003b4f727b28122f8f304386bc60

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe

    Filesize

    590KB

    MD5

    6f9ea81f43f481c93f4b96f40c957c0d

    SHA1

    f6c8a18315aed12e8f948d2de3a89dc039f4f9ef

    SHA256

    310eceeebc1d9d03fefd45793f82d65923a7ae9128698b16f5fe924faa6fbb82

    SHA512

    24a52bccd3bb25b839f25cd71d27fce19026035a8941dd6661bcbe842feca851530ba6a7f73e00953280292330dbfe1a95c223a38f17ec0bd99d60e068290106

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe

    Filesize

    590KB

    MD5

    6f9ea81f43f481c93f4b96f40c957c0d

    SHA1

    f6c8a18315aed12e8f948d2de3a89dc039f4f9ef

    SHA256

    310eceeebc1d9d03fefd45793f82d65923a7ae9128698b16f5fe924faa6fbb82

    SHA512

    24a52bccd3bb25b839f25cd71d27fce19026035a8941dd6661bcbe842feca851530ba6a7f73e00953280292330dbfe1a95c223a38f17ec0bd99d60e068290106

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe

    Filesize

    417KB

    MD5

    3f4d0141d4cb30cdeb4f82125b115c95

    SHA1

    5f69acfa0d749466b4158fe82158d0411e7d1be2

    SHA256

    e2b942481952a21f27b0f668ff1e3bcf121d5da3d3e2d635a37b81ccc4f9d640

    SHA512

    836c9b4c8445b75b3fad7a8c13154999adb5e15f2b59fc394390706fcd1e1936f527cc0dec5d88f07517724c45bd1f860f770866af77d3767e9f2f0b0a9ecac9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe

    Filesize

    417KB

    MD5

    3f4d0141d4cb30cdeb4f82125b115c95

    SHA1

    5f69acfa0d749466b4158fe82158d0411e7d1be2

    SHA256

    e2b942481952a21f27b0f668ff1e3bcf121d5da3d3e2d635a37b81ccc4f9d640

    SHA512

    836c9b4c8445b75b3fad7a8c13154999adb5e15f2b59fc394390706fcd1e1936f527cc0dec5d88f07517724c45bd1f860f770866af77d3767e9f2f0b0a9ecac9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe

    Filesize

    1.0MB

    MD5

    3e2f06d41b144a52aa1260e35397c477

    SHA1

    5e3dbadae95600f804aa64e1241ded7796a360b2

    SHA256

    c2515a5127ee8f97cc34d5010c9d3ed1f321e07f3299975b251556776ed58c9b

    SHA512

    e1f60bd589bf995fbc0ef866ce85873470f4350e5d6c1149058ca9508b7f16c87ba3fb53c19731ed77ea70aad60d60eafe048d862c7e8cd1bc6bb3076bd838ea

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\hs7pK8Fi.exe

    Filesize

    1.0MB

    MD5

    3e2f06d41b144a52aa1260e35397c477

    SHA1

    5e3dbadae95600f804aa64e1241ded7796a360b2

    SHA256

    c2515a5127ee8f97cc34d5010c9d3ed1f321e07f3299975b251556776ed58c9b

    SHA512

    e1f60bd589bf995fbc0ef866ce85873470f4350e5d6c1149058ca9508b7f16c87ba3fb53c19731ed77ea70aad60d60eafe048d862c7e8cd1bc6bb3076bd838ea

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe

    Filesize

    884KB

    MD5

    af694cbed9b219484d7444110f71c64e

    SHA1

    a5f2813bd3bb0bec6b30fc299b86d6a684921f28

    SHA256

    b45f5479a171613b80d9e6131c720039fe54fa34a05a693c389e39fe860d3ca8

    SHA512

    a99e9b531c8f8573c9ede6066a6aad551a3a249ade9b0ce7cbc788257865e9592d27e395408f122b9aec8a322ec093bc42f3003b4f727b28122f8f304386bc60

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\JQ7gT4nk.exe

    Filesize

    884KB

    MD5

    af694cbed9b219484d7444110f71c64e

    SHA1

    a5f2813bd3bb0bec6b30fc299b86d6a684921f28

    SHA256

    b45f5479a171613b80d9e6131c720039fe54fa34a05a693c389e39fe860d3ca8

    SHA512

    a99e9b531c8f8573c9ede6066a6aad551a3a249ade9b0ce7cbc788257865e9592d27e395408f122b9aec8a322ec093bc42f3003b4f727b28122f8f304386bc60

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe

    Filesize

    590KB

    MD5

    6f9ea81f43f481c93f4b96f40c957c0d

    SHA1

    f6c8a18315aed12e8f948d2de3a89dc039f4f9ef

    SHA256

    310eceeebc1d9d03fefd45793f82d65923a7ae9128698b16f5fe924faa6fbb82

    SHA512

    24a52bccd3bb25b839f25cd71d27fce19026035a8941dd6661bcbe842feca851530ba6a7f73e00953280292330dbfe1a95c223a38f17ec0bd99d60e068290106

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\jn1Cg4sZ.exe

    Filesize

    590KB

    MD5

    6f9ea81f43f481c93f4b96f40c957c0d

    SHA1

    f6c8a18315aed12e8f948d2de3a89dc039f4f9ef

    SHA256

    310eceeebc1d9d03fefd45793f82d65923a7ae9128698b16f5fe924faa6fbb82

    SHA512

    24a52bccd3bb25b839f25cd71d27fce19026035a8941dd6661bcbe842feca851530ba6a7f73e00953280292330dbfe1a95c223a38f17ec0bd99d60e068290106

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe

    Filesize

    417KB

    MD5

    3f4d0141d4cb30cdeb4f82125b115c95

    SHA1

    5f69acfa0d749466b4158fe82158d0411e7d1be2

    SHA256

    e2b942481952a21f27b0f668ff1e3bcf121d5da3d3e2d635a37b81ccc4f9d640

    SHA512

    836c9b4c8445b75b3fad7a8c13154999adb5e15f2b59fc394390706fcd1e1936f527cc0dec5d88f07517724c45bd1f860f770866af77d3767e9f2f0b0a9ecac9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\dr6Td7fh.exe

    Filesize

    417KB

    MD5

    3f4d0141d4cb30cdeb4f82125b115c95

    SHA1

    5f69acfa0d749466b4158fe82158d0411e7d1be2

    SHA256

    e2b942481952a21f27b0f668ff1e3bcf121d5da3d3e2d635a37b81ccc4f9d640

    SHA512

    836c9b4c8445b75b3fad7a8c13154999adb5e15f2b59fc394390706fcd1e1936f527cc0dec5d88f07517724c45bd1f860f770866af77d3767e9f2f0b0a9ecac9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1DM36tM5.exe

    Filesize

    378KB

    MD5

    8fcfdb170413038261bd7034a5cd391b

    SHA1

    6e713020515e506b2f36767e88e456564bfc7b14

    SHA256

    62183929f5355a0978e9c7505f32b836ce768fb299fcfcb504833ea48e041ea2

    SHA512

    57230fa292df4271dbeba67fa932608dacd92c0a62d5c18aa9209bf52a7bac287d8f9b5fad2455939a7ad2d30302fec6d7ac3667dde9f190fad1e3e3fccface8

  • memory/2492-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2492-58-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-53-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-60-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-57-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-56-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-55-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2492-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB