Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2023, 20:50

General

  • Target

    NEAS.af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e_JC.exe

  • Size

    1.2MB

  • MD5

    e0cc4babef04cb748eaa8b45ecc4bb42

  • SHA1

    6c1afcf2f818a340ddf35f7eb7a76df5b3263da7

  • SHA256

    af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e

  • SHA512

    8f104c7571e892c02d88466fc5d50163d114ffe8a749836cf0046cd6652e41877edf22220a87d2c7089fc4dab2c9ec84d8b5ca92589383313b391e2c2967c266

  • SSDEEP

    24576:yyU1DHful+Fu+35mJcdoOEfsUIb2ho+RQEMnW9SMp/YwVhK:ZUJf+CggE0UIb2hoqGW9S4Qch

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.af0c568e40461e44653e170346b923921df3b2299a7c92dee7d55a2f9a0d4f2e_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BZ3Jh2Qt.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BZ3Jh2Qt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VU5Mx1od.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VU5Mx1od.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YQ3ft9BW.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YQ3ft9BW.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nx3QP0Sy.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nx3QP0Sy.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3068
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2888
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2604
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2492
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 268
                    8⤵
                    • Program crash
                    PID:3004
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 292
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2996

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BZ3Jh2Qt.exe

            Filesize

            1.0MB

            MD5

            9e60daa556edc91686313a20480d9998

            SHA1

            82f32781a27218e1b132c66d45dd50c85ba3425b

            SHA256

            74c691d8ad179c72d5d91b8279601ee37cd35fb56e50ac7b7b5e031bb3c8fb14

            SHA512

            c3b6354d3337f2cebf1140736414ecae929b19981b0928e200cb74f5cccdfcf09a3d0d6eebaad4052f48b85b22ecc7555b1744855def38d09ea7e5b9a0ca5748

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BZ3Jh2Qt.exe

            Filesize

            1.0MB

            MD5

            9e60daa556edc91686313a20480d9998

            SHA1

            82f32781a27218e1b132c66d45dd50c85ba3425b

            SHA256

            74c691d8ad179c72d5d91b8279601ee37cd35fb56e50ac7b7b5e031bb3c8fb14

            SHA512

            c3b6354d3337f2cebf1140736414ecae929b19981b0928e200cb74f5cccdfcf09a3d0d6eebaad4052f48b85b22ecc7555b1744855def38d09ea7e5b9a0ca5748

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VU5Mx1od.exe

            Filesize

            884KB

            MD5

            11b08b8f357a4b8c22662f5959ee472f

            SHA1

            76143855b9fc6bb3eb4ef97ce20f29b2732eb15a

            SHA256

            30f8d9a1612e3597804b7cfe11044099ef51201d3b8b6815811a7f6dcc5cdf0f

            SHA512

            640f2fe52fe6685fe2fb50e59aeb07470a56d2fdced387d510d0f03a91474ad312d4c41a195e30732bdb83a5522c3f0fda44c86c05fc03d4367d2483c907c0cb

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\VU5Mx1od.exe

            Filesize

            884KB

            MD5

            11b08b8f357a4b8c22662f5959ee472f

            SHA1

            76143855b9fc6bb3eb4ef97ce20f29b2732eb15a

            SHA256

            30f8d9a1612e3597804b7cfe11044099ef51201d3b8b6815811a7f6dcc5cdf0f

            SHA512

            640f2fe52fe6685fe2fb50e59aeb07470a56d2fdced387d510d0f03a91474ad312d4c41a195e30732bdb83a5522c3f0fda44c86c05fc03d4367d2483c907c0cb

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YQ3ft9BW.exe

            Filesize

            590KB

            MD5

            ed954a74aa76741f27c115867c8406fe

            SHA1

            8b03f26546010b511b0abd4f1407603048e2f0e2

            SHA256

            697272ef75d754f9c7d5c788974ac7540b662eb0545d128b121ff8e601956ecf

            SHA512

            c7de57801f60208dda82624c2a47cb977d8fb53dc118c8237e11da3c83f81bbd02f25a56fca73ac2a07c3cc5b2108c19ae1113be2037b355fc82209164c7039d

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\YQ3ft9BW.exe

            Filesize

            590KB

            MD5

            ed954a74aa76741f27c115867c8406fe

            SHA1

            8b03f26546010b511b0abd4f1407603048e2f0e2

            SHA256

            697272ef75d754f9c7d5c788974ac7540b662eb0545d128b121ff8e601956ecf

            SHA512

            c7de57801f60208dda82624c2a47cb977d8fb53dc118c8237e11da3c83f81bbd02f25a56fca73ac2a07c3cc5b2108c19ae1113be2037b355fc82209164c7039d

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nx3QP0Sy.exe

            Filesize

            417KB

            MD5

            90ce900c7a0e9d4c94e8b57b8f5455c8

            SHA1

            19ff919c59d0921c67b93865748f686b990f224d

            SHA256

            4e6c379c72d62e6296a8772f4a432c2060469524dde96f1301f882a9de4dd9f6

            SHA512

            ffd244f00feb6c625495fcd2521d906a238605642b29b4d882ec46eb25e0b515b904c310f69626b9bc0fad32b48f7f3b0c3931622d95b5e05f3d753fe0b8c444

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nx3QP0Sy.exe

            Filesize

            417KB

            MD5

            90ce900c7a0e9d4c94e8b57b8f5455c8

            SHA1

            19ff919c59d0921c67b93865748f686b990f224d

            SHA256

            4e6c379c72d62e6296a8772f4a432c2060469524dde96f1301f882a9de4dd9f6

            SHA512

            ffd244f00feb6c625495fcd2521d906a238605642b29b4d882ec46eb25e0b515b904c310f69626b9bc0fad32b48f7f3b0c3931622d95b5e05f3d753fe0b8c444

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\BZ3Jh2Qt.exe

            Filesize

            1.0MB

            MD5

            9e60daa556edc91686313a20480d9998

            SHA1

            82f32781a27218e1b132c66d45dd50c85ba3425b

            SHA256

            74c691d8ad179c72d5d91b8279601ee37cd35fb56e50ac7b7b5e031bb3c8fb14

            SHA512

            c3b6354d3337f2cebf1140736414ecae929b19981b0928e200cb74f5cccdfcf09a3d0d6eebaad4052f48b85b22ecc7555b1744855def38d09ea7e5b9a0ca5748

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\BZ3Jh2Qt.exe

            Filesize

            1.0MB

            MD5

            9e60daa556edc91686313a20480d9998

            SHA1

            82f32781a27218e1b132c66d45dd50c85ba3425b

            SHA256

            74c691d8ad179c72d5d91b8279601ee37cd35fb56e50ac7b7b5e031bb3c8fb14

            SHA512

            c3b6354d3337f2cebf1140736414ecae929b19981b0928e200cb74f5cccdfcf09a3d0d6eebaad4052f48b85b22ecc7555b1744855def38d09ea7e5b9a0ca5748

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\VU5Mx1od.exe

            Filesize

            884KB

            MD5

            11b08b8f357a4b8c22662f5959ee472f

            SHA1

            76143855b9fc6bb3eb4ef97ce20f29b2732eb15a

            SHA256

            30f8d9a1612e3597804b7cfe11044099ef51201d3b8b6815811a7f6dcc5cdf0f

            SHA512

            640f2fe52fe6685fe2fb50e59aeb07470a56d2fdced387d510d0f03a91474ad312d4c41a195e30732bdb83a5522c3f0fda44c86c05fc03d4367d2483c907c0cb

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\VU5Mx1od.exe

            Filesize

            884KB

            MD5

            11b08b8f357a4b8c22662f5959ee472f

            SHA1

            76143855b9fc6bb3eb4ef97ce20f29b2732eb15a

            SHA256

            30f8d9a1612e3597804b7cfe11044099ef51201d3b8b6815811a7f6dcc5cdf0f

            SHA512

            640f2fe52fe6685fe2fb50e59aeb07470a56d2fdced387d510d0f03a91474ad312d4c41a195e30732bdb83a5522c3f0fda44c86c05fc03d4367d2483c907c0cb

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\YQ3ft9BW.exe

            Filesize

            590KB

            MD5

            ed954a74aa76741f27c115867c8406fe

            SHA1

            8b03f26546010b511b0abd4f1407603048e2f0e2

            SHA256

            697272ef75d754f9c7d5c788974ac7540b662eb0545d128b121ff8e601956ecf

            SHA512

            c7de57801f60208dda82624c2a47cb977d8fb53dc118c8237e11da3c83f81bbd02f25a56fca73ac2a07c3cc5b2108c19ae1113be2037b355fc82209164c7039d

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\YQ3ft9BW.exe

            Filesize

            590KB

            MD5

            ed954a74aa76741f27c115867c8406fe

            SHA1

            8b03f26546010b511b0abd4f1407603048e2f0e2

            SHA256

            697272ef75d754f9c7d5c788974ac7540b662eb0545d128b121ff8e601956ecf

            SHA512

            c7de57801f60208dda82624c2a47cb977d8fb53dc118c8237e11da3c83f81bbd02f25a56fca73ac2a07c3cc5b2108c19ae1113be2037b355fc82209164c7039d

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\nx3QP0Sy.exe

            Filesize

            417KB

            MD5

            90ce900c7a0e9d4c94e8b57b8f5455c8

            SHA1

            19ff919c59d0921c67b93865748f686b990f224d

            SHA256

            4e6c379c72d62e6296a8772f4a432c2060469524dde96f1301f882a9de4dd9f6

            SHA512

            ffd244f00feb6c625495fcd2521d906a238605642b29b4d882ec46eb25e0b515b904c310f69626b9bc0fad32b48f7f3b0c3931622d95b5e05f3d753fe0b8c444

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\nx3QP0Sy.exe

            Filesize

            417KB

            MD5

            90ce900c7a0e9d4c94e8b57b8f5455c8

            SHA1

            19ff919c59d0921c67b93865748f686b990f224d

            SHA256

            4e6c379c72d62e6296a8772f4a432c2060469524dde96f1301f882a9de4dd9f6

            SHA512

            ffd244f00feb6c625495fcd2521d906a238605642b29b4d882ec46eb25e0b515b904c310f69626b9bc0fad32b48f7f3b0c3931622d95b5e05f3d753fe0b8c444

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jm70ch2.exe

            Filesize

            378KB

            MD5

            3fdd94f1244d3de44c11b3471723459d

            SHA1

            840f9c71826bab7ee9c47caeeeaa369a914305da

            SHA256

            d671bd54df5d5cb95d1cec184c861b8d9076bec157cebdb9937f63b67bd1cde5

            SHA512

            d0ee5b40bb15627be1c6b9645071a7189df09325ab66d9d21cff6a43a6b8f876ebd83207f2b1cc70472d5b118f6054e5f63bf92fe3d874884db0fcff6bd17b6d

          • memory/2492-54-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2492-55-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2492-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2492-60-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2492-62-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2492-64-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2492-56-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2492-57-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2492-58-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2492-53-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB