Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 10:59

General

  • Target

    NEAS.1f3e03ca7bfcee157393fb94a3450e5a79979b8f5c0b85427ab51908bb78810b_JC.exe

  • Size

    1.2MB

  • MD5

    b81cd3142a789eca2228e02e2a31229c

  • SHA1

    6673628188e3aaa5cc5e3a0fd20cd472a85f237f

  • SHA256

    1f3e03ca7bfcee157393fb94a3450e5a79979b8f5c0b85427ab51908bb78810b

  • SHA512

    1b8855f6be99ade9f5d34a9bc69ba574a77957f397cd5015958eea3508e485934c1092aefebdf012b5671570c7fff8b0056b3325b56d0392abc55581599bb19c

  • SSDEEP

    24576:tyg79ARUhCAlCegO5Q+wvF36AFIVjtftkIKVHXKT+w:Ik9ARmwOqjF36N/Nri

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1f3e03ca7bfcee157393fb94a3450e5a79979b8f5c0b85427ab51908bb78810b_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1f3e03ca7bfcee157393fb94a3450e5a79979b8f5c0b85427ab51908bb78810b_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TQ8Ny3fX.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TQ8Ny3fX.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yI0rw7Oy.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yI0rw7Oy.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2356
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ou1po6co.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ou1po6co.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\SV7Lf3oJ.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\SV7Lf3oJ.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2668
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2648
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 268
                  8⤵
                  • Program crash
                  PID:2224
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2544

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TQ8Ny3fX.exe
    Filesize

    1.0MB

    MD5

    8ca2811ee4fae71a570298ebc6efcbac

    SHA1

    475da0caa3e4b5931344c9a739c46513edbe0830

    SHA256

    803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b

    SHA512

    6e7925228aaf4175a3c7f1e33131fdbcec9cdd9f40408933e7e607e0d6557ce92905ffe6dd90f6b73aaa38b1e769ad2966aacb375f2c660a4f7842dc5e013621

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TQ8Ny3fX.exe
    Filesize

    1.0MB

    MD5

    8ca2811ee4fae71a570298ebc6efcbac

    SHA1

    475da0caa3e4b5931344c9a739c46513edbe0830

    SHA256

    803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b

    SHA512

    6e7925228aaf4175a3c7f1e33131fdbcec9cdd9f40408933e7e607e0d6557ce92905ffe6dd90f6b73aaa38b1e769ad2966aacb375f2c660a4f7842dc5e013621

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yI0rw7Oy.exe
    Filesize

    884KB

    MD5

    35cd0fa9a92632de1fb8f95616fbaf64

    SHA1

    54d2761ca84428640771282adb9157faaed6e027

    SHA256

    32bc699ccaf4a011697be83dacd09a35d622910ec756259f5f88b12b8ebb2feb

    SHA512

    2756154fed40d0c321f863ec2a8e433fb12351d436418daf7730cc1841641aa26a517ba9dbcbd8f640c5c64cee01b1f089518b5d4777e7cd47ebc9ffbb8b56e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\yI0rw7Oy.exe
    Filesize

    884KB

    MD5

    35cd0fa9a92632de1fb8f95616fbaf64

    SHA1

    54d2761ca84428640771282adb9157faaed6e027

    SHA256

    32bc699ccaf4a011697be83dacd09a35d622910ec756259f5f88b12b8ebb2feb

    SHA512

    2756154fed40d0c321f863ec2a8e433fb12351d436418daf7730cc1841641aa26a517ba9dbcbd8f640c5c64cee01b1f089518b5d4777e7cd47ebc9ffbb8b56e4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ou1po6co.exe
    Filesize

    590KB

    MD5

    3a081b5e807cd77cc2ab1dd8be90b43f

    SHA1

    950840587b5abce844724558485224ca5ed40c5a

    SHA256

    6523b66313e8e95df0775befac10035f535ff46b85b23b68d611bff164f8c2db

    SHA512

    a3abd35d1932ef8070725965f464612be246c38fea6cad04587fa74c1c3affc30cf78ddb9d19c31a68b0ee00cff6dcced40f786bab19acf921681eb212dfe553

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ou1po6co.exe
    Filesize

    590KB

    MD5

    3a081b5e807cd77cc2ab1dd8be90b43f

    SHA1

    950840587b5abce844724558485224ca5ed40c5a

    SHA256

    6523b66313e8e95df0775befac10035f535ff46b85b23b68d611bff164f8c2db

    SHA512

    a3abd35d1932ef8070725965f464612be246c38fea6cad04587fa74c1c3affc30cf78ddb9d19c31a68b0ee00cff6dcced40f786bab19acf921681eb212dfe553

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\SV7Lf3oJ.exe
    Filesize

    417KB

    MD5

    3d7f340b03b8668120c515eebb21d8e5

    SHA1

    b6cdff303bc0e96b55684ef7b7b96466e14ee982

    SHA256

    6b384a445d0a676ec844ef800f820fc0cfb7f0ef8b25d8e2554c823970a34dc1

    SHA512

    027875ae8292b0e223ee920c57d578623a3b2140475a5f69b4a495d16a1bb142f57943c22f70fb061cf0acc7f2f730a50ae8221743df81449995eb7061fa2869

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\SV7Lf3oJ.exe
    Filesize

    417KB

    MD5

    3d7f340b03b8668120c515eebb21d8e5

    SHA1

    b6cdff303bc0e96b55684ef7b7b96466e14ee982

    SHA256

    6b384a445d0a676ec844ef800f820fc0cfb7f0ef8b25d8e2554c823970a34dc1

    SHA512

    027875ae8292b0e223ee920c57d578623a3b2140475a5f69b4a495d16a1bb142f57943c22f70fb061cf0acc7f2f730a50ae8221743df81449995eb7061fa2869

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\TQ8Ny3fX.exe
    Filesize

    1.0MB

    MD5

    8ca2811ee4fae71a570298ebc6efcbac

    SHA1

    475da0caa3e4b5931344c9a739c46513edbe0830

    SHA256

    803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b

    SHA512

    6e7925228aaf4175a3c7f1e33131fdbcec9cdd9f40408933e7e607e0d6557ce92905ffe6dd90f6b73aaa38b1e769ad2966aacb375f2c660a4f7842dc5e013621

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\TQ8Ny3fX.exe
    Filesize

    1.0MB

    MD5

    8ca2811ee4fae71a570298ebc6efcbac

    SHA1

    475da0caa3e4b5931344c9a739c46513edbe0830

    SHA256

    803bdeb4bc4493002015ca620d956227797f6d2e1f4fb5f4b09b86d3c2be303b

    SHA512

    6e7925228aaf4175a3c7f1e33131fdbcec9cdd9f40408933e7e607e0d6557ce92905ffe6dd90f6b73aaa38b1e769ad2966aacb375f2c660a4f7842dc5e013621

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\yI0rw7Oy.exe
    Filesize

    884KB

    MD5

    35cd0fa9a92632de1fb8f95616fbaf64

    SHA1

    54d2761ca84428640771282adb9157faaed6e027

    SHA256

    32bc699ccaf4a011697be83dacd09a35d622910ec756259f5f88b12b8ebb2feb

    SHA512

    2756154fed40d0c321f863ec2a8e433fb12351d436418daf7730cc1841641aa26a517ba9dbcbd8f640c5c64cee01b1f089518b5d4777e7cd47ebc9ffbb8b56e4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\yI0rw7Oy.exe
    Filesize

    884KB

    MD5

    35cd0fa9a92632de1fb8f95616fbaf64

    SHA1

    54d2761ca84428640771282adb9157faaed6e027

    SHA256

    32bc699ccaf4a011697be83dacd09a35d622910ec756259f5f88b12b8ebb2feb

    SHA512

    2756154fed40d0c321f863ec2a8e433fb12351d436418daf7730cc1841641aa26a517ba9dbcbd8f640c5c64cee01b1f089518b5d4777e7cd47ebc9ffbb8b56e4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ou1po6co.exe
    Filesize

    590KB

    MD5

    3a081b5e807cd77cc2ab1dd8be90b43f

    SHA1

    950840587b5abce844724558485224ca5ed40c5a

    SHA256

    6523b66313e8e95df0775befac10035f535ff46b85b23b68d611bff164f8c2db

    SHA512

    a3abd35d1932ef8070725965f464612be246c38fea6cad04587fa74c1c3affc30cf78ddb9d19c31a68b0ee00cff6dcced40f786bab19acf921681eb212dfe553

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ou1po6co.exe
    Filesize

    590KB

    MD5

    3a081b5e807cd77cc2ab1dd8be90b43f

    SHA1

    950840587b5abce844724558485224ca5ed40c5a

    SHA256

    6523b66313e8e95df0775befac10035f535ff46b85b23b68d611bff164f8c2db

    SHA512

    a3abd35d1932ef8070725965f464612be246c38fea6cad04587fa74c1c3affc30cf78ddb9d19c31a68b0ee00cff6dcced40f786bab19acf921681eb212dfe553

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\SV7Lf3oJ.exe
    Filesize

    417KB

    MD5

    3d7f340b03b8668120c515eebb21d8e5

    SHA1

    b6cdff303bc0e96b55684ef7b7b96466e14ee982

    SHA256

    6b384a445d0a676ec844ef800f820fc0cfb7f0ef8b25d8e2554c823970a34dc1

    SHA512

    027875ae8292b0e223ee920c57d578623a3b2140475a5f69b4a495d16a1bb142f57943c22f70fb061cf0acc7f2f730a50ae8221743df81449995eb7061fa2869

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\SV7Lf3oJ.exe
    Filesize

    417KB

    MD5

    3d7f340b03b8668120c515eebb21d8e5

    SHA1

    b6cdff303bc0e96b55684ef7b7b96466e14ee982

    SHA256

    6b384a445d0a676ec844ef800f820fc0cfb7f0ef8b25d8e2554c823970a34dc1

    SHA512

    027875ae8292b0e223ee920c57d578623a3b2140475a5f69b4a495d16a1bb142f57943c22f70fb061cf0acc7f2f730a50ae8221743df81449995eb7061fa2869

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1KW20JF5.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • memory/2648-54-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2648-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2648-63-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2648-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2648-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2648-68-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2648-59-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2648-57-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2648-55-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2648-53-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB