Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 11:03

General

  • Target

    NEAS.209bf10cdb445c1647d24917f0f7fad1801b8a2ddcafb298d231b3189a398cd0_JC.exe

  • Size

    1.2MB

  • MD5

    b1e96ac076f6e08dd5b103eb6720ee3d

  • SHA1

    b0d5ccdf18767a4de814ca099c428d4482069988

  • SHA256

    209bf10cdb445c1647d24917f0f7fad1801b8a2ddcafb298d231b3189a398cd0

  • SHA512

    6bb1b6cebc7e4904b8bcc8250e69fa2a646f20c5966e194a196d6d12c2c7c3090ebf2799ecefc80d04c3524d4e36c17557105d7addfd1c49288adf29f89f1ef6

  • SSDEEP

    24576:gyvbYae6iXxAODqJHtsN+xQawaVQQoyJ:nve8O2htuH3aVQz

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 284
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:2644
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
    1⤵
      PID:2848
    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe
      C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2940
    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lM3bB7bb.exe
      C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lM3bB7bb.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1348
    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tA7nA7gg.exe
      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tA7nA7gg.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2676
    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gL6SV5Id.exe
      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gL6SV5Id.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bp4jT9uM.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bp4jT9uM.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2360
    • C:\Users\Admin\AppData\Local\Temp\NEAS.209bf10cdb445c1647d24917f0f7fad1801b8a2ddcafb298d231b3189a398cd0_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.209bf10cdb445c1647d24917f0f7fad1801b8a2ddcafb298d231b3189a398cd0_JC.exe"
      1⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bp4jT9uM.exe

      Filesize

      1.0MB

      MD5

      0de88f2323b3be2f7251a375c6ab33eb

      SHA1

      c2df2bfd944c4657852453a6ed13f17caac66ee1

      SHA256

      cd5a05c82fe99d0ed411a0cf607ee2688503afb261324c41c00ef1362bd39925

      SHA512

      ddfd7d505be7985a3e63051826f5e690c5cd804b1010f81d835b2383382e205dc0f8270d87b971664b7d39761dc723bcedd2f541509413d538bb174d1833bd87

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bp4jT9uM.exe

      Filesize

      1.0MB

      MD5

      0de88f2323b3be2f7251a375c6ab33eb

      SHA1

      c2df2bfd944c4657852453a6ed13f17caac66ee1

      SHA256

      cd5a05c82fe99d0ed411a0cf607ee2688503afb261324c41c00ef1362bd39925

      SHA512

      ddfd7d505be7985a3e63051826f5e690c5cd804b1010f81d835b2383382e205dc0f8270d87b971664b7d39761dc723bcedd2f541509413d538bb174d1833bd87

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gL6SV5Id.exe

      Filesize

      884KB

      MD5

      5c1827e55024ec63ae47e5b2ca74475c

      SHA1

      641488787215a8dc76ae923618b583cd79986c18

      SHA256

      f90993ac8df46bf0533cb3871e45ac820ba1335acd386c6e08db61219a145048

      SHA512

      df09cb8871ac2c12998dd525971e78c20483c3ef96506c3b363e06af4570eef77d21be2bd1268a2584825a568d10042bc8bc8cec44cf6ca385403990dab5fd46

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gL6SV5Id.exe

      Filesize

      884KB

      MD5

      5c1827e55024ec63ae47e5b2ca74475c

      SHA1

      641488787215a8dc76ae923618b583cd79986c18

      SHA256

      f90993ac8df46bf0533cb3871e45ac820ba1335acd386c6e08db61219a145048

      SHA512

      df09cb8871ac2c12998dd525971e78c20483c3ef96506c3b363e06af4570eef77d21be2bd1268a2584825a568d10042bc8bc8cec44cf6ca385403990dab5fd46

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tA7nA7gg.exe

      Filesize

      590KB

      MD5

      54046877820bfb21b87a3bc46e7f876d

      SHA1

      35e32b28887c35cc5da7e20e1b83dd8576560458

      SHA256

      5eda5cbcc20aeafe1e47dae80b4d26187fd4376320348504a1e9b75b91c454b2

      SHA512

      4081b00f3821209de9ef11d607f53f7c4f7d0190883ae7032a83cc79111c21529e937269da4dd13c3912d8bb59ce5f6be2f85d7da3bda5b7e4790b5ffe52c286

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tA7nA7gg.exe

      Filesize

      590KB

      MD5

      54046877820bfb21b87a3bc46e7f876d

      SHA1

      35e32b28887c35cc5da7e20e1b83dd8576560458

      SHA256

      5eda5cbcc20aeafe1e47dae80b4d26187fd4376320348504a1e9b75b91c454b2

      SHA512

      4081b00f3821209de9ef11d607f53f7c4f7d0190883ae7032a83cc79111c21529e937269da4dd13c3912d8bb59ce5f6be2f85d7da3bda5b7e4790b5ffe52c286

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lM3bB7bb.exe

      Filesize

      417KB

      MD5

      41909123ce4ea83cc310415939150ce5

      SHA1

      a104239e7bd97961fda2a01601a4dd72be4c6c96

      SHA256

      240e71f111c8f46a50b9297b0ac8fe827a3168748929e3ed27057623a8c2201f

      SHA512

      295e9e3e8505177ff87831d2d33ee34c514ab21a414978147b4d6613b24035b6e30a093412d350fdd125773c3812be1075460870223d15f1ecb7909f41d4c1a3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\lM3bB7bb.exe

      Filesize

      417KB

      MD5

      41909123ce4ea83cc310415939150ce5

      SHA1

      a104239e7bd97961fda2a01601a4dd72be4c6c96

      SHA256

      240e71f111c8f46a50b9297b0ac8fe827a3168748929e3ed27057623a8c2201f

      SHA512

      295e9e3e8505177ff87831d2d33ee34c514ab21a414978147b4d6613b24035b6e30a093412d350fdd125773c3812be1075460870223d15f1ecb7909f41d4c1a3

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\bp4jT9uM.exe

      Filesize

      1.0MB

      MD5

      0de88f2323b3be2f7251a375c6ab33eb

      SHA1

      c2df2bfd944c4657852453a6ed13f17caac66ee1

      SHA256

      cd5a05c82fe99d0ed411a0cf607ee2688503afb261324c41c00ef1362bd39925

      SHA512

      ddfd7d505be7985a3e63051826f5e690c5cd804b1010f81d835b2383382e205dc0f8270d87b971664b7d39761dc723bcedd2f541509413d538bb174d1833bd87

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\bp4jT9uM.exe

      Filesize

      1.0MB

      MD5

      0de88f2323b3be2f7251a375c6ab33eb

      SHA1

      c2df2bfd944c4657852453a6ed13f17caac66ee1

      SHA256

      cd5a05c82fe99d0ed411a0cf607ee2688503afb261324c41c00ef1362bd39925

      SHA512

      ddfd7d505be7985a3e63051826f5e690c5cd804b1010f81d835b2383382e205dc0f8270d87b971664b7d39761dc723bcedd2f541509413d538bb174d1833bd87

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\gL6SV5Id.exe

      Filesize

      884KB

      MD5

      5c1827e55024ec63ae47e5b2ca74475c

      SHA1

      641488787215a8dc76ae923618b583cd79986c18

      SHA256

      f90993ac8df46bf0533cb3871e45ac820ba1335acd386c6e08db61219a145048

      SHA512

      df09cb8871ac2c12998dd525971e78c20483c3ef96506c3b363e06af4570eef77d21be2bd1268a2584825a568d10042bc8bc8cec44cf6ca385403990dab5fd46

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\gL6SV5Id.exe

      Filesize

      884KB

      MD5

      5c1827e55024ec63ae47e5b2ca74475c

      SHA1

      641488787215a8dc76ae923618b583cd79986c18

      SHA256

      f90993ac8df46bf0533cb3871e45ac820ba1335acd386c6e08db61219a145048

      SHA512

      df09cb8871ac2c12998dd525971e78c20483c3ef96506c3b363e06af4570eef77d21be2bd1268a2584825a568d10042bc8bc8cec44cf6ca385403990dab5fd46

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\tA7nA7gg.exe

      Filesize

      590KB

      MD5

      54046877820bfb21b87a3bc46e7f876d

      SHA1

      35e32b28887c35cc5da7e20e1b83dd8576560458

      SHA256

      5eda5cbcc20aeafe1e47dae80b4d26187fd4376320348504a1e9b75b91c454b2

      SHA512

      4081b00f3821209de9ef11d607f53f7c4f7d0190883ae7032a83cc79111c21529e937269da4dd13c3912d8bb59ce5f6be2f85d7da3bda5b7e4790b5ffe52c286

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\tA7nA7gg.exe

      Filesize

      590KB

      MD5

      54046877820bfb21b87a3bc46e7f876d

      SHA1

      35e32b28887c35cc5da7e20e1b83dd8576560458

      SHA256

      5eda5cbcc20aeafe1e47dae80b4d26187fd4376320348504a1e9b75b91c454b2

      SHA512

      4081b00f3821209de9ef11d607f53f7c4f7d0190883ae7032a83cc79111c21529e937269da4dd13c3912d8bb59ce5f6be2f85d7da3bda5b7e4790b5ffe52c286

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\lM3bB7bb.exe

      Filesize

      417KB

      MD5

      41909123ce4ea83cc310415939150ce5

      SHA1

      a104239e7bd97961fda2a01601a4dd72be4c6c96

      SHA256

      240e71f111c8f46a50b9297b0ac8fe827a3168748929e3ed27057623a8c2201f

      SHA512

      295e9e3e8505177ff87831d2d33ee34c514ab21a414978147b4d6613b24035b6e30a093412d350fdd125773c3812be1075460870223d15f1ecb7909f41d4c1a3

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\lM3bB7bb.exe

      Filesize

      417KB

      MD5

      41909123ce4ea83cc310415939150ce5

      SHA1

      a104239e7bd97961fda2a01601a4dd72be4c6c96

      SHA256

      240e71f111c8f46a50b9297b0ac8fe827a3168748929e3ed27057623a8c2201f

      SHA512

      295e9e3e8505177ff87831d2d33ee34c514ab21a414978147b4d6613b24035b6e30a093412d350fdd125773c3812be1075460870223d15f1ecb7909f41d4c1a3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Qn12uh3.exe

      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • memory/2848-62-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-66-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-64-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-60-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-67-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2848-53-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-55-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-57-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-58-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-59-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2848-72-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB