Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 11:06

General

  • Target

    NEAS.269b887be354364129afc07fafc0c1bef045ea8b1a50183ea7177a542b708d6bexe_JC.exe

  • Size

    1.1MB

  • MD5

    7c63c1291c8b95aea323be50ba028757

  • SHA1

    f0a5fdafd13a6ce290884519490ccc841f94bdef

  • SHA256

    269b887be354364129afc07fafc0c1bef045ea8b1a50183ea7177a542b708d6b

  • SHA512

    bed08ba5abae50c1c631d665601c7625a16cc0fa76bbaa85d9c1454011e9584aa1e8cf0affa39131cae76d1ac36bd2afc18768723f8c5a2c456f3d8e8dcad6de

  • SSDEEP

    12288:UMrBy90EqaksXidInr1kxsL+nvgDabqS5SPYmWcFz8s5vfziHAxW+LsBlc0b2Jcz:dyI9ddmJ+vgISPBFz86Xzigx6g0EvK

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.269b887be354364129afc07fafc0c1bef045ea8b1a50183ea7177a542b708d6bexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.269b887be354364129afc07fafc0c1bef045ea8b1a50183ea7177a542b708d6bexe_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zw9pR86.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zw9pR86.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sk6XI27.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sk6XI27.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\re2MD16.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\re2MD16.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dw08NC5.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dw08NC5.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2624
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1764
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1408
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 284
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zw9pR86.exe
      Filesize

      991KB

      MD5

      6114801d8ba52c1877e4aabfbdda4e5a

      SHA1

      43c036d067a35ce071129d7cae61feceaea6d698

      SHA256

      6b6c11b1f841ccee1be287eb78399d717e329663d69f3852ec119b4e0d7cec6f

      SHA512

      ea9d2251218e68f7d0e5d6b2857d01e6b74f9e507efc1e05d52a1ec6ec427ab38df26f639240817d3bff3e39e9f98cbe4baaa16b939760d19f196b928836238e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Zw9pR86.exe
      Filesize

      991KB

      MD5

      6114801d8ba52c1877e4aabfbdda4e5a

      SHA1

      43c036d067a35ce071129d7cae61feceaea6d698

      SHA256

      6b6c11b1f841ccee1be287eb78399d717e329663d69f3852ec119b4e0d7cec6f

      SHA512

      ea9d2251218e68f7d0e5d6b2857d01e6b74f9e507efc1e05d52a1ec6ec427ab38df26f639240817d3bff3e39e9f98cbe4baaa16b939760d19f196b928836238e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sk6XI27.exe
      Filesize

      696KB

      MD5

      3b71c00db79374d38a3d272924cb07ff

      SHA1

      164050f406b1392ba7517c95123bcf9ca235f298

      SHA256

      b52263079c6625158e009ab00773a9613148d96f6e81005b0ef038273d0b180b

      SHA512

      2c2a2ff710960fe0e662107f6b9cc4da3b6c62d3f274d418ed7be360dbcf3a3f7ad5a3d455d64397edc7255bbd7c8baf198b455ecc75b95ee174a0ca53c5cfd0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Sk6XI27.exe
      Filesize

      696KB

      MD5

      3b71c00db79374d38a3d272924cb07ff

      SHA1

      164050f406b1392ba7517c95123bcf9ca235f298

      SHA256

      b52263079c6625158e009ab00773a9613148d96f6e81005b0ef038273d0b180b

      SHA512

      2c2a2ff710960fe0e662107f6b9cc4da3b6c62d3f274d418ed7be360dbcf3a3f7ad5a3d455d64397edc7255bbd7c8baf198b455ecc75b95ee174a0ca53c5cfd0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\re2MD16.exe
      Filesize

      452KB

      MD5

      53117d280a4686380119e15e84351482

      SHA1

      a281466c63e00275abc657b60f2511a136a374cd

      SHA256

      ee25dcf0017ff5547e2c1d6bc12e04178beea0553ab68182735f7a56f7c1259d

      SHA512

      24f0d2aee17736d0e2449fe8ad176fc091a95f7c6dba9f6d57de5d34ff0013cc31c14d775a7dacd5428490af5f47ecb6748a0214ab318fdc373c6145deb4ea4d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\re2MD16.exe
      Filesize

      452KB

      MD5

      53117d280a4686380119e15e84351482

      SHA1

      a281466c63e00275abc657b60f2511a136a374cd

      SHA256

      ee25dcf0017ff5547e2c1d6bc12e04178beea0553ab68182735f7a56f7c1259d

      SHA512

      24f0d2aee17736d0e2449fe8ad176fc091a95f7c6dba9f6d57de5d34ff0013cc31c14d775a7dacd5428490af5f47ecb6748a0214ab318fdc373c6145deb4ea4d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dw08NC5.exe
      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dw08NC5.exe
      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Zw9pR86.exe
      Filesize

      991KB

      MD5

      6114801d8ba52c1877e4aabfbdda4e5a

      SHA1

      43c036d067a35ce071129d7cae61feceaea6d698

      SHA256

      6b6c11b1f841ccee1be287eb78399d717e329663d69f3852ec119b4e0d7cec6f

      SHA512

      ea9d2251218e68f7d0e5d6b2857d01e6b74f9e507efc1e05d52a1ec6ec427ab38df26f639240817d3bff3e39e9f98cbe4baaa16b939760d19f196b928836238e

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Zw9pR86.exe
      Filesize

      991KB

      MD5

      6114801d8ba52c1877e4aabfbdda4e5a

      SHA1

      43c036d067a35ce071129d7cae61feceaea6d698

      SHA256

      6b6c11b1f841ccee1be287eb78399d717e329663d69f3852ec119b4e0d7cec6f

      SHA512

      ea9d2251218e68f7d0e5d6b2857d01e6b74f9e507efc1e05d52a1ec6ec427ab38df26f639240817d3bff3e39e9f98cbe4baaa16b939760d19f196b928836238e

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Sk6XI27.exe
      Filesize

      696KB

      MD5

      3b71c00db79374d38a3d272924cb07ff

      SHA1

      164050f406b1392ba7517c95123bcf9ca235f298

      SHA256

      b52263079c6625158e009ab00773a9613148d96f6e81005b0ef038273d0b180b

      SHA512

      2c2a2ff710960fe0e662107f6b9cc4da3b6c62d3f274d418ed7be360dbcf3a3f7ad5a3d455d64397edc7255bbd7c8baf198b455ecc75b95ee174a0ca53c5cfd0

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Sk6XI27.exe
      Filesize

      696KB

      MD5

      3b71c00db79374d38a3d272924cb07ff

      SHA1

      164050f406b1392ba7517c95123bcf9ca235f298

      SHA256

      b52263079c6625158e009ab00773a9613148d96f6e81005b0ef038273d0b180b

      SHA512

      2c2a2ff710960fe0e662107f6b9cc4da3b6c62d3f274d418ed7be360dbcf3a3f7ad5a3d455d64397edc7255bbd7c8baf198b455ecc75b95ee174a0ca53c5cfd0

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\re2MD16.exe
      Filesize

      452KB

      MD5

      53117d280a4686380119e15e84351482

      SHA1

      a281466c63e00275abc657b60f2511a136a374cd

      SHA256

      ee25dcf0017ff5547e2c1d6bc12e04178beea0553ab68182735f7a56f7c1259d

      SHA512

      24f0d2aee17736d0e2449fe8ad176fc091a95f7c6dba9f6d57de5d34ff0013cc31c14d775a7dacd5428490af5f47ecb6748a0214ab318fdc373c6145deb4ea4d

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\re2MD16.exe
      Filesize

      452KB

      MD5

      53117d280a4686380119e15e84351482

      SHA1

      a281466c63e00275abc657b60f2511a136a374cd

      SHA256

      ee25dcf0017ff5547e2c1d6bc12e04178beea0553ab68182735f7a56f7c1259d

      SHA512

      24f0d2aee17736d0e2449fe8ad176fc091a95f7c6dba9f6d57de5d34ff0013cc31c14d775a7dacd5428490af5f47ecb6748a0214ab318fdc373c6145deb4ea4d

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dw08NC5.exe
      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Dw08NC5.exe
      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ml7319.exe
      Filesize

      378KB

      MD5

      7c44ecdf082c96af7c6eb9ea9e244c65

      SHA1

      5dbede97fb3cbfe1fcd39ad34e7a76219abb76b6

      SHA256

      affe22f3c0c88e0f09deb8536e967c21735a23421b4ede24d3d91b499243b042

      SHA512

      867eae6f4a6d348cdb1a1e8c028e25185c264efa9f8013c121f6d1a08a292ee526f5d80f2d04b0ade110e5d7f07f8be6fe22c4f1737ea9f73ad942073e84c1c5

    • memory/1408-79-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-96-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-102-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-97-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-94-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-92-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-91-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/1408-89-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-87-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-85-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-83-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/1408-81-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2624-65-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-53-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-47-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-51-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-67-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-55-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-57-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-59-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-49-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-45-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-69-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-63-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-43-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-42-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB

    • memory/2624-41-0x0000000000C40000-0x0000000000C5C000-memory.dmp
      Filesize

      112KB

    • memory/2624-40-0x00000000003E0000-0x00000000003FE000-memory.dmp
      Filesize

      120KB

    • memory/2624-61-0x0000000000C40000-0x0000000000C56000-memory.dmp
      Filesize

      88KB