Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 10:38

General

  • Target

    NEAS.05d037a65fe901edd329535b1f62c90fefd46fcd65b0044f950d1844f99d27f4_JC.exe

  • Size

    1.2MB

  • MD5

    f272d825d247bd60c96eae236420a4cc

  • SHA1

    83f48ef21e0ba65b7e3fee6faac5a2d6d5812d3b

  • SHA256

    05d037a65fe901edd329535b1f62c90fefd46fcd65b0044f950d1844f99d27f4

  • SHA512

    f779f19f35de26040336baed268c4a1dfadd9ab4cf59579910ccc88dd5ea88643c6f001824231113a4f838f8ff9f2fafcdeccfbdac7aa719e6e455cd2040282c

  • SSDEEP

    24576:MylGo/GvDR9is74yLtIwul++Ux1skVKVqoKxiv5V+JVDt:7lGo/iV9isxtIFuPTUkIvPEVD

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.05d037a65fe901edd329535b1f62c90fefd46fcd65b0044f950d1844f99d27f4_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.05d037a65fe901edd329535b1f62c90fefd46fcd65b0044f950d1844f99d27f4_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cl8jf5yh.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cl8jf5yh.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ln7ul6in.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ln7ul6in.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gB8gl7JH.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gB8gl7JH.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Gi7GU6qB.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Gi7GU6qB.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2500
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2520
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 268
                  8⤵
                  • Program crash
                  PID:3004
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2532

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cl8jf5yh.exe

          Filesize

          1.0MB

          MD5

          1f9c0d720b0b1abdbeac457dd54d51aa

          SHA1

          616229bf4822430b844de3a029d93f664e09fdbc

          SHA256

          531566522e7e886640bd168007aafd8dbc7812df38d601f5a417d0a8d207c885

          SHA512

          415d9b7dc9b507da144a440acd3b3134aefe595caf5b79c3736cd09a7b7c4a4d63facf65b2c48f44b6d7bb74ee5c74b50b24b7a098a88960a2ef373e31ffc658

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cl8jf5yh.exe

          Filesize

          1.0MB

          MD5

          1f9c0d720b0b1abdbeac457dd54d51aa

          SHA1

          616229bf4822430b844de3a029d93f664e09fdbc

          SHA256

          531566522e7e886640bd168007aafd8dbc7812df38d601f5a417d0a8d207c885

          SHA512

          415d9b7dc9b507da144a440acd3b3134aefe595caf5b79c3736cd09a7b7c4a4d63facf65b2c48f44b6d7bb74ee5c74b50b24b7a098a88960a2ef373e31ffc658

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ln7ul6in.exe

          Filesize

          884KB

          MD5

          36b3364382bb44fadfc95d7a77007bc8

          SHA1

          91f7c7765ec43829cbeb3183167d154be46ea695

          SHA256

          d0f70685324b0bb354ee7aba893a9933ab39a66739c1d9c87dffd0db3600b73e

          SHA512

          da193c7c1ae2e1af9f75af15137d4224e49e4c0b369d3a2c8cafcc96dc88443f988013e0e5e156e3f4cbac94832b4ab7345787e4c46e7a0bd96acc9603756625

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ln7ul6in.exe

          Filesize

          884KB

          MD5

          36b3364382bb44fadfc95d7a77007bc8

          SHA1

          91f7c7765ec43829cbeb3183167d154be46ea695

          SHA256

          d0f70685324b0bb354ee7aba893a9933ab39a66739c1d9c87dffd0db3600b73e

          SHA512

          da193c7c1ae2e1af9f75af15137d4224e49e4c0b369d3a2c8cafcc96dc88443f988013e0e5e156e3f4cbac94832b4ab7345787e4c46e7a0bd96acc9603756625

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gB8gl7JH.exe

          Filesize

          590KB

          MD5

          a76c71723cbec00d5cca0699a0acd94c

          SHA1

          433e9bc416a080f6b0f36eb4b694de270164cc15

          SHA256

          09c1907951f7e51d1370a74ddf083a891846660a8f7212d5c584789e5cca620c

          SHA512

          f8917282ad0b24b55d6653a1b4b5bddd4954e5cc9fa04b5cbbd1cc7fd0a88723322b286457a0d5df1c9e809cc6d94567b32e5cb30a83bd7a2b0e3324cfd6e164

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gB8gl7JH.exe

          Filesize

          590KB

          MD5

          a76c71723cbec00d5cca0699a0acd94c

          SHA1

          433e9bc416a080f6b0f36eb4b694de270164cc15

          SHA256

          09c1907951f7e51d1370a74ddf083a891846660a8f7212d5c584789e5cca620c

          SHA512

          f8917282ad0b24b55d6653a1b4b5bddd4954e5cc9fa04b5cbbd1cc7fd0a88723322b286457a0d5df1c9e809cc6d94567b32e5cb30a83bd7a2b0e3324cfd6e164

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Gi7GU6qB.exe

          Filesize

          417KB

          MD5

          f2bcca7fa7cfe2169991dce1ac626b34

          SHA1

          54b08fef5aaabffd0e8c3970f73f5f39b7dd391a

          SHA256

          bfbf416ed1a570dfcb9ae82a98f919799f15495a906bc101b70eb6fa52f9cb73

          SHA512

          db3bf52b25e220a12a0716d01bb5660b51c49b1b2e2156fe9f7ae808ce3ead9d2bce699bd8a96f5a614a33b8210b44fabd9b3e89e8e4709c5cac2883e3ea382b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Gi7GU6qB.exe

          Filesize

          417KB

          MD5

          f2bcca7fa7cfe2169991dce1ac626b34

          SHA1

          54b08fef5aaabffd0e8c3970f73f5f39b7dd391a

          SHA256

          bfbf416ed1a570dfcb9ae82a98f919799f15495a906bc101b70eb6fa52f9cb73

          SHA512

          db3bf52b25e220a12a0716d01bb5660b51c49b1b2e2156fe9f7ae808ce3ead9d2bce699bd8a96f5a614a33b8210b44fabd9b3e89e8e4709c5cac2883e3ea382b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Cl8jf5yh.exe

          Filesize

          1.0MB

          MD5

          1f9c0d720b0b1abdbeac457dd54d51aa

          SHA1

          616229bf4822430b844de3a029d93f664e09fdbc

          SHA256

          531566522e7e886640bd168007aafd8dbc7812df38d601f5a417d0a8d207c885

          SHA512

          415d9b7dc9b507da144a440acd3b3134aefe595caf5b79c3736cd09a7b7c4a4d63facf65b2c48f44b6d7bb74ee5c74b50b24b7a098a88960a2ef373e31ffc658

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Cl8jf5yh.exe

          Filesize

          1.0MB

          MD5

          1f9c0d720b0b1abdbeac457dd54d51aa

          SHA1

          616229bf4822430b844de3a029d93f664e09fdbc

          SHA256

          531566522e7e886640bd168007aafd8dbc7812df38d601f5a417d0a8d207c885

          SHA512

          415d9b7dc9b507da144a440acd3b3134aefe595caf5b79c3736cd09a7b7c4a4d63facf65b2c48f44b6d7bb74ee5c74b50b24b7a098a88960a2ef373e31ffc658

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ln7ul6in.exe

          Filesize

          884KB

          MD5

          36b3364382bb44fadfc95d7a77007bc8

          SHA1

          91f7c7765ec43829cbeb3183167d154be46ea695

          SHA256

          d0f70685324b0bb354ee7aba893a9933ab39a66739c1d9c87dffd0db3600b73e

          SHA512

          da193c7c1ae2e1af9f75af15137d4224e49e4c0b369d3a2c8cafcc96dc88443f988013e0e5e156e3f4cbac94832b4ab7345787e4c46e7a0bd96acc9603756625

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ln7ul6in.exe

          Filesize

          884KB

          MD5

          36b3364382bb44fadfc95d7a77007bc8

          SHA1

          91f7c7765ec43829cbeb3183167d154be46ea695

          SHA256

          d0f70685324b0bb354ee7aba893a9933ab39a66739c1d9c87dffd0db3600b73e

          SHA512

          da193c7c1ae2e1af9f75af15137d4224e49e4c0b369d3a2c8cafcc96dc88443f988013e0e5e156e3f4cbac94832b4ab7345787e4c46e7a0bd96acc9603756625

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\gB8gl7JH.exe

          Filesize

          590KB

          MD5

          a76c71723cbec00d5cca0699a0acd94c

          SHA1

          433e9bc416a080f6b0f36eb4b694de270164cc15

          SHA256

          09c1907951f7e51d1370a74ddf083a891846660a8f7212d5c584789e5cca620c

          SHA512

          f8917282ad0b24b55d6653a1b4b5bddd4954e5cc9fa04b5cbbd1cc7fd0a88723322b286457a0d5df1c9e809cc6d94567b32e5cb30a83bd7a2b0e3324cfd6e164

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\gB8gl7JH.exe

          Filesize

          590KB

          MD5

          a76c71723cbec00d5cca0699a0acd94c

          SHA1

          433e9bc416a080f6b0f36eb4b694de270164cc15

          SHA256

          09c1907951f7e51d1370a74ddf083a891846660a8f7212d5c584789e5cca620c

          SHA512

          f8917282ad0b24b55d6653a1b4b5bddd4954e5cc9fa04b5cbbd1cc7fd0a88723322b286457a0d5df1c9e809cc6d94567b32e5cb30a83bd7a2b0e3324cfd6e164

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\Gi7GU6qB.exe

          Filesize

          417KB

          MD5

          f2bcca7fa7cfe2169991dce1ac626b34

          SHA1

          54b08fef5aaabffd0e8c3970f73f5f39b7dd391a

          SHA256

          bfbf416ed1a570dfcb9ae82a98f919799f15495a906bc101b70eb6fa52f9cb73

          SHA512

          db3bf52b25e220a12a0716d01bb5660b51c49b1b2e2156fe9f7ae808ce3ead9d2bce699bd8a96f5a614a33b8210b44fabd9b3e89e8e4709c5cac2883e3ea382b

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\Gi7GU6qB.exe

          Filesize

          417KB

          MD5

          f2bcca7fa7cfe2169991dce1ac626b34

          SHA1

          54b08fef5aaabffd0e8c3970f73f5f39b7dd391a

          SHA256

          bfbf416ed1a570dfcb9ae82a98f919799f15495a906bc101b70eb6fa52f9cb73

          SHA512

          db3bf52b25e220a12a0716d01bb5660b51c49b1b2e2156fe9f7ae808ce3ead9d2bce699bd8a96f5a614a33b8210b44fabd9b3e89e8e4709c5cac2883e3ea382b

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1XM87iF7.exe

          Filesize

          378KB

          MD5

          7038c9795591ac393c1643de5a4ed343

          SHA1

          5b9d8b649240c4b7f58b3a1d39df942bb31fc4cb

          SHA256

          73599ac081dfbe35630e6611db890f690de26f9a342684aa2ad486559f550804

          SHA512

          3366d56d4970f52d9a787bcff73d0cb6aea86fd9ed05d22b5b317993f6c8ced9ceeb7a0fc9661ab95f7c8b1824b80ec0f30b3b9641327a53b1f1661ea6c25712

        • memory/2520-60-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2520-58-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2520-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2520-62-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2520-64-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2520-66-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2520-56-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2520-55-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2520-54-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/2520-53-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB