Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 10:54

General

  • Target

    NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe

  • Size

    1.2MB

  • MD5

    d4c23a8329fba7a56eba2411789af75b

  • SHA1

    48a51891d5b1d6ad63f89667cc2a287a2932d50b

  • SHA256

    19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1

  • SHA512

    109ec8832cdeef157055d29b73245265cc762ba6062ac74ccd7a7108c116980f47c4fa03d667abe4c1d884f19870acf072affa344c5e1c563ceefd991747357a

  • SSDEEP

    24576:8ysAqymZQP8sKZLI18NbVf6TG4M+EveufkpkDGPdRR1+Pgpctoayo6:rXVmK8DIib9GGjYkDGlf2CcaaX

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.19b4682054ef64045fbab452b18ade9e55da70fe53672e1db5b0ce8193e0e0d1_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fu2Ak8bR.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fu2Ak8bR.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ya3yB3iA.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ya3yB3iA.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD2wO7IY.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD2wO7IY.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1612
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jP8oc3au.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jP8oc3au.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2220
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2680
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2520
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 292
                    7⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2496

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fu2Ak8bR.exe

              Filesize

              1.0MB

              MD5

              e43be75a2f38702536ae8be892f6071d

              SHA1

              58fe2f1a9f866b0d6bc969a5ba33725af7024533

              SHA256

              2da199a6f930f6e21e1a38141135c378d1671180150168c9b39bcebca5f4f843

              SHA512

              04c3e3a012f578c7764d854301413828db9ccc48a124b70d86d6241d9e99aca1a20a831e02777db030d8094cfa724659bb6ef9cbb21d520fa00878cec719b4d7

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fu2Ak8bR.exe

              Filesize

              1.0MB

              MD5

              e43be75a2f38702536ae8be892f6071d

              SHA1

              58fe2f1a9f866b0d6bc969a5ba33725af7024533

              SHA256

              2da199a6f930f6e21e1a38141135c378d1671180150168c9b39bcebca5f4f843

              SHA512

              04c3e3a012f578c7764d854301413828db9ccc48a124b70d86d6241d9e99aca1a20a831e02777db030d8094cfa724659bb6ef9cbb21d520fa00878cec719b4d7

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ya3yB3iA.exe

              Filesize

              884KB

              MD5

              228cb70f255bdc745281fb629abd4e8b

              SHA1

              93974da5723d28de8b6bcb0ede4913e2569f0fdf

              SHA256

              99616d7e672460dbdc71551358ea4077c8cf32e61a3463102c720089cd47cfb3

              SHA512

              940d719887486b6e9e34fbf43ca49c641e41c1b774759f3aa9bdb9f55f62498dc00aeff05bc9e26c2ee2b24f9db77477e180b886e82b945d4c9033c2f8c21b1d

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ya3yB3iA.exe

              Filesize

              884KB

              MD5

              228cb70f255bdc745281fb629abd4e8b

              SHA1

              93974da5723d28de8b6bcb0ede4913e2569f0fdf

              SHA256

              99616d7e672460dbdc71551358ea4077c8cf32e61a3463102c720089cd47cfb3

              SHA512

              940d719887486b6e9e34fbf43ca49c641e41c1b774759f3aa9bdb9f55f62498dc00aeff05bc9e26c2ee2b24f9db77477e180b886e82b945d4c9033c2f8c21b1d

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD2wO7IY.exe

              Filesize

              590KB

              MD5

              d1e013a0dd079d63fff41c5869f6c9b8

              SHA1

              a10c675a23af4065cb1f9fe5438562475af5a33a

              SHA256

              e0857614821609f94115398af9c3c968d93233059200e06cd13657f74413c07f

              SHA512

              c793b24dc5cce007c0d9fd9e63bdc6881451ff5122a39a2514e8526323f20dcbad9ffa05ce43c1f368d2fa9b422c47bcf810179b8c808a9c279e21113e3b90e5

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD2wO7IY.exe

              Filesize

              590KB

              MD5

              d1e013a0dd079d63fff41c5869f6c9b8

              SHA1

              a10c675a23af4065cb1f9fe5438562475af5a33a

              SHA256

              e0857614821609f94115398af9c3c968d93233059200e06cd13657f74413c07f

              SHA512

              c793b24dc5cce007c0d9fd9e63bdc6881451ff5122a39a2514e8526323f20dcbad9ffa05ce43c1f368d2fa9b422c47bcf810179b8c808a9c279e21113e3b90e5

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jP8oc3au.exe

              Filesize

              417KB

              MD5

              dc9fb4bb8393ba6dcb939b1d41ed6657

              SHA1

              25644b7cae0af1c5f5f3484628aa2501af0c2ff9

              SHA256

              3d3ec00ea2b8ab79113364ec7074e93e9d8e31bc97a952a663a80c44060313f8

              SHA512

              890d6236e712f999f4faa4718c97f71023b65e86c41b8774de07500159984ab498d82d9b6ab6c3cac1a20148801d83db4adbf5839e42b822fb4679adc536efe7

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\jP8oc3au.exe

              Filesize

              417KB

              MD5

              dc9fb4bb8393ba6dcb939b1d41ed6657

              SHA1

              25644b7cae0af1c5f5f3484628aa2501af0c2ff9

              SHA256

              3d3ec00ea2b8ab79113364ec7074e93e9d8e31bc97a952a663a80c44060313f8

              SHA512

              890d6236e712f999f4faa4718c97f71023b65e86c41b8774de07500159984ab498d82d9b6ab6c3cac1a20148801d83db4adbf5839e42b822fb4679adc536efe7

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fu2Ak8bR.exe

              Filesize

              1.0MB

              MD5

              e43be75a2f38702536ae8be892f6071d

              SHA1

              58fe2f1a9f866b0d6bc969a5ba33725af7024533

              SHA256

              2da199a6f930f6e21e1a38141135c378d1671180150168c9b39bcebca5f4f843

              SHA512

              04c3e3a012f578c7764d854301413828db9ccc48a124b70d86d6241d9e99aca1a20a831e02777db030d8094cfa724659bb6ef9cbb21d520fa00878cec719b4d7

            • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fu2Ak8bR.exe

              Filesize

              1.0MB

              MD5

              e43be75a2f38702536ae8be892f6071d

              SHA1

              58fe2f1a9f866b0d6bc969a5ba33725af7024533

              SHA256

              2da199a6f930f6e21e1a38141135c378d1671180150168c9b39bcebca5f4f843

              SHA512

              04c3e3a012f578c7764d854301413828db9ccc48a124b70d86d6241d9e99aca1a20a831e02777db030d8094cfa724659bb6ef9cbb21d520fa00878cec719b4d7

            • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Ya3yB3iA.exe

              Filesize

              884KB

              MD5

              228cb70f255bdc745281fb629abd4e8b

              SHA1

              93974da5723d28de8b6bcb0ede4913e2569f0fdf

              SHA256

              99616d7e672460dbdc71551358ea4077c8cf32e61a3463102c720089cd47cfb3

              SHA512

              940d719887486b6e9e34fbf43ca49c641e41c1b774759f3aa9bdb9f55f62498dc00aeff05bc9e26c2ee2b24f9db77477e180b886e82b945d4c9033c2f8c21b1d

            • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Ya3yB3iA.exe

              Filesize

              884KB

              MD5

              228cb70f255bdc745281fb629abd4e8b

              SHA1

              93974da5723d28de8b6bcb0ede4913e2569f0fdf

              SHA256

              99616d7e672460dbdc71551358ea4077c8cf32e61a3463102c720089cd47cfb3

              SHA512

              940d719887486b6e9e34fbf43ca49c641e41c1b774759f3aa9bdb9f55f62498dc00aeff05bc9e26c2ee2b24f9db77477e180b886e82b945d4c9033c2f8c21b1d

            • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD2wO7IY.exe

              Filesize

              590KB

              MD5

              d1e013a0dd079d63fff41c5869f6c9b8

              SHA1

              a10c675a23af4065cb1f9fe5438562475af5a33a

              SHA256

              e0857614821609f94115398af9c3c968d93233059200e06cd13657f74413c07f

              SHA512

              c793b24dc5cce007c0d9fd9e63bdc6881451ff5122a39a2514e8526323f20dcbad9ffa05ce43c1f368d2fa9b422c47bcf810179b8c808a9c279e21113e3b90e5

            • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ZD2wO7IY.exe

              Filesize

              590KB

              MD5

              d1e013a0dd079d63fff41c5869f6c9b8

              SHA1

              a10c675a23af4065cb1f9fe5438562475af5a33a

              SHA256

              e0857614821609f94115398af9c3c968d93233059200e06cd13657f74413c07f

              SHA512

              c793b24dc5cce007c0d9fd9e63bdc6881451ff5122a39a2514e8526323f20dcbad9ffa05ce43c1f368d2fa9b422c47bcf810179b8c808a9c279e21113e3b90e5

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\jP8oc3au.exe

              Filesize

              417KB

              MD5

              dc9fb4bb8393ba6dcb939b1d41ed6657

              SHA1

              25644b7cae0af1c5f5f3484628aa2501af0c2ff9

              SHA256

              3d3ec00ea2b8ab79113364ec7074e93e9d8e31bc97a952a663a80c44060313f8

              SHA512

              890d6236e712f999f4faa4718c97f71023b65e86c41b8774de07500159984ab498d82d9b6ab6c3cac1a20148801d83db4adbf5839e42b822fb4679adc536efe7

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\jP8oc3au.exe

              Filesize

              417KB

              MD5

              dc9fb4bb8393ba6dcb939b1d41ed6657

              SHA1

              25644b7cae0af1c5f5f3484628aa2501af0c2ff9

              SHA256

              3d3ec00ea2b8ab79113364ec7074e93e9d8e31bc97a952a663a80c44060313f8

              SHA512

              890d6236e712f999f4faa4718c97f71023b65e86c41b8774de07500159984ab498d82d9b6ab6c3cac1a20148801d83db4adbf5839e42b822fb4679adc536efe7

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1zI67Cl5.exe

              Filesize

              378KB

              MD5

              f0831f173733de08511f3a0739f278a6

              SHA1

              06dc809d653c5d2c97386084ae13b50a73eb5b60

              SHA256

              8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

              SHA512

              19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

            • memory/2520-57-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-59-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-58-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-62-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-64-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-66-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-67-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

              Filesize

              4KB

            • memory/2520-60-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-55-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-53-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB

            • memory/2520-72-0x0000000000400000-0x0000000000428000-memory.dmp

              Filesize

              160KB