Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 11:47

General

  • Target

    NEAS.46684b490d4eb97695320700dd3d11c4179e0b6ff02dbe1096e7ef1b285a39b7_JC.exe

  • Size

    1.2MB

  • MD5

    4282879a7476bad218d36efb1e6be79a

  • SHA1

    99fbb8927f550eb95968cc2b4ebcbf794b819724

  • SHA256

    46684b490d4eb97695320700dd3d11c4179e0b6ff02dbe1096e7ef1b285a39b7

  • SHA512

    934c0585cbb94b719be9cd1682a6520728ca0859a77aca5f3823fa135e2ae26a5c1b5e923194e6c1d9e934112ed2f8348c3cefd0ecf6823b0062ac460d4b7608

  • SSDEEP

    24576:myQE/Lp8E3ZEnYYWU+vH/cBMfLuqHGqpCVOZ3C8iEr6W0VNsbp:1Qkl8xnYYVOcfmNrCXVm

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.46684b490d4eb97695320700dd3d11c4179e0b6ff02dbe1096e7ef1b285a39b7_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.46684b490d4eb97695320700dd3d11c4179e0b6ff02dbe1096e7ef1b285a39b7_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DB0Sa5gO.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DB0Sa5gO.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mj9mc4tw.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mj9mc4tw.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WY0TD8gS.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WY0TD8gS.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\df5zO8SI.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\df5zO8SI.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2268
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2632
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 268
                  8⤵
                  • Program crash
                  PID:2540
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DB0Sa5gO.exe

    Filesize

    1.0MB

    MD5

    d6a45b154023a35cbfa3fdb18f4a1ad7

    SHA1

    3d74aea6b9a6eb7599d378f4978f3d67c078e3f4

    SHA256

    91908f5458327e5d6bc8aa519568503a38307b7ee5c0bce2a7537c64fedb78c5

    SHA512

    ced8b5024aaa1dbbd390a279d2870d40a62bb62f163228f7529c39634d596577151704c070e805f32b0112919a3403b5d700471ea69fa996a5d5fdfe8b5d9c42

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DB0Sa5gO.exe

    Filesize

    1.0MB

    MD5

    d6a45b154023a35cbfa3fdb18f4a1ad7

    SHA1

    3d74aea6b9a6eb7599d378f4978f3d67c078e3f4

    SHA256

    91908f5458327e5d6bc8aa519568503a38307b7ee5c0bce2a7537c64fedb78c5

    SHA512

    ced8b5024aaa1dbbd390a279d2870d40a62bb62f163228f7529c39634d596577151704c070e805f32b0112919a3403b5d700471ea69fa996a5d5fdfe8b5d9c42

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mj9mc4tw.exe

    Filesize

    884KB

    MD5

    c333055afa948f4216511b1435fbfa8b

    SHA1

    c3bebb80d4ecaca464b80bd5858b9def1d7191fa

    SHA256

    709f171bb10a4752d666eb416109523c8fd3c54d34349d3575ac5f97d126d022

    SHA512

    9b06c68d9c07ce84b47986d41553c2a9b95bcf41b7b2f788c18f5ed4ee84c2ea9b71f612eeafc745966566dd713cc0b432dad27d120a7bdea044d4b9bb13c2b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mj9mc4tw.exe

    Filesize

    884KB

    MD5

    c333055afa948f4216511b1435fbfa8b

    SHA1

    c3bebb80d4ecaca464b80bd5858b9def1d7191fa

    SHA256

    709f171bb10a4752d666eb416109523c8fd3c54d34349d3575ac5f97d126d022

    SHA512

    9b06c68d9c07ce84b47986d41553c2a9b95bcf41b7b2f788c18f5ed4ee84c2ea9b71f612eeafc745966566dd713cc0b432dad27d120a7bdea044d4b9bb13c2b4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WY0TD8gS.exe

    Filesize

    590KB

    MD5

    f01698dab6c802aa09cd6669337603b0

    SHA1

    dfe6fadf64f1fadacf35bcd126fb24e7a4c5ada9

    SHA256

    cfbe72b0137c28154cb852bde6efb07f0972faf0f82eefb1b7bc12da0a4fe0ef

    SHA512

    f00e04ca553ae3fa29b2a5c53f26cfc2a65c32b8e4c192247db1893b493c440189d8a780bb498d95c0acbf68d876f99b1d91b6a31267a6f1f8d27615f1b5ec7b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WY0TD8gS.exe

    Filesize

    590KB

    MD5

    f01698dab6c802aa09cd6669337603b0

    SHA1

    dfe6fadf64f1fadacf35bcd126fb24e7a4c5ada9

    SHA256

    cfbe72b0137c28154cb852bde6efb07f0972faf0f82eefb1b7bc12da0a4fe0ef

    SHA512

    f00e04ca553ae3fa29b2a5c53f26cfc2a65c32b8e4c192247db1893b493c440189d8a780bb498d95c0acbf68d876f99b1d91b6a31267a6f1f8d27615f1b5ec7b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\df5zO8SI.exe

    Filesize

    417KB

    MD5

    c2c40d1ecb677cadc1245f5a1cc04a88

    SHA1

    94fa8e98c6ef8f3f03b23d93c70f7a6b1912fc28

    SHA256

    4524890731b032838da5fb2745b8383c8c56ce6c1c35015d423fee310691a3fb

    SHA512

    ab2e21d4081856f0113d1e8222ed8c1d820b8493817b15ed9f9377ac442fa182e60d02bd90dd22d4e3e5649e18d45ceebd13e55b6049af876838a691beb99764

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\df5zO8SI.exe

    Filesize

    417KB

    MD5

    c2c40d1ecb677cadc1245f5a1cc04a88

    SHA1

    94fa8e98c6ef8f3f03b23d93c70f7a6b1912fc28

    SHA256

    4524890731b032838da5fb2745b8383c8c56ce6c1c35015d423fee310691a3fb

    SHA512

    ab2e21d4081856f0113d1e8222ed8c1d820b8493817b15ed9f9377ac442fa182e60d02bd90dd22d4e3e5649e18d45ceebd13e55b6049af876838a691beb99764

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\DB0Sa5gO.exe

    Filesize

    1.0MB

    MD5

    d6a45b154023a35cbfa3fdb18f4a1ad7

    SHA1

    3d74aea6b9a6eb7599d378f4978f3d67c078e3f4

    SHA256

    91908f5458327e5d6bc8aa519568503a38307b7ee5c0bce2a7537c64fedb78c5

    SHA512

    ced8b5024aaa1dbbd390a279d2870d40a62bb62f163228f7529c39634d596577151704c070e805f32b0112919a3403b5d700471ea69fa996a5d5fdfe8b5d9c42

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\DB0Sa5gO.exe

    Filesize

    1.0MB

    MD5

    d6a45b154023a35cbfa3fdb18f4a1ad7

    SHA1

    3d74aea6b9a6eb7599d378f4978f3d67c078e3f4

    SHA256

    91908f5458327e5d6bc8aa519568503a38307b7ee5c0bce2a7537c64fedb78c5

    SHA512

    ced8b5024aaa1dbbd390a279d2870d40a62bb62f163228f7529c39634d596577151704c070e805f32b0112919a3403b5d700471ea69fa996a5d5fdfe8b5d9c42

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\mj9mc4tw.exe

    Filesize

    884KB

    MD5

    c333055afa948f4216511b1435fbfa8b

    SHA1

    c3bebb80d4ecaca464b80bd5858b9def1d7191fa

    SHA256

    709f171bb10a4752d666eb416109523c8fd3c54d34349d3575ac5f97d126d022

    SHA512

    9b06c68d9c07ce84b47986d41553c2a9b95bcf41b7b2f788c18f5ed4ee84c2ea9b71f612eeafc745966566dd713cc0b432dad27d120a7bdea044d4b9bb13c2b4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\mj9mc4tw.exe

    Filesize

    884KB

    MD5

    c333055afa948f4216511b1435fbfa8b

    SHA1

    c3bebb80d4ecaca464b80bd5858b9def1d7191fa

    SHA256

    709f171bb10a4752d666eb416109523c8fd3c54d34349d3575ac5f97d126d022

    SHA512

    9b06c68d9c07ce84b47986d41553c2a9b95bcf41b7b2f788c18f5ed4ee84c2ea9b71f612eeafc745966566dd713cc0b432dad27d120a7bdea044d4b9bb13c2b4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\WY0TD8gS.exe

    Filesize

    590KB

    MD5

    f01698dab6c802aa09cd6669337603b0

    SHA1

    dfe6fadf64f1fadacf35bcd126fb24e7a4c5ada9

    SHA256

    cfbe72b0137c28154cb852bde6efb07f0972faf0f82eefb1b7bc12da0a4fe0ef

    SHA512

    f00e04ca553ae3fa29b2a5c53f26cfc2a65c32b8e4c192247db1893b493c440189d8a780bb498d95c0acbf68d876f99b1d91b6a31267a6f1f8d27615f1b5ec7b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\WY0TD8gS.exe

    Filesize

    590KB

    MD5

    f01698dab6c802aa09cd6669337603b0

    SHA1

    dfe6fadf64f1fadacf35bcd126fb24e7a4c5ada9

    SHA256

    cfbe72b0137c28154cb852bde6efb07f0972faf0f82eefb1b7bc12da0a4fe0ef

    SHA512

    f00e04ca553ae3fa29b2a5c53f26cfc2a65c32b8e4c192247db1893b493c440189d8a780bb498d95c0acbf68d876f99b1d91b6a31267a6f1f8d27615f1b5ec7b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\df5zO8SI.exe

    Filesize

    417KB

    MD5

    c2c40d1ecb677cadc1245f5a1cc04a88

    SHA1

    94fa8e98c6ef8f3f03b23d93c70f7a6b1912fc28

    SHA256

    4524890731b032838da5fb2745b8383c8c56ce6c1c35015d423fee310691a3fb

    SHA512

    ab2e21d4081856f0113d1e8222ed8c1d820b8493817b15ed9f9377ac442fa182e60d02bd90dd22d4e3e5649e18d45ceebd13e55b6049af876838a691beb99764

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\df5zO8SI.exe

    Filesize

    417KB

    MD5

    c2c40d1ecb677cadc1245f5a1cc04a88

    SHA1

    94fa8e98c6ef8f3f03b23d93c70f7a6b1912fc28

    SHA256

    4524890731b032838da5fb2745b8383c8c56ce6c1c35015d423fee310691a3fb

    SHA512

    ab2e21d4081856f0113d1e8222ed8c1d820b8493817b15ed9f9377ac442fa182e60d02bd90dd22d4e3e5649e18d45ceebd13e55b6049af876838a691beb99764

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1bL52Sl9.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • memory/2632-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2632-58-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2632-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2632-60-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2632-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2632-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2632-57-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2632-56-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2632-55-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2632-53-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB