Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 12:57

General

  • Target

    NEAS.98c0f97a0364b29a2ba428b4626ca67252f137fc7b82b4bacb0586bd2dd1da69_JC.exe

  • Size

    1.2MB

  • MD5

    87f98456d6afa15c5cb568a6cc5e92d6

  • SHA1

    ffb29b81e510484b4a194dfd286fa0607af6a6e7

  • SHA256

    98c0f97a0364b29a2ba428b4626ca67252f137fc7b82b4bacb0586bd2dd1da69

  • SHA512

    8b5146de1211f214766f6f44098dae0718c9234b38dee677fa299f5e47c746049263fee7ced65fe5ecb866d5214b0a3890326c436f00140712866645772334fd

  • SSDEEP

    24576:pyyMgIwYPpnOGSNhzLBZ99LYYBnSb9dw/+MdWAh8hlB06RA:cyXIhzSN7pLYcWwhWlhw6R

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.98c0f97a0364b29a2ba428b4626ca67252f137fc7b82b4bacb0586bd2dd1da69_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.98c0f97a0364b29a2ba428b4626ca67252f137fc7b82b4bacb0586bd2dd1da69_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pm0DM2LW.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pm0DM2LW.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lv4FT9kD.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lv4FT9kD.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr4tu6JZ.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr4tu6JZ.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2200
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\DB1Pp1Ri.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\DB1Pp1Ri.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2552
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2744
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 268
                  8⤵
                  • Program crash
                  PID:3016
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pm0DM2LW.exe
    Filesize

    1.0MB

    MD5

    20974704d14f3374f861df2f0b7a35c6

    SHA1

    c090bd23d6ada7596dced50bfe1f62a0a3dbd553

    SHA256

    2b4d0e4400747c26965b6e79812d4fc5cd0a1c82e646236fa96562d464ddb6af

    SHA512

    a22f8deada6d7086fb812c9e92359684c2040679dc997c61789fc7a2d6e7a68d6aba60c7ff8b95156f15bf7a7ae75b84dbcc15575b49a0ed9fa575cba08f3686

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pm0DM2LW.exe
    Filesize

    1.0MB

    MD5

    20974704d14f3374f861df2f0b7a35c6

    SHA1

    c090bd23d6ada7596dced50bfe1f62a0a3dbd553

    SHA256

    2b4d0e4400747c26965b6e79812d4fc5cd0a1c82e646236fa96562d464ddb6af

    SHA512

    a22f8deada6d7086fb812c9e92359684c2040679dc997c61789fc7a2d6e7a68d6aba60c7ff8b95156f15bf7a7ae75b84dbcc15575b49a0ed9fa575cba08f3686

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lv4FT9kD.exe
    Filesize

    884KB

    MD5

    46e06c09b9f16ec6e9b95bafafd5ea22

    SHA1

    0dd1823de1c5c991f7481f9e09d60907ae8d4ff4

    SHA256

    97297cdfd88874319a62126f8ed57eb0131779655b6e449dae216b90102ca7ce

    SHA512

    6ab750f33d3e4b5db22428161e5e91f8c92d89f241f7f824d22026cda7f086e74ce1f8aabafe2290582fa1bf606a77624ea144430762c0c515119f1f43c86a19

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\lv4FT9kD.exe
    Filesize

    884KB

    MD5

    46e06c09b9f16ec6e9b95bafafd5ea22

    SHA1

    0dd1823de1c5c991f7481f9e09d60907ae8d4ff4

    SHA256

    97297cdfd88874319a62126f8ed57eb0131779655b6e449dae216b90102ca7ce

    SHA512

    6ab750f33d3e4b5db22428161e5e91f8c92d89f241f7f824d22026cda7f086e74ce1f8aabafe2290582fa1bf606a77624ea144430762c0c515119f1f43c86a19

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr4tu6JZ.exe
    Filesize

    590KB

    MD5

    8e2d8a3646a4f0f5187ee2f573d46b22

    SHA1

    cae31c490550bea13da37d8f4abc35ddc7b2fd41

    SHA256

    fe197a93fd50c8bc3e88680ec851f8c522d2d06032ddcad30ac4713e58a53bb0

    SHA512

    5a6e299f5462deca51d2017e8faa20df03dc546a9cedfc1be582f7000d77c8f221110840ec0d58ef8286556f362af31b839a4ac9d38686bee649e76033f4a29b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr4tu6JZ.exe
    Filesize

    590KB

    MD5

    8e2d8a3646a4f0f5187ee2f573d46b22

    SHA1

    cae31c490550bea13da37d8f4abc35ddc7b2fd41

    SHA256

    fe197a93fd50c8bc3e88680ec851f8c522d2d06032ddcad30ac4713e58a53bb0

    SHA512

    5a6e299f5462deca51d2017e8faa20df03dc546a9cedfc1be582f7000d77c8f221110840ec0d58ef8286556f362af31b839a4ac9d38686bee649e76033f4a29b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\DB1Pp1Ri.exe
    Filesize

    418KB

    MD5

    2d98fed18ecefa90f7913da43b9acbdf

    SHA1

    198d99595839078fbafa9dde9fbc77e249edb025

    SHA256

    8116c2c161389ab9ba7a9d9b980d1a2746ce0426c4770adb6c3b104313fd5128

    SHA512

    d24d041ab6586b28a24923ec4fa14e744193dbc149036ffe5b4381bc89c30c58c52d2f027a8c027b44a31cb921345351081e667b80bfe2bedda83fabd806c068

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\DB1Pp1Ri.exe
    Filesize

    418KB

    MD5

    2d98fed18ecefa90f7913da43b9acbdf

    SHA1

    198d99595839078fbafa9dde9fbc77e249edb025

    SHA256

    8116c2c161389ab9ba7a9d9b980d1a2746ce0426c4770adb6c3b104313fd5128

    SHA512

    d24d041ab6586b28a24923ec4fa14e744193dbc149036ffe5b4381bc89c30c58c52d2f027a8c027b44a31cb921345351081e667b80bfe2bedda83fabd806c068

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\pm0DM2LW.exe
    Filesize

    1.0MB

    MD5

    20974704d14f3374f861df2f0b7a35c6

    SHA1

    c090bd23d6ada7596dced50bfe1f62a0a3dbd553

    SHA256

    2b4d0e4400747c26965b6e79812d4fc5cd0a1c82e646236fa96562d464ddb6af

    SHA512

    a22f8deada6d7086fb812c9e92359684c2040679dc997c61789fc7a2d6e7a68d6aba60c7ff8b95156f15bf7a7ae75b84dbcc15575b49a0ed9fa575cba08f3686

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\pm0DM2LW.exe
    Filesize

    1.0MB

    MD5

    20974704d14f3374f861df2f0b7a35c6

    SHA1

    c090bd23d6ada7596dced50bfe1f62a0a3dbd553

    SHA256

    2b4d0e4400747c26965b6e79812d4fc5cd0a1c82e646236fa96562d464ddb6af

    SHA512

    a22f8deada6d7086fb812c9e92359684c2040679dc997c61789fc7a2d6e7a68d6aba60c7ff8b95156f15bf7a7ae75b84dbcc15575b49a0ed9fa575cba08f3686

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\lv4FT9kD.exe
    Filesize

    884KB

    MD5

    46e06c09b9f16ec6e9b95bafafd5ea22

    SHA1

    0dd1823de1c5c991f7481f9e09d60907ae8d4ff4

    SHA256

    97297cdfd88874319a62126f8ed57eb0131779655b6e449dae216b90102ca7ce

    SHA512

    6ab750f33d3e4b5db22428161e5e91f8c92d89f241f7f824d22026cda7f086e74ce1f8aabafe2290582fa1bf606a77624ea144430762c0c515119f1f43c86a19

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\lv4FT9kD.exe
    Filesize

    884KB

    MD5

    46e06c09b9f16ec6e9b95bafafd5ea22

    SHA1

    0dd1823de1c5c991f7481f9e09d60907ae8d4ff4

    SHA256

    97297cdfd88874319a62126f8ed57eb0131779655b6e449dae216b90102ca7ce

    SHA512

    6ab750f33d3e4b5db22428161e5e91f8c92d89f241f7f824d22026cda7f086e74ce1f8aabafe2290582fa1bf606a77624ea144430762c0c515119f1f43c86a19

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\jr4tu6JZ.exe
    Filesize

    590KB

    MD5

    8e2d8a3646a4f0f5187ee2f573d46b22

    SHA1

    cae31c490550bea13da37d8f4abc35ddc7b2fd41

    SHA256

    fe197a93fd50c8bc3e88680ec851f8c522d2d06032ddcad30ac4713e58a53bb0

    SHA512

    5a6e299f5462deca51d2017e8faa20df03dc546a9cedfc1be582f7000d77c8f221110840ec0d58ef8286556f362af31b839a4ac9d38686bee649e76033f4a29b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\jr4tu6JZ.exe
    Filesize

    590KB

    MD5

    8e2d8a3646a4f0f5187ee2f573d46b22

    SHA1

    cae31c490550bea13da37d8f4abc35ddc7b2fd41

    SHA256

    fe197a93fd50c8bc3e88680ec851f8c522d2d06032ddcad30ac4713e58a53bb0

    SHA512

    5a6e299f5462deca51d2017e8faa20df03dc546a9cedfc1be582f7000d77c8f221110840ec0d58ef8286556f362af31b839a4ac9d38686bee649e76033f4a29b

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\DB1Pp1Ri.exe
    Filesize

    418KB

    MD5

    2d98fed18ecefa90f7913da43b9acbdf

    SHA1

    198d99595839078fbafa9dde9fbc77e249edb025

    SHA256

    8116c2c161389ab9ba7a9d9b980d1a2746ce0426c4770adb6c3b104313fd5128

    SHA512

    d24d041ab6586b28a24923ec4fa14e744193dbc149036ffe5b4381bc89c30c58c52d2f027a8c027b44a31cb921345351081e667b80bfe2bedda83fabd806c068

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\DB1Pp1Ri.exe
    Filesize

    418KB

    MD5

    2d98fed18ecefa90f7913da43b9acbdf

    SHA1

    198d99595839078fbafa9dde9fbc77e249edb025

    SHA256

    8116c2c161389ab9ba7a9d9b980d1a2746ce0426c4770adb6c3b104313fd5128

    SHA512

    d24d041ab6586b28a24923ec4fa14e744193dbc149036ffe5b4381bc89c30c58c52d2f027a8c027b44a31cb921345351081e667b80bfe2bedda83fabd806c068

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1AK45dU5.exe
    Filesize

    378KB

    MD5

    f809693c5a7be5acc56a3d9e3a53639c

    SHA1

    c03ea64ef32c5daa015e58c8366c84726a55dc10

    SHA256

    ea25709056671ef10bc5266a481a9331397e65ea5537989982c415a2416264c4

    SHA512

    3a50f537986f08d0ba5e1cf9cb66f7b7b0f3dad8f1a2e8125e09119c1959593a63c8614616c581c38c73978da2b8bfd47aca1b0edb86c11a5597853bb819002e

  • memory/2744-54-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2744-58-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2744-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2744-60-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2744-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2744-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2744-57-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2744-56-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2744-55-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2744-53-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB