Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 13:48

General

  • Target

    NEAS.db1ca000ab9c6c34c355316ae707d790c1d9c6117d99b1d0ca0c8c178240c8ea_JC.exe

  • Size

    1.2MB

  • MD5

    475bde55882d471dffce2077b6067cb2

  • SHA1

    7a54de2341ec642deb689677cc9119c89f67639e

  • SHA256

    db1ca000ab9c6c34c355316ae707d790c1d9c6117d99b1d0ca0c8c178240c8ea

  • SHA512

    86dd01b77055d37752673f13b54f7d4e84f562946f53fd5e161c22d7e98c6c1ffc5d0980c6e84985ba249994b382e9e6e90c645ab3448c830d0fdb67a6068bb7

  • SSDEEP

    24576:Yy4dVc+wuEiIMa9pxnHDqv6F9rulsrq1pb1eNfj:f41sNMa9pZDtF9rbrWb1wf

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.db1ca000ab9c6c34c355316ae707d790c1d9c6117d99b1d0ca0c8c178240c8ea_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.db1ca000ab9c6c34c355316ae707d790c1d9c6117d99b1d0ca0c8c178240c8ea_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\je1hx8bq.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\je1hx8bq.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PE2YJ5SP.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PE2YJ5SP.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZT3ll3un.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZT3ll3un.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sL1la8sd.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sL1la8sd.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2760
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2572
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2500
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2160
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 268
                    8⤵
                    • Program crash
                    PID:2576
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 292
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\je1hx8bq.exe

      Filesize

      1.0MB

      MD5

      89ffd4695c04e410af297ea184138760

      SHA1

      e0a87c0e27fb3fc6dc9e00d0cb49b1640e339163

      SHA256

      80a7f9e96a82731f38fc8de07a24d98701bdf2f3c65245e9fbd8215807de820a

      SHA512

      ef3e08d35329f1728c31a185deee3ec4138df72036d785679a32ac4b6c34a2f43076354f26d5cc551c51fd480db74d332d80cac9cbd33407dfa2e5f57173575c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\je1hx8bq.exe

      Filesize

      1.0MB

      MD5

      89ffd4695c04e410af297ea184138760

      SHA1

      e0a87c0e27fb3fc6dc9e00d0cb49b1640e339163

      SHA256

      80a7f9e96a82731f38fc8de07a24d98701bdf2f3c65245e9fbd8215807de820a

      SHA512

      ef3e08d35329f1728c31a185deee3ec4138df72036d785679a32ac4b6c34a2f43076354f26d5cc551c51fd480db74d332d80cac9cbd33407dfa2e5f57173575c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PE2YJ5SP.exe

      Filesize

      884KB

      MD5

      2e7a5332c0515b652e8815ab66089327

      SHA1

      48705354bd9b3ad5026903f62cf3dc0d87169a60

      SHA256

      d4cb4b0c276ef8796dd87c19c0acbc6f763d529d782f25ad39d0c730c571b8cd

      SHA512

      06f3a212c2bfb5c7143a591aa143491fdf46b0a11d6bfa4ed6925af972bec241d84f15f9b64f1642ba0d8bcd65fedb11e8a4f5262f2c466b829a05660f9434fd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\PE2YJ5SP.exe

      Filesize

      884KB

      MD5

      2e7a5332c0515b652e8815ab66089327

      SHA1

      48705354bd9b3ad5026903f62cf3dc0d87169a60

      SHA256

      d4cb4b0c276ef8796dd87c19c0acbc6f763d529d782f25ad39d0c730c571b8cd

      SHA512

      06f3a212c2bfb5c7143a591aa143491fdf46b0a11d6bfa4ed6925af972bec241d84f15f9b64f1642ba0d8bcd65fedb11e8a4f5262f2c466b829a05660f9434fd

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZT3ll3un.exe

      Filesize

      590KB

      MD5

      397bfd5e26fdf693fef266903896ee82

      SHA1

      5402b95afb9d11e29102e45c709a005b58475f64

      SHA256

      f25b134f6de401a1c97f79132bccb2f5c7697444ca7516dda4f3e778f3261045

      SHA512

      f8c62a5e8d203737b90d4200d12053aa283911b024de481680901922dad696738a20cd310326f20881e602070dfad63db3e71a37075dd26d68c91ecb2f791c9b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZT3ll3un.exe

      Filesize

      590KB

      MD5

      397bfd5e26fdf693fef266903896ee82

      SHA1

      5402b95afb9d11e29102e45c709a005b58475f64

      SHA256

      f25b134f6de401a1c97f79132bccb2f5c7697444ca7516dda4f3e778f3261045

      SHA512

      f8c62a5e8d203737b90d4200d12053aa283911b024de481680901922dad696738a20cd310326f20881e602070dfad63db3e71a37075dd26d68c91ecb2f791c9b

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sL1la8sd.exe

      Filesize

      417KB

      MD5

      6f686dc8b65fbcd2d212aa99b47a7393

      SHA1

      ef5ab7d579e8350e6c647111b623381ef7fc4828

      SHA256

      d3974bed1018b5a46f78005f8be0d4c4bc19b1bad32bce2615801df57c57a5d3

      SHA512

      0e822deedc2161f9af5b43ddeeabd93befe97f0c6fbc9fe54b01d2499e7ccc51499216a24ef73552291b4b8ea46c3826b9edfe2604e1d564a99a1b11fd7cd9ca

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sL1la8sd.exe

      Filesize

      417KB

      MD5

      6f686dc8b65fbcd2d212aa99b47a7393

      SHA1

      ef5ab7d579e8350e6c647111b623381ef7fc4828

      SHA256

      d3974bed1018b5a46f78005f8be0d4c4bc19b1bad32bce2615801df57c57a5d3

      SHA512

      0e822deedc2161f9af5b43ddeeabd93befe97f0c6fbc9fe54b01d2499e7ccc51499216a24ef73552291b4b8ea46c3826b9edfe2604e1d564a99a1b11fd7cd9ca

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\je1hx8bq.exe

      Filesize

      1.0MB

      MD5

      89ffd4695c04e410af297ea184138760

      SHA1

      e0a87c0e27fb3fc6dc9e00d0cb49b1640e339163

      SHA256

      80a7f9e96a82731f38fc8de07a24d98701bdf2f3c65245e9fbd8215807de820a

      SHA512

      ef3e08d35329f1728c31a185deee3ec4138df72036d785679a32ac4b6c34a2f43076354f26d5cc551c51fd480db74d332d80cac9cbd33407dfa2e5f57173575c

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\je1hx8bq.exe

      Filesize

      1.0MB

      MD5

      89ffd4695c04e410af297ea184138760

      SHA1

      e0a87c0e27fb3fc6dc9e00d0cb49b1640e339163

      SHA256

      80a7f9e96a82731f38fc8de07a24d98701bdf2f3c65245e9fbd8215807de820a

      SHA512

      ef3e08d35329f1728c31a185deee3ec4138df72036d785679a32ac4b6c34a2f43076354f26d5cc551c51fd480db74d332d80cac9cbd33407dfa2e5f57173575c

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\PE2YJ5SP.exe

      Filesize

      884KB

      MD5

      2e7a5332c0515b652e8815ab66089327

      SHA1

      48705354bd9b3ad5026903f62cf3dc0d87169a60

      SHA256

      d4cb4b0c276ef8796dd87c19c0acbc6f763d529d782f25ad39d0c730c571b8cd

      SHA512

      06f3a212c2bfb5c7143a591aa143491fdf46b0a11d6bfa4ed6925af972bec241d84f15f9b64f1642ba0d8bcd65fedb11e8a4f5262f2c466b829a05660f9434fd

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\PE2YJ5SP.exe

      Filesize

      884KB

      MD5

      2e7a5332c0515b652e8815ab66089327

      SHA1

      48705354bd9b3ad5026903f62cf3dc0d87169a60

      SHA256

      d4cb4b0c276ef8796dd87c19c0acbc6f763d529d782f25ad39d0c730c571b8cd

      SHA512

      06f3a212c2bfb5c7143a591aa143491fdf46b0a11d6bfa4ed6925af972bec241d84f15f9b64f1642ba0d8bcd65fedb11e8a4f5262f2c466b829a05660f9434fd

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ZT3ll3un.exe

      Filesize

      590KB

      MD5

      397bfd5e26fdf693fef266903896ee82

      SHA1

      5402b95afb9d11e29102e45c709a005b58475f64

      SHA256

      f25b134f6de401a1c97f79132bccb2f5c7697444ca7516dda4f3e778f3261045

      SHA512

      f8c62a5e8d203737b90d4200d12053aa283911b024de481680901922dad696738a20cd310326f20881e602070dfad63db3e71a37075dd26d68c91ecb2f791c9b

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ZT3ll3un.exe

      Filesize

      590KB

      MD5

      397bfd5e26fdf693fef266903896ee82

      SHA1

      5402b95afb9d11e29102e45c709a005b58475f64

      SHA256

      f25b134f6de401a1c97f79132bccb2f5c7697444ca7516dda4f3e778f3261045

      SHA512

      f8c62a5e8d203737b90d4200d12053aa283911b024de481680901922dad696738a20cd310326f20881e602070dfad63db3e71a37075dd26d68c91ecb2f791c9b

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\sL1la8sd.exe

      Filesize

      417KB

      MD5

      6f686dc8b65fbcd2d212aa99b47a7393

      SHA1

      ef5ab7d579e8350e6c647111b623381ef7fc4828

      SHA256

      d3974bed1018b5a46f78005f8be0d4c4bc19b1bad32bce2615801df57c57a5d3

      SHA512

      0e822deedc2161f9af5b43ddeeabd93befe97f0c6fbc9fe54b01d2499e7ccc51499216a24ef73552291b4b8ea46c3826b9edfe2604e1d564a99a1b11fd7cd9ca

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\sL1la8sd.exe

      Filesize

      417KB

      MD5

      6f686dc8b65fbcd2d212aa99b47a7393

      SHA1

      ef5ab7d579e8350e6c647111b623381ef7fc4828

      SHA256

      d3974bed1018b5a46f78005f8be0d4c4bc19b1bad32bce2615801df57c57a5d3

      SHA512

      0e822deedc2161f9af5b43ddeeabd93befe97f0c6fbc9fe54b01d2499e7ccc51499216a24ef73552291b4b8ea46c3826b9edfe2604e1d564a99a1b11fd7cd9ca

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1ir97Re3.exe

      Filesize

      378KB

      MD5

      3b81f5692c8fe4b8c96054b914ebb40b

      SHA1

      b9c969ca2a65d679e9e47289fbe632e6d502e3e9

      SHA256

      e0f8e54e8563c675ef99d12f0cebf5c2e32a1cf390f67bd2c4f7fad2a4675893

      SHA512

      f18b0941ff6533751346c72b3e72c6a28e33a4f577ae9f4d302fe61d9b1e2acde9d5e8a4bef84334f59ee475ea9fc4f696b6ac84bfe3536b399aabfa5550bf1a

    • memory/2160-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2160-58-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2160-53-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2160-60-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2160-62-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2160-64-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2160-57-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2160-56-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2160-55-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2160-54-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB