Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 13:48

General

  • Target

    NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe

  • Size

    1.2MB

  • MD5

    2216ecad807d5a5060e52cee08e93633

  • SHA1

    6b4514ade3dded88bb805c37275d461781ee8459

  • SHA256

    ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a

  • SHA512

    c70fb9d6e92788215214aa1088c5908d532f369f17b9c8e03c6a5a5b9291b25522bcf34698937ec26595cf4dbc27ce1096cc20a4b62fc7fb09bc36b37cc1359c

  • SSDEEP

    24576:Hygx1DqX7JQ8k2IhsncGleWShMc3Z1VMRYoSzUFHE:Ss1DqbHXDeWm1VMRYoS

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ddacad369bdc13de3e96f4ecfee84a08e9bfbc576fcd1fb49f18852d17492c0a_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2620
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2684
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2748
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 268
                  8⤵
                  • Program crash
                  PID:2404
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2560

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exe
    Filesize

    1.0MB

    MD5

    a7543a6d367ce3b64480f2e08e9d5199

    SHA1

    8b8a89d6f1992df15b02e75d7acd40cc06e1d5ae

    SHA256

    5823925d139ce7818401631c48b26b293fabc432e81bfff43e500d668c2c7839

    SHA512

    0daf0117a5f41874b69d0b70bddc7c127170dcfec4f80b48001a00db4b752f44a7799d64890e862ed2ae004edbbbbc3eee07eb190384b7d1361be054974e1680

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exe
    Filesize

    1.0MB

    MD5

    a7543a6d367ce3b64480f2e08e9d5199

    SHA1

    8b8a89d6f1992df15b02e75d7acd40cc06e1d5ae

    SHA256

    5823925d139ce7818401631c48b26b293fabc432e81bfff43e500d668c2c7839

    SHA512

    0daf0117a5f41874b69d0b70bddc7c127170dcfec4f80b48001a00db4b752f44a7799d64890e862ed2ae004edbbbbc3eee07eb190384b7d1361be054974e1680

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exe
    Filesize

    884KB

    MD5

    647ee86523eaecfe1a5c7ccbefbb285b

    SHA1

    eebdfa46090344086969e33d80bccbc5c13db95a

    SHA256

    33fd4eac40ad1872bfe8043978598ec1dbdd9c5dac1e9e78dfa94c0f040bf933

    SHA512

    8a842841ecc7ee9a469c4e59ed6e31ff79d72d5d91dca21a08b0068d64f1d5c9cdabf4e95f893b1807a6711b8af81854fd94756c370399fbe4dee701253400c9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exe
    Filesize

    884KB

    MD5

    647ee86523eaecfe1a5c7ccbefbb285b

    SHA1

    eebdfa46090344086969e33d80bccbc5c13db95a

    SHA256

    33fd4eac40ad1872bfe8043978598ec1dbdd9c5dac1e9e78dfa94c0f040bf933

    SHA512

    8a842841ecc7ee9a469c4e59ed6e31ff79d72d5d91dca21a08b0068d64f1d5c9cdabf4e95f893b1807a6711b8af81854fd94756c370399fbe4dee701253400c9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exe
    Filesize

    590KB

    MD5

    e7afa3f04af45c3dee2e3ceba4a7b592

    SHA1

    da365c140dedb4cfe5fd99f1757850fa96ea9678

    SHA256

    19fecbe7c4fe6b587e9187b3f59959dda087600171b81a7b00d2615556d69471

    SHA512

    307ea14058f2e86f0038f8b8ffa34230dbf5bb78c9572c8dfb861f283ea75534619ece5b6a329cc1d0c0f658899c08ee84ee2c8be3f8cdfd2df586058e604d48

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exe
    Filesize

    590KB

    MD5

    e7afa3f04af45c3dee2e3ceba4a7b592

    SHA1

    da365c140dedb4cfe5fd99f1757850fa96ea9678

    SHA256

    19fecbe7c4fe6b587e9187b3f59959dda087600171b81a7b00d2615556d69471

    SHA512

    307ea14058f2e86f0038f8b8ffa34230dbf5bb78c9572c8dfb861f283ea75534619ece5b6a329cc1d0c0f658899c08ee84ee2c8be3f8cdfd2df586058e604d48

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exe
    Filesize

    417KB

    MD5

    413d949438db4adf4746f42b3e558d82

    SHA1

    a4c8069ef945792a9820520d2a710cceb9e52e8a

    SHA256

    826a3434edfe24b0e761d08da3d037fb2e5bf124d4c0b05aaa4b12ee17426788

    SHA512

    f06ddb9186c293fa1f88a4813a7b7eea2b909174d449edad86259548304a229e69d65957efb20bb14dc2712d1942a638a66fd4fd84cbc9366333545fe6b6f735

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exe
    Filesize

    417KB

    MD5

    413d949438db4adf4746f42b3e558d82

    SHA1

    a4c8069ef945792a9820520d2a710cceb9e52e8a

    SHA256

    826a3434edfe24b0e761d08da3d037fb2e5bf124d4c0b05aaa4b12ee17426788

    SHA512

    f06ddb9186c293fa1f88a4813a7b7eea2b909174d449edad86259548304a229e69d65957efb20bb14dc2712d1942a638a66fd4fd84cbc9366333545fe6b6f735

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exe
    Filesize

    1.0MB

    MD5

    a7543a6d367ce3b64480f2e08e9d5199

    SHA1

    8b8a89d6f1992df15b02e75d7acd40cc06e1d5ae

    SHA256

    5823925d139ce7818401631c48b26b293fabc432e81bfff43e500d668c2c7839

    SHA512

    0daf0117a5f41874b69d0b70bddc7c127170dcfec4f80b48001a00db4b752f44a7799d64890e862ed2ae004edbbbbc3eee07eb190384b7d1361be054974e1680

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\pS1fG3Fa.exe
    Filesize

    1.0MB

    MD5

    a7543a6d367ce3b64480f2e08e9d5199

    SHA1

    8b8a89d6f1992df15b02e75d7acd40cc06e1d5ae

    SHA256

    5823925d139ce7818401631c48b26b293fabc432e81bfff43e500d668c2c7839

    SHA512

    0daf0117a5f41874b69d0b70bddc7c127170dcfec4f80b48001a00db4b752f44a7799d64890e862ed2ae004edbbbbc3eee07eb190384b7d1361be054974e1680

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exe
    Filesize

    884KB

    MD5

    647ee86523eaecfe1a5c7ccbefbb285b

    SHA1

    eebdfa46090344086969e33d80bccbc5c13db95a

    SHA256

    33fd4eac40ad1872bfe8043978598ec1dbdd9c5dac1e9e78dfa94c0f040bf933

    SHA512

    8a842841ecc7ee9a469c4e59ed6e31ff79d72d5d91dca21a08b0068d64f1d5c9cdabf4e95f893b1807a6711b8af81854fd94756c370399fbe4dee701253400c9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\jM2SO0wf.exe
    Filesize

    884KB

    MD5

    647ee86523eaecfe1a5c7ccbefbb285b

    SHA1

    eebdfa46090344086969e33d80bccbc5c13db95a

    SHA256

    33fd4eac40ad1872bfe8043978598ec1dbdd9c5dac1e9e78dfa94c0f040bf933

    SHA512

    8a842841ecc7ee9a469c4e59ed6e31ff79d72d5d91dca21a08b0068d64f1d5c9cdabf4e95f893b1807a6711b8af81854fd94756c370399fbe4dee701253400c9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exe
    Filesize

    590KB

    MD5

    e7afa3f04af45c3dee2e3ceba4a7b592

    SHA1

    da365c140dedb4cfe5fd99f1757850fa96ea9678

    SHA256

    19fecbe7c4fe6b587e9187b3f59959dda087600171b81a7b00d2615556d69471

    SHA512

    307ea14058f2e86f0038f8b8ffa34230dbf5bb78c9572c8dfb861f283ea75534619ece5b6a329cc1d0c0f658899c08ee84ee2c8be3f8cdfd2df586058e604d48

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\sO2Hp1QO.exe
    Filesize

    590KB

    MD5

    e7afa3f04af45c3dee2e3ceba4a7b592

    SHA1

    da365c140dedb4cfe5fd99f1757850fa96ea9678

    SHA256

    19fecbe7c4fe6b587e9187b3f59959dda087600171b81a7b00d2615556d69471

    SHA512

    307ea14058f2e86f0038f8b8ffa34230dbf5bb78c9572c8dfb861f283ea75534619ece5b6a329cc1d0c0f658899c08ee84ee2c8be3f8cdfd2df586058e604d48

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exe
    Filesize

    417KB

    MD5

    413d949438db4adf4746f42b3e558d82

    SHA1

    a4c8069ef945792a9820520d2a710cceb9e52e8a

    SHA256

    826a3434edfe24b0e761d08da3d037fb2e5bf124d4c0b05aaa4b12ee17426788

    SHA512

    f06ddb9186c293fa1f88a4813a7b7eea2b909174d449edad86259548304a229e69d65957efb20bb14dc2712d1942a638a66fd4fd84cbc9366333545fe6b6f735

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\Im2Lh5TU.exe
    Filesize

    417KB

    MD5

    413d949438db4adf4746f42b3e558d82

    SHA1

    a4c8069ef945792a9820520d2a710cceb9e52e8a

    SHA256

    826a3434edfe24b0e761d08da3d037fb2e5bf124d4c0b05aaa4b12ee17426788

    SHA512

    f06ddb9186c293fa1f88a4813a7b7eea2b909174d449edad86259548304a229e69d65957efb20bb14dc2712d1942a638a66fd4fd84cbc9366333545fe6b6f735

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Jg65Km8.exe
    Filesize

    378KB

    MD5

    9c94eb162f0a9ae92b95895fb3265eac

    SHA1

    efa8e659462f885e6d2008d7811a7676e60bf8f4

    SHA256

    444634ca1af14b9e0dd0bff40452b501b2d54fe09740d933c38ab111a971f881

    SHA512

    fc90bca08f2aede3979db22a8a47d37c7b1a2cb3bc6f1b25a90f567054e7b8995fdcdaf13403cb8bfec4c80e8554eb8db3b531666dc3fde24ec2aea39028049c

  • memory/2748-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2748-58-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2748-53-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2748-60-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2748-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2748-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2748-57-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2748-56-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2748-55-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2748-54-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB