Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 13:55

General

  • Target

    NEAS.e45cad29f3234c6392c5f6e84eb764dce17d47da6e46a61cd2f50f56ea080fcf_JC.exe

  • Size

    1.2MB

  • MD5

    8a5131fa4cb385e65b818b6189fb1662

  • SHA1

    eebf2ac535f51d7d16219ad1bc4fdf92f2552271

  • SHA256

    e45cad29f3234c6392c5f6e84eb764dce17d47da6e46a61cd2f50f56ea080fcf

  • SHA512

    884f4100578b35e61f5fdab2b90e374a00859764fb707778f124c7fd170d15081a33249dd5863a54b8740feaea817bdae31f0c9103e48425c79b791e7fb100e7

  • SSDEEP

    24576:ayjC2EmuBGN1X+5Xr2CwfnI36qA3CzkQERXVC/M:h7sGNlWKqAtQiV

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e45cad29f3234c6392c5f6e84eb764dce17d47da6e46a61cd2f50f56ea080fcf_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e45cad29f3234c6392c5f6e84eb764dce17d47da6e46a61cd2f50f56ea080fcf_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ct6Va7EI.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ct6Va7EI.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vS3rk8As.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vS3rk8As.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2636
  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BR9UU5Ht.exe
    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BR9UU5Ht.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 284
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:2556
    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rU8qo4rk.exe
      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rU8qo4rk.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2692

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ct6Va7EI.exe
      Filesize

      1.0MB

      MD5

      a9dca1732d355fea88ec0c023cc39992

      SHA1

      a5103cf24246bfb67fbd294023996e6d88274891

      SHA256

      f0e1f4d8aa8e6938b2aa04788b5b04ad40117febc2e576f6f8799617772e4522

      SHA512

      a1101d759c6c97b29243913b4576b09be5f80e5b7eb46fcea119b4941f53cf872cbfcbb8e351a3d51ddb02e2ad0096393b5bc6e40c951c2f099b315ea4995975

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ct6Va7EI.exe
      Filesize

      1.0MB

      MD5

      a9dca1732d355fea88ec0c023cc39992

      SHA1

      a5103cf24246bfb67fbd294023996e6d88274891

      SHA256

      f0e1f4d8aa8e6938b2aa04788b5b04ad40117febc2e576f6f8799617772e4522

      SHA512

      a1101d759c6c97b29243913b4576b09be5f80e5b7eb46fcea119b4941f53cf872cbfcbb8e351a3d51ddb02e2ad0096393b5bc6e40c951c2f099b315ea4995975

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vS3rk8As.exe
      Filesize

      884KB

      MD5

      98877685f7e2ba9d0d7bc106b1547a0f

      SHA1

      018ab45b956bf5a918f1eb1dc9b3d59da91c8894

      SHA256

      7f1e19096ffc6d2be4657c7dfdace607141f47b2ce80a607affbcc570fb003e2

      SHA512

      2bdfe05205cb81913d4112c9fc2796ef63555c97434001510baa47d1c5e237f8657a99be48cf3743c23aefd4acd2bb7d5336ff32bd300ea89c89ab5457bab6cc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vS3rk8As.exe
      Filesize

      884KB

      MD5

      98877685f7e2ba9d0d7bc106b1547a0f

      SHA1

      018ab45b956bf5a918f1eb1dc9b3d59da91c8894

      SHA256

      7f1e19096ffc6d2be4657c7dfdace607141f47b2ce80a607affbcc570fb003e2

      SHA512

      2bdfe05205cb81913d4112c9fc2796ef63555c97434001510baa47d1c5e237f8657a99be48cf3743c23aefd4acd2bb7d5336ff32bd300ea89c89ab5457bab6cc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rU8qo4rk.exe
      Filesize

      590KB

      MD5

      784e998183e929ce76fc8a9caf39426a

      SHA1

      44defd2b3d9eb2a085dddc0f9efa7f9743fd60dd

      SHA256

      65f9f3263888b314eb7a6db9c7d634eb12da8dd4c949ba2327ce05e0698dafb9

      SHA512

      7187fc0cd4e36f312ba85053a65b9151f169f1ccb3430bacc6e48f1ab920fdfbe4bbade65124742fe82cdea29cc8eebb6bfa048793c3c4e3f041c761416eae46

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rU8qo4rk.exe
      Filesize

      590KB

      MD5

      784e998183e929ce76fc8a9caf39426a

      SHA1

      44defd2b3d9eb2a085dddc0f9efa7f9743fd60dd

      SHA256

      65f9f3263888b314eb7a6db9c7d634eb12da8dd4c949ba2327ce05e0698dafb9

      SHA512

      7187fc0cd4e36f312ba85053a65b9151f169f1ccb3430bacc6e48f1ab920fdfbe4bbade65124742fe82cdea29cc8eebb6bfa048793c3c4e3f041c761416eae46

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BR9UU5Ht.exe
      Filesize

      417KB

      MD5

      b3e27bc42c0d400f58083d243e52976b

      SHA1

      dfb89f92eaf181b6e424c0752c4a50edb99eb6bf

      SHA256

      7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461

      SHA512

      43cdcf38bc097faf2979f7d080aa701b332ada3db6b24720b60c357cf1dc5125517ddd22a55774cada98be57b309a32d6e77fa3b35e536444585943cae5a66f1

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BR9UU5Ht.exe
      Filesize

      417KB

      MD5

      b3e27bc42c0d400f58083d243e52976b

      SHA1

      dfb89f92eaf181b6e424c0752c4a50edb99eb6bf

      SHA256

      7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461

      SHA512

      43cdcf38bc097faf2979f7d080aa701b332ada3db6b24720b60c357cf1dc5125517ddd22a55774cada98be57b309a32d6e77fa3b35e536444585943cae5a66f1

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ct6Va7EI.exe
      Filesize

      1.0MB

      MD5

      a9dca1732d355fea88ec0c023cc39992

      SHA1

      a5103cf24246bfb67fbd294023996e6d88274891

      SHA256

      f0e1f4d8aa8e6938b2aa04788b5b04ad40117febc2e576f6f8799617772e4522

      SHA512

      a1101d759c6c97b29243913b4576b09be5f80e5b7eb46fcea119b4941f53cf872cbfcbb8e351a3d51ddb02e2ad0096393b5bc6e40c951c2f099b315ea4995975

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ct6Va7EI.exe
      Filesize

      1.0MB

      MD5

      a9dca1732d355fea88ec0c023cc39992

      SHA1

      a5103cf24246bfb67fbd294023996e6d88274891

      SHA256

      f0e1f4d8aa8e6938b2aa04788b5b04ad40117febc2e576f6f8799617772e4522

      SHA512

      a1101d759c6c97b29243913b4576b09be5f80e5b7eb46fcea119b4941f53cf872cbfcbb8e351a3d51ddb02e2ad0096393b5bc6e40c951c2f099b315ea4995975

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\vS3rk8As.exe
      Filesize

      884KB

      MD5

      98877685f7e2ba9d0d7bc106b1547a0f

      SHA1

      018ab45b956bf5a918f1eb1dc9b3d59da91c8894

      SHA256

      7f1e19096ffc6d2be4657c7dfdace607141f47b2ce80a607affbcc570fb003e2

      SHA512

      2bdfe05205cb81913d4112c9fc2796ef63555c97434001510baa47d1c5e237f8657a99be48cf3743c23aefd4acd2bb7d5336ff32bd300ea89c89ab5457bab6cc

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\vS3rk8As.exe
      Filesize

      884KB

      MD5

      98877685f7e2ba9d0d7bc106b1547a0f

      SHA1

      018ab45b956bf5a918f1eb1dc9b3d59da91c8894

      SHA256

      7f1e19096ffc6d2be4657c7dfdace607141f47b2ce80a607affbcc570fb003e2

      SHA512

      2bdfe05205cb81913d4112c9fc2796ef63555c97434001510baa47d1c5e237f8657a99be48cf3743c23aefd4acd2bb7d5336ff32bd300ea89c89ab5457bab6cc

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\rU8qo4rk.exe
      Filesize

      590KB

      MD5

      784e998183e929ce76fc8a9caf39426a

      SHA1

      44defd2b3d9eb2a085dddc0f9efa7f9743fd60dd

      SHA256

      65f9f3263888b314eb7a6db9c7d634eb12da8dd4c949ba2327ce05e0698dafb9

      SHA512

      7187fc0cd4e36f312ba85053a65b9151f169f1ccb3430bacc6e48f1ab920fdfbe4bbade65124742fe82cdea29cc8eebb6bfa048793c3c4e3f041c761416eae46

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\rU8qo4rk.exe
      Filesize

      590KB

      MD5

      784e998183e929ce76fc8a9caf39426a

      SHA1

      44defd2b3d9eb2a085dddc0f9efa7f9743fd60dd

      SHA256

      65f9f3263888b314eb7a6db9c7d634eb12da8dd4c949ba2327ce05e0698dafb9

      SHA512

      7187fc0cd4e36f312ba85053a65b9151f169f1ccb3430bacc6e48f1ab920fdfbe4bbade65124742fe82cdea29cc8eebb6bfa048793c3c4e3f041c761416eae46

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\BR9UU5Ht.exe
      Filesize

      417KB

      MD5

      b3e27bc42c0d400f58083d243e52976b

      SHA1

      dfb89f92eaf181b6e424c0752c4a50edb99eb6bf

      SHA256

      7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461

      SHA512

      43cdcf38bc097faf2979f7d080aa701b332ada3db6b24720b60c357cf1dc5125517ddd22a55774cada98be57b309a32d6e77fa3b35e536444585943cae5a66f1

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\BR9UU5Ht.exe
      Filesize

      417KB

      MD5

      b3e27bc42c0d400f58083d243e52976b

      SHA1

      dfb89f92eaf181b6e424c0752c4a50edb99eb6bf

      SHA256

      7bc60a53f2e41fbf75340717de9ffcc9b6fd784a5d53c6179c11edf693435461

      SHA512

      43cdcf38bc097faf2979f7d080aa701b332ada3db6b24720b60c357cf1dc5125517ddd22a55774cada98be57b309a32d6e77fa3b35e536444585943cae5a66f1

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nD90NV6.exe
      Filesize

      378KB

      MD5

      f0831f173733de08511f3a0739f278a6

      SHA1

      06dc809d653c5d2c97386084ae13b50a73eb5b60

      SHA256

      8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

      SHA512

      19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

    • memory/2544-64-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-66-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-67-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-62-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/2544-60-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-59-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-58-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-55-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-53-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-57-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2544-72-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB