Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-10-2023 13:55

General

  • Target

    NEAS.e55cd557d651e570b2504ce4c3e1f4ba4cf376b5f4420fcc9fa77c2860405e86_JC.exe

  • Size

    1.2MB

  • MD5

    76c16f29118d04c063e007cd6897389c

  • SHA1

    e494cafb7a1f637c4475fb55c6f8e97f301f29d7

  • SHA256

    e55cd557d651e570b2504ce4c3e1f4ba4cf376b5f4420fcc9fa77c2860405e86

  • SHA512

    1069eddb8e073d883ce85ea788fcb4debc83c9efecc48d9a1ae0b4ece3ee805b0abf6d2246ebe8b44fd801f31648f9c59d5c08501acbdd0b8d5594817030aec9

  • SSDEEP

    24576:1yEvqzCCWv1AtF8Ol17au684y+CUTD4gVqZiJ6YGRs+TifsiQg0V0Ci:QEvqzCCKEF8pL8RMD7wZiMbTiEg

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e55cd557d651e570b2504ce4c3e1f4ba4cf376b5f4420fcc9fa77c2860405e86_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e55cd557d651e570b2504ce4c3e1f4ba4cf376b5f4420fcc9fa77c2860405e86_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kP6bz7uk.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kP6bz7uk.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mI0Bx5im.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mI0Bx5im.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:796
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cX1ZN9dT.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cX1ZN9dT.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1840
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oQ3zQ5Kc.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oQ3zQ5Kc.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2868
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2712
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 268
                  8⤵
                  • Program crash
                  PID:2228
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 284
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2592

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kP6bz7uk.exe
    Filesize

    1.0MB

    MD5

    994deee856ff11b09d53d2e8ae7d62ae

    SHA1

    9375befdee41e9ca469247117685bf5e52196d41

    SHA256

    a6b4fa7396c7c6f5eaf2a19ec1672dd07b36a0316e1ed7558a3854cfe8850284

    SHA512

    5145ad0c0580549dd45302489dc9dd2838f778cad582ee53b9372a4606bce3799b4eee209990bac9790fc32a7628901f4435695b8daa9b4120111cff5b740c1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kP6bz7uk.exe
    Filesize

    1.0MB

    MD5

    994deee856ff11b09d53d2e8ae7d62ae

    SHA1

    9375befdee41e9ca469247117685bf5e52196d41

    SHA256

    a6b4fa7396c7c6f5eaf2a19ec1672dd07b36a0316e1ed7558a3854cfe8850284

    SHA512

    5145ad0c0580549dd45302489dc9dd2838f778cad582ee53b9372a4606bce3799b4eee209990bac9790fc32a7628901f4435695b8daa9b4120111cff5b740c1c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mI0Bx5im.exe
    Filesize

    884KB

    MD5

    5c9e0a6a7e70bc88fe5f4c02b79cca5b

    SHA1

    6c50ee07d722a6267c31686ab90b7e4ba23744a8

    SHA256

    d26b25b18bed34195faafa429bee5323437b46edecf0632b7160611199182666

    SHA512

    2da853b212a92163b7f249e781437ad02969776de9d8bfcf77a275f524401bced0adb68a390649f8bc4409a322afdf1ef7fe7f81151b171e69c02121301d3e12

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\mI0Bx5im.exe
    Filesize

    884KB

    MD5

    5c9e0a6a7e70bc88fe5f4c02b79cca5b

    SHA1

    6c50ee07d722a6267c31686ab90b7e4ba23744a8

    SHA256

    d26b25b18bed34195faafa429bee5323437b46edecf0632b7160611199182666

    SHA512

    2da853b212a92163b7f249e781437ad02969776de9d8bfcf77a275f524401bced0adb68a390649f8bc4409a322afdf1ef7fe7f81151b171e69c02121301d3e12

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cX1ZN9dT.exe
    Filesize

    590KB

    MD5

    811493fa25b380fc368a2a7849c93484

    SHA1

    25a6ac6fd1160920b431ccef12fcba7a2f7d8eeb

    SHA256

    bb44f84efd67755b3da984a38937eec53d572163881921ce20768aee171ed8e3

    SHA512

    ccf538019cb1c741fc9b74607f00002bf23ec5fc221674a044748d511e2408d7f712b6c426c7aedec0fbfd399b65035864201dc76bb35b779052dec925ed3899

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cX1ZN9dT.exe
    Filesize

    590KB

    MD5

    811493fa25b380fc368a2a7849c93484

    SHA1

    25a6ac6fd1160920b431ccef12fcba7a2f7d8eeb

    SHA256

    bb44f84efd67755b3da984a38937eec53d572163881921ce20768aee171ed8e3

    SHA512

    ccf538019cb1c741fc9b74607f00002bf23ec5fc221674a044748d511e2408d7f712b6c426c7aedec0fbfd399b65035864201dc76bb35b779052dec925ed3899

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oQ3zQ5Kc.exe
    Filesize

    417KB

    MD5

    4c0e11f765aa699830226514a4ff6f41

    SHA1

    fac7c607866bfe5537d746f4ad2239c38f606901

    SHA256

    98d847e6395e44ecfbb24375942b240661eaac5150c6a6c731c0af7f15fa1afb

    SHA512

    8564a2e1788e71a050bd98ab7960994aaf40e3723415f9c9a5f4aecb009f6c42a72d0288d8d4e70cda57e181755ecd5019e38ec699c6a504861699319e92a183

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oQ3zQ5Kc.exe
    Filesize

    417KB

    MD5

    4c0e11f765aa699830226514a4ff6f41

    SHA1

    fac7c607866bfe5537d746f4ad2239c38f606901

    SHA256

    98d847e6395e44ecfbb24375942b240661eaac5150c6a6c731c0af7f15fa1afb

    SHA512

    8564a2e1788e71a050bd98ab7960994aaf40e3723415f9c9a5f4aecb009f6c42a72d0288d8d4e70cda57e181755ecd5019e38ec699c6a504861699319e92a183

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kP6bz7uk.exe
    Filesize

    1.0MB

    MD5

    994deee856ff11b09d53d2e8ae7d62ae

    SHA1

    9375befdee41e9ca469247117685bf5e52196d41

    SHA256

    a6b4fa7396c7c6f5eaf2a19ec1672dd07b36a0316e1ed7558a3854cfe8850284

    SHA512

    5145ad0c0580549dd45302489dc9dd2838f778cad582ee53b9372a4606bce3799b4eee209990bac9790fc32a7628901f4435695b8daa9b4120111cff5b740c1c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\kP6bz7uk.exe
    Filesize

    1.0MB

    MD5

    994deee856ff11b09d53d2e8ae7d62ae

    SHA1

    9375befdee41e9ca469247117685bf5e52196d41

    SHA256

    a6b4fa7396c7c6f5eaf2a19ec1672dd07b36a0316e1ed7558a3854cfe8850284

    SHA512

    5145ad0c0580549dd45302489dc9dd2838f778cad582ee53b9372a4606bce3799b4eee209990bac9790fc32a7628901f4435695b8daa9b4120111cff5b740c1c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\mI0Bx5im.exe
    Filesize

    884KB

    MD5

    5c9e0a6a7e70bc88fe5f4c02b79cca5b

    SHA1

    6c50ee07d722a6267c31686ab90b7e4ba23744a8

    SHA256

    d26b25b18bed34195faafa429bee5323437b46edecf0632b7160611199182666

    SHA512

    2da853b212a92163b7f249e781437ad02969776de9d8bfcf77a275f524401bced0adb68a390649f8bc4409a322afdf1ef7fe7f81151b171e69c02121301d3e12

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\mI0Bx5im.exe
    Filesize

    884KB

    MD5

    5c9e0a6a7e70bc88fe5f4c02b79cca5b

    SHA1

    6c50ee07d722a6267c31686ab90b7e4ba23744a8

    SHA256

    d26b25b18bed34195faafa429bee5323437b46edecf0632b7160611199182666

    SHA512

    2da853b212a92163b7f249e781437ad02969776de9d8bfcf77a275f524401bced0adb68a390649f8bc4409a322afdf1ef7fe7f81151b171e69c02121301d3e12

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\cX1ZN9dT.exe
    Filesize

    590KB

    MD5

    811493fa25b380fc368a2a7849c93484

    SHA1

    25a6ac6fd1160920b431ccef12fcba7a2f7d8eeb

    SHA256

    bb44f84efd67755b3da984a38937eec53d572163881921ce20768aee171ed8e3

    SHA512

    ccf538019cb1c741fc9b74607f00002bf23ec5fc221674a044748d511e2408d7f712b6c426c7aedec0fbfd399b65035864201dc76bb35b779052dec925ed3899

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\cX1ZN9dT.exe
    Filesize

    590KB

    MD5

    811493fa25b380fc368a2a7849c93484

    SHA1

    25a6ac6fd1160920b431ccef12fcba7a2f7d8eeb

    SHA256

    bb44f84efd67755b3da984a38937eec53d572163881921ce20768aee171ed8e3

    SHA512

    ccf538019cb1c741fc9b74607f00002bf23ec5fc221674a044748d511e2408d7f712b6c426c7aedec0fbfd399b65035864201dc76bb35b779052dec925ed3899

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\oQ3zQ5Kc.exe
    Filesize

    417KB

    MD5

    4c0e11f765aa699830226514a4ff6f41

    SHA1

    fac7c607866bfe5537d746f4ad2239c38f606901

    SHA256

    98d847e6395e44ecfbb24375942b240661eaac5150c6a6c731c0af7f15fa1afb

    SHA512

    8564a2e1788e71a050bd98ab7960994aaf40e3723415f9c9a5f4aecb009f6c42a72d0288d8d4e70cda57e181755ecd5019e38ec699c6a504861699319e92a183

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\oQ3zQ5Kc.exe
    Filesize

    417KB

    MD5

    4c0e11f765aa699830226514a4ff6f41

    SHA1

    fac7c607866bfe5537d746f4ad2239c38f606901

    SHA256

    98d847e6395e44ecfbb24375942b240661eaac5150c6a6c731c0af7f15fa1afb

    SHA512

    8564a2e1788e71a050bd98ab7960994aaf40e3723415f9c9a5f4aecb009f6c42a72d0288d8d4e70cda57e181755ecd5019e38ec699c6a504861699319e92a183

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1hj36TT7.exe
    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • memory/2712-57-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2712-59-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2712-60-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2712-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2712-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2712-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2712-58-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2712-56-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2712-55-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2712-53-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB