Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2023 02:47

General

  • Target

    f36250adbce70d18242037c3b5f728e6aa62e63d36d9ccb15e82743f8cf0bd82.exe

  • Size

    1.1MB

  • MD5

    ffeb028ff5c3a4208e380a132477d94c

  • SHA1

    939ca0552e509f19e013208a8b497eff56d17e15

  • SHA256

    f36250adbce70d18242037c3b5f728e6aa62e63d36d9ccb15e82743f8cf0bd82

  • SHA512

    c48020a4648fb25c089bed4dc6f0b5ca3f385c97ea96e5637fa787c41485bc58e7b6359d1e4a37f6a09275bff56ab4fa1082beea689ffa0c9e2379c664735cd9

  • SSDEEP

    24576:tyYvY5s+J79BcJG7kcK5KidjX1SvUa4kJV22b8M6yM0:IYOs6CJG7vKYidjXGUa4ir8Mh

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f36250adbce70d18242037c3b5f728e6aa62e63d36d9ccb15e82743f8cf0bd82.exe
    "C:\Users\Admin\AppData\Local\Temp\f36250adbce70d18242037c3b5f728e6aa62e63d36d9ccb15e82743f8cf0bd82.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2880
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2568
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:1724
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 284
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe

      Filesize

      990KB

      MD5

      3b1066a48906ac881fe4dcf95691828e

      SHA1

      97ceaf071b5ac2623c3100168b72341f1aebffd3

      SHA256

      cd18a784fe1bcb7e0bb5b4f53165f73e1e6f5ee7dbebd62ba9408b2836f583bd

      SHA512

      7aeb14045cd7ab1c0f80139383dc4cc41b0d834ae0683631cef3d4f500913e6077721a9f738aad9d5f106dd679927aac8a33dd8b75baf95e6ea2a6ec15c144a3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe

      Filesize

      990KB

      MD5

      3b1066a48906ac881fe4dcf95691828e

      SHA1

      97ceaf071b5ac2623c3100168b72341f1aebffd3

      SHA256

      cd18a784fe1bcb7e0bb5b4f53165f73e1e6f5ee7dbebd62ba9408b2836f583bd

      SHA512

      7aeb14045cd7ab1c0f80139383dc4cc41b0d834ae0683631cef3d4f500913e6077721a9f738aad9d5f106dd679927aac8a33dd8b75baf95e6ea2a6ec15c144a3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe

      Filesize

      697KB

      MD5

      3fb83f23a9c3302e5d518f6774ef394d

      SHA1

      c3961dc63eac3ae39bd369ceee36017d88647754

      SHA256

      54b0f000bd6c6a93d0e7563e6afd890fe163e2d64eae217c2da377c424d74447

      SHA512

      96a005657e018f374b802efad8d0763aee176dbdf2de9d964d6d6d718d37827c27e6c041cf1ba7ab6f78b140d666263a3e09f5115d0372605a1e1b99f6016bf3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe

      Filesize

      697KB

      MD5

      3fb83f23a9c3302e5d518f6774ef394d

      SHA1

      c3961dc63eac3ae39bd369ceee36017d88647754

      SHA256

      54b0f000bd6c6a93d0e7563e6afd890fe163e2d64eae217c2da377c424d74447

      SHA512

      96a005657e018f374b802efad8d0763aee176dbdf2de9d964d6d6d718d37827c27e6c041cf1ba7ab6f78b140d666263a3e09f5115d0372605a1e1b99f6016bf3

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe

      Filesize

      453KB

      MD5

      d1275f10d4ab5ff6d8f7003168c0267e

      SHA1

      f98a24d748a84c52c5b9780319fcbb788e3820bb

      SHA256

      554acf3d96716b96b07a88177a74828b4ef695656bd7edc549b6793a923a4634

      SHA512

      4dabf1b9358927d458562d5cf3464ba703ad254eaf3f20de39bf54417dda923540df1210d412c43e103d850065eb290759cc87273f3a3cd0c7b8a68fd75f5ff3

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe

      Filesize

      453KB

      MD5

      d1275f10d4ab5ff6d8f7003168c0267e

      SHA1

      f98a24d748a84c52c5b9780319fcbb788e3820bb

      SHA256

      554acf3d96716b96b07a88177a74828b4ef695656bd7edc549b6793a923a4634

      SHA512

      4dabf1b9358927d458562d5cf3464ba703ad254eaf3f20de39bf54417dda923540df1210d412c43e103d850065eb290759cc87273f3a3cd0c7b8a68fd75f5ff3

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe

      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe

      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe

      Filesize

      990KB

      MD5

      3b1066a48906ac881fe4dcf95691828e

      SHA1

      97ceaf071b5ac2623c3100168b72341f1aebffd3

      SHA256

      cd18a784fe1bcb7e0bb5b4f53165f73e1e6f5ee7dbebd62ba9408b2836f583bd

      SHA512

      7aeb14045cd7ab1c0f80139383dc4cc41b0d834ae0683631cef3d4f500913e6077721a9f738aad9d5f106dd679927aac8a33dd8b75baf95e6ea2a6ec15c144a3

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\fK0LH13.exe

      Filesize

      990KB

      MD5

      3b1066a48906ac881fe4dcf95691828e

      SHA1

      97ceaf071b5ac2623c3100168b72341f1aebffd3

      SHA256

      cd18a784fe1bcb7e0bb5b4f53165f73e1e6f5ee7dbebd62ba9408b2836f583bd

      SHA512

      7aeb14045cd7ab1c0f80139383dc4cc41b0d834ae0683631cef3d4f500913e6077721a9f738aad9d5f106dd679927aac8a33dd8b75baf95e6ea2a6ec15c144a3

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe

      Filesize

      697KB

      MD5

      3fb83f23a9c3302e5d518f6774ef394d

      SHA1

      c3961dc63eac3ae39bd369ceee36017d88647754

      SHA256

      54b0f000bd6c6a93d0e7563e6afd890fe163e2d64eae217c2da377c424d74447

      SHA512

      96a005657e018f374b802efad8d0763aee176dbdf2de9d964d6d6d718d37827c27e6c041cf1ba7ab6f78b140d666263a3e09f5115d0372605a1e1b99f6016bf3

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ju0SM33.exe

      Filesize

      697KB

      MD5

      3fb83f23a9c3302e5d518f6774ef394d

      SHA1

      c3961dc63eac3ae39bd369ceee36017d88647754

      SHA256

      54b0f000bd6c6a93d0e7563e6afd890fe163e2d64eae217c2da377c424d74447

      SHA512

      96a005657e018f374b802efad8d0763aee176dbdf2de9d964d6d6d718d37827c27e6c041cf1ba7ab6f78b140d666263a3e09f5115d0372605a1e1b99f6016bf3

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe

      Filesize

      453KB

      MD5

      d1275f10d4ab5ff6d8f7003168c0267e

      SHA1

      f98a24d748a84c52c5b9780319fcbb788e3820bb

      SHA256

      554acf3d96716b96b07a88177a74828b4ef695656bd7edc549b6793a923a4634

      SHA512

      4dabf1b9358927d458562d5cf3464ba703ad254eaf3f20de39bf54417dda923540df1210d412c43e103d850065eb290759cc87273f3a3cd0c7b8a68fd75f5ff3

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\dZ3vN71.exe

      Filesize

      453KB

      MD5

      d1275f10d4ab5ff6d8f7003168c0267e

      SHA1

      f98a24d748a84c52c5b9780319fcbb788e3820bb

      SHA256

      554acf3d96716b96b07a88177a74828b4ef695656bd7edc549b6793a923a4634

      SHA512

      4dabf1b9358927d458562d5cf3464ba703ad254eaf3f20de39bf54417dda923540df1210d412c43e103d850065eb290759cc87273f3a3cd0c7b8a68fd75f5ff3

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe

      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1To33FD9.exe

      Filesize

      192KB

      MD5

      8904f85abd522c7d0cb5789d9583ccff

      SHA1

      5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

      SHA256

      7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

      SHA512

      04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2QS8372.exe

      Filesize

      378KB

      MD5

      f95674c8a4c8c59349affa34ed5c1771

      SHA1

      3debf69e66c77e3cb51f0d59d14ae72f7912413d

      SHA256

      e0a85b3c033636ed38a201e7549a18ca96f0b3e29f303f8f6c6247165e0a462e

      SHA512

      89f87642a65d197fc16f4e4baa687dc8b065f7f71dab8a2ea66addfea5141109518f918c74dbdb1fa9e511518d2c8a0d35871c6da4a2efdfb6b664c843b3af33

    • memory/1724-79-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-90-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-98-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-93-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-92-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-88-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-87-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1724-86-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-85-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-84-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-83-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/1724-81-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2880-42-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-61-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-69-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-63-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-45-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-59-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-55-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-53-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-67-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-65-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-43-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-49-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-57-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-47-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB

    • memory/2880-41-0x0000000000820000-0x000000000083C000-memory.dmp

      Filesize

      112KB

    • memory/2880-40-0x00000000007B0000-0x00000000007CE000-memory.dmp

      Filesize

      120KB

    • memory/2880-51-0x0000000000820000-0x0000000000836000-memory.dmp

      Filesize

      88KB