Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2023 17:02

General

  • Target

    NEAS.fb72346658c6324519e985e0f09bd1133f50e511d3d50afd301f53161470eaf7exe_JC.exe

  • Size

    1.1MB

  • MD5

    0761b6afbd2f620a7ae66608304f4968

  • SHA1

    d599a1562fd0adf8d723366f94943991f58046aa

  • SHA256

    fb72346658c6324519e985e0f09bd1133f50e511d3d50afd301f53161470eaf7

  • SHA512

    1fce356e0b4ae058bd48f3f548613e42f1be9ff504c102d03bb597b736929ca9d9f4d50fe55476b1bca1b763cf0662c4d4afe6ab08c9520650207d6bd256eb65

  • SSDEEP

    24576:My6cCzWnWPLC1forv0S1PPOz6tVm7O+DAPPm5lnx:76LCWPm5ZS1O+tVnyAPPm5ln

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.fb72346658c6324519e985e0f09bd1133f50e511d3d50afd301f53161470eaf7exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.fb72346658c6324519e985e0f09bd1133f50e511d3d50afd301f53161470eaf7exe_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ev5BU64.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ev5BU64.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\TO3dH41.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\TO3dH41.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Nq0Iv13.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Nq0Iv13.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1160
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1oN25fJ0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1oN25fJ0.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2772
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2536
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2360
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 268
                7⤵
                • Program crash
                PID:2912
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ev5BU64.exe

    Filesize

    990KB

    MD5

    7d640e2e40e2402d2040149c2f33ddf4

    SHA1

    3f4b1c32ff5a4e56c322c6ed6ba9fb504e5b0024

    SHA256

    3548797ab243ae6aef8d539f602f43460d66bbce2a1e6311e9cb65fe926f80a4

    SHA512

    e7ff67c33d49a819b4f2ee9c288bc5848d8ccd785ea1630c56d8e89fa8f08745e67f56786d427f915c94c492824ed4deb286dff6ec8dff6ed214a49b55c91d4e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ev5BU64.exe

    Filesize

    990KB

    MD5

    7d640e2e40e2402d2040149c2f33ddf4

    SHA1

    3f4b1c32ff5a4e56c322c6ed6ba9fb504e5b0024

    SHA256

    3548797ab243ae6aef8d539f602f43460d66bbce2a1e6311e9cb65fe926f80a4

    SHA512

    e7ff67c33d49a819b4f2ee9c288bc5848d8ccd785ea1630c56d8e89fa8f08745e67f56786d427f915c94c492824ed4deb286dff6ec8dff6ed214a49b55c91d4e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\TO3dH41.exe

    Filesize

    696KB

    MD5

    2ad1f1f0c6b0b9feaeabe075ee1c1e43

    SHA1

    936f5c950eeb06ef6bebd8d85c7b1f2453acc67a

    SHA256

    821286378116e61ec62237fb92077b9ab44887fb5ebebb60b49d5a3dc4104a8c

    SHA512

    2858ef7708d9b692269cfa6e7f56f21766537ce56c58a0a0d5ab3e1594f5414526ba61f5d5f6e5bc876578ce48e5ea1bbc35b6b838c0810e71e080988614d9c0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\TO3dH41.exe

    Filesize

    696KB

    MD5

    2ad1f1f0c6b0b9feaeabe075ee1c1e43

    SHA1

    936f5c950eeb06ef6bebd8d85c7b1f2453acc67a

    SHA256

    821286378116e61ec62237fb92077b9ab44887fb5ebebb60b49d5a3dc4104a8c

    SHA512

    2858ef7708d9b692269cfa6e7f56f21766537ce56c58a0a0d5ab3e1594f5414526ba61f5d5f6e5bc876578ce48e5ea1bbc35b6b838c0810e71e080988614d9c0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Nq0Iv13.exe

    Filesize

    452KB

    MD5

    e7068de19b7b8d747c37eac1833f17be

    SHA1

    41873e3d6e0145697d744f7e8a595df5a9585ff0

    SHA256

    f1f5944481051edc9b6a3c27f6765ffec53ededd6a8589b0bad6b55d728cea83

    SHA512

    cd7a52c64100f90843024ef3e1ced7e3bae59a35e1e2dd348827fe150c3538feb0e43d1954c83f04e2071bf34e18b29833f6acbf9f6f28be943ac3d3c68b7f42

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Nq0Iv13.exe

    Filesize

    452KB

    MD5

    e7068de19b7b8d747c37eac1833f17be

    SHA1

    41873e3d6e0145697d744f7e8a595df5a9585ff0

    SHA256

    f1f5944481051edc9b6a3c27f6765ffec53ededd6a8589b0bad6b55d728cea83

    SHA512

    cd7a52c64100f90843024ef3e1ced7e3bae59a35e1e2dd348827fe150c3538feb0e43d1954c83f04e2071bf34e18b29833f6acbf9f6f28be943ac3d3c68b7f42

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1oN25fJ0.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1oN25fJ0.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ev5BU64.exe

    Filesize

    990KB

    MD5

    7d640e2e40e2402d2040149c2f33ddf4

    SHA1

    3f4b1c32ff5a4e56c322c6ed6ba9fb504e5b0024

    SHA256

    3548797ab243ae6aef8d539f602f43460d66bbce2a1e6311e9cb65fe926f80a4

    SHA512

    e7ff67c33d49a819b4f2ee9c288bc5848d8ccd785ea1630c56d8e89fa8f08745e67f56786d427f915c94c492824ed4deb286dff6ec8dff6ed214a49b55c91d4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Ev5BU64.exe

    Filesize

    990KB

    MD5

    7d640e2e40e2402d2040149c2f33ddf4

    SHA1

    3f4b1c32ff5a4e56c322c6ed6ba9fb504e5b0024

    SHA256

    3548797ab243ae6aef8d539f602f43460d66bbce2a1e6311e9cb65fe926f80a4

    SHA512

    e7ff67c33d49a819b4f2ee9c288bc5848d8ccd785ea1630c56d8e89fa8f08745e67f56786d427f915c94c492824ed4deb286dff6ec8dff6ed214a49b55c91d4e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\TO3dH41.exe

    Filesize

    696KB

    MD5

    2ad1f1f0c6b0b9feaeabe075ee1c1e43

    SHA1

    936f5c950eeb06ef6bebd8d85c7b1f2453acc67a

    SHA256

    821286378116e61ec62237fb92077b9ab44887fb5ebebb60b49d5a3dc4104a8c

    SHA512

    2858ef7708d9b692269cfa6e7f56f21766537ce56c58a0a0d5ab3e1594f5414526ba61f5d5f6e5bc876578ce48e5ea1bbc35b6b838c0810e71e080988614d9c0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\TO3dH41.exe

    Filesize

    696KB

    MD5

    2ad1f1f0c6b0b9feaeabe075ee1c1e43

    SHA1

    936f5c950eeb06ef6bebd8d85c7b1f2453acc67a

    SHA256

    821286378116e61ec62237fb92077b9ab44887fb5ebebb60b49d5a3dc4104a8c

    SHA512

    2858ef7708d9b692269cfa6e7f56f21766537ce56c58a0a0d5ab3e1594f5414526ba61f5d5f6e5bc876578ce48e5ea1bbc35b6b838c0810e71e080988614d9c0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Nq0Iv13.exe

    Filesize

    452KB

    MD5

    e7068de19b7b8d747c37eac1833f17be

    SHA1

    41873e3d6e0145697d744f7e8a595df5a9585ff0

    SHA256

    f1f5944481051edc9b6a3c27f6765ffec53ededd6a8589b0bad6b55d728cea83

    SHA512

    cd7a52c64100f90843024ef3e1ced7e3bae59a35e1e2dd348827fe150c3538feb0e43d1954c83f04e2071bf34e18b29833f6acbf9f6f28be943ac3d3c68b7f42

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Nq0Iv13.exe

    Filesize

    452KB

    MD5

    e7068de19b7b8d747c37eac1833f17be

    SHA1

    41873e3d6e0145697d744f7e8a595df5a9585ff0

    SHA256

    f1f5944481051edc9b6a3c27f6765ffec53ededd6a8589b0bad6b55d728cea83

    SHA512

    cd7a52c64100f90843024ef3e1ced7e3bae59a35e1e2dd348827fe150c3538feb0e43d1954c83f04e2071bf34e18b29833f6acbf9f6f28be943ac3d3c68b7f42

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1oN25fJ0.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1oN25fJ0.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2ET7690.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • memory/2360-79-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-80-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-90-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-88-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-86-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2360-84-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-81-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-83-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2360-82-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2772-69-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-55-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-47-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-45-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-51-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-59-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-67-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-65-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-53-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-49-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-57-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-61-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-63-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-43-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-42-0x0000000001D80000-0x0000000001D96000-memory.dmp

    Filesize

    88KB

  • memory/2772-41-0x0000000001D80000-0x0000000001D9C000-memory.dmp

    Filesize

    112KB

  • memory/2772-40-0x00000000003C0000-0x00000000003DE000-memory.dmp

    Filesize

    120KB