Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 22:47

General

  • Target

    493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe

  • Size

    866KB

  • MD5

    78a2ac81f2d8c4b6144fed2884650b7f

  • SHA1

    508b05f74ac652040aee983eee929f2fc1a6cf2d

  • SHA256

    493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1

  • SHA512

    8649a47953793e42e2e71f5ea5624030833846b308aa91c65ab6b1332f31b216f2ae9053245365464cbe130c9c59c171d2c8aa59209d1c0915adff2e589b75c2

  • SSDEEP

    12288:cMrLy90gaUez5WlGEOEgC+Ncc18EHo4DQgb0RzObDre8VFRMNfvsg2eyYplqKF:HyfaU/rOA+qQb0pMR3kbyCnF

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe
    "C:\Users\Admin\AppData\Local\Temp\493de8db86e51211a025e0555fb66e654851e4c0696f1456792b70fbc2cc53c1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2784
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2672
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2644
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 276
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2576

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
      Filesize

      764KB

      MD5

      af7a90d89e6a8403a25ae6c0e2bd4655

      SHA1

      2afb5989688e6dbf7316c7afdec4f71619bf0260

      SHA256

      f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d

      SHA512

      727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
      Filesize

      764KB

      MD5

      af7a90d89e6a8403a25ae6c0e2bd4655

      SHA1

      2afb5989688e6dbf7316c7afdec4f71619bf0260

      SHA256

      f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d

      SHA512

      727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
      Filesize

      581KB

      MD5

      f1ff3c611da99fbff62910a5298bcad2

      SHA1

      d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec

      SHA256

      cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836

      SHA512

      3b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
      Filesize

      581KB

      MD5

      f1ff3c611da99fbff62910a5298bcad2

      SHA1

      d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec

      SHA256

      cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836

      SHA512

      3b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
      Filesize

      399KB

      MD5

      2f1d19f90db1a28d3c016371b2827e80

      SHA1

      978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13

      SHA256

      9bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce

      SHA512

      3b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
      Filesize

      399KB

      MD5

      2f1d19f90db1a28d3c016371b2827e80

      SHA1

      978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13

      SHA256

      9bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce

      SHA512

      3b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
      Filesize

      764KB

      MD5

      af7a90d89e6a8403a25ae6c0e2bd4655

      SHA1

      2afb5989688e6dbf7316c7afdec4f71619bf0260

      SHA256

      f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d

      SHA512

      727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6193069.exe
      Filesize

      764KB

      MD5

      af7a90d89e6a8403a25ae6c0e2bd4655

      SHA1

      2afb5989688e6dbf7316c7afdec4f71619bf0260

      SHA256

      f1fe56a087eae65b5a105eceb89e9a7fa9d8822a535c60f9ae3a3daf91dae08d

      SHA512

      727a7a88878b7bc16888460df58565004a8c20e5d88c0da49cc1a9922a95529c04a39a45c56f2a7d9ba156b5da2ee0524fa4fa663e70ffb50ee9a9075701b888

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
      Filesize

      581KB

      MD5

      f1ff3c611da99fbff62910a5298bcad2

      SHA1

      d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec

      SHA256

      cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836

      SHA512

      3b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5385396.exe
      Filesize

      581KB

      MD5

      f1ff3c611da99fbff62910a5298bcad2

      SHA1

      d4f7ecbf5267981c2c721ec6d7f7a3af40e71cec

      SHA256

      cee4d9e0581be59305230f66d08ccad8b9e86855315a0b590ed63e46de0c8836

      SHA512

      3b89cd115a8235f910cb16cb2f42bc5a72aa683437354ee58b028e5e1102d135744ecd51c4f51f2bf942fc281070b2cf9f6408cb23f864514e0cc878c572eb5e

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
      Filesize

      399KB

      MD5

      2f1d19f90db1a28d3c016371b2827e80

      SHA1

      978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13

      SHA256

      9bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce

      SHA512

      3b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z3487491.exe
      Filesize

      399KB

      MD5

      2f1d19f90db1a28d3c016371b2827e80

      SHA1

      978c6313505dcd7ec1a86dbbb3ca8f40a0d9db13

      SHA256

      9bd64380f9fc0adef717f8f104d2ee9917a798a9d4ac1034fa716ac47ff08dce

      SHA512

      3b7a8cbe80109dc9b97e5c54e5bb1288017bfe41d765c4d865a88584815ee1ffdf44b092672f78bcf16fae6cc96fe14370051e29cc70495e80a01dc4161331ee

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\r7989047.exe
      Filesize

      356KB

      MD5

      d0632a606309fdafdefb6725df4b365f

      SHA1

      0bb18d5be8302a4841987de5c903556d5bdc73ce

      SHA256

      a41f32c50f21676bd67e115b63644cbd4fcca351a674f7dcd24231ca7aa9fb50

      SHA512

      8fc215c86c2b5396df779d4aaad2b6c6fa2271ea1c6fcd090b47c4b2d2be9280eb54ced0fdeff3a64ca265457bc2fce540683b9c74a85120332c3620e3e80a7e

    • memory/2644-56-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-51-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-47-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-45-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-58-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-60-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-61-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-43-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-53-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-55-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/2644-49-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2644-66-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB