Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 17:33

General

  • Target

    4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe

  • Size

    696KB

  • MD5

    075b4db83c7bcbde6efd1e8cd3b210a2

  • SHA1

    eaea0611f8de30886a21ca97769fd1606671631e

  • SHA256

    4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015

  • SHA512

    d2eaba3c64cd10a1a10872bfe8b771883af6bebb5ab9eee50e8cdf0b3499ef10abee321d1ab68e29f5bc9eb9cb7fe825ff1bfc0be455fcf2af315a5161e9d8a1

  • SSDEEP

    12288:hMrUy90Yq/smRbRcteoabjD7z61iHlrdMCB1B2w7K1t7RbfRvf6uT5:Ryfq/PbYeFYiHvzV7GZD6m5

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\4b54beded36b4ea379780bc12e18700e11ea118839f9d8883f7caa8b3bd40015_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gg0uU14.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gg0uU14.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1HQ87qh6.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1HQ87qh6.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2512
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 268
            5⤵
            • Program crash
            PID:2092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 284
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gg0uU14.exe

    Filesize

    452KB

    MD5

    af08aed92c4ce6c1026b3e0745e9b73b

    SHA1

    4dc257f502e59e08eb2da442b155b7c1828f26d6

    SHA256

    0b60cc1f42eea5e66d777a5b2ccb22eb8aca6ea1be18754534c951b85631ff0c

    SHA512

    8ec90e5e479c7a283e71e640481ed5e873c905c8d5d9089c345b57dc532617669e51557b0ffeeead942d3341bd9510323e5996891eabf37d1c394578b58477d8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gg0uU14.exe

    Filesize

    452KB

    MD5

    af08aed92c4ce6c1026b3e0745e9b73b

    SHA1

    4dc257f502e59e08eb2da442b155b7c1828f26d6

    SHA256

    0b60cc1f42eea5e66d777a5b2ccb22eb8aca6ea1be18754534c951b85631ff0c

    SHA512

    8ec90e5e479c7a283e71e640481ed5e873c905c8d5d9089c345b57dc532617669e51557b0ffeeead942d3341bd9510323e5996891eabf37d1c394578b58477d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1HQ87qh6.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1HQ87qh6.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Gg0uU14.exe

    Filesize

    452KB

    MD5

    af08aed92c4ce6c1026b3e0745e9b73b

    SHA1

    4dc257f502e59e08eb2da442b155b7c1828f26d6

    SHA256

    0b60cc1f42eea5e66d777a5b2ccb22eb8aca6ea1be18754534c951b85631ff0c

    SHA512

    8ec90e5e479c7a283e71e640481ed5e873c905c8d5d9089c345b57dc532617669e51557b0ffeeead942d3341bd9510323e5996891eabf37d1c394578b58477d8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Gg0uU14.exe

    Filesize

    452KB

    MD5

    af08aed92c4ce6c1026b3e0745e9b73b

    SHA1

    4dc257f502e59e08eb2da442b155b7c1828f26d6

    SHA256

    0b60cc1f42eea5e66d777a5b2ccb22eb8aca6ea1be18754534c951b85631ff0c

    SHA512

    8ec90e5e479c7a283e71e640481ed5e873c905c8d5d9089c345b57dc532617669e51557b0ffeeead942d3341bd9510323e5996891eabf37d1c394578b58477d8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\1HQ87qh6.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\1HQ87qh6.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2eN5607.exe

    Filesize

    378KB

    MD5

    f0831f173733de08511f3a0739f278a6

    SHA1

    06dc809d653c5d2c97386084ae13b50a73eb5b60

    SHA256

    8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

    SHA512

    19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

  • memory/2352-45-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-31-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-41-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-43-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-37-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-47-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-49-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-35-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-33-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-23-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-29-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-27-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-25-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-39-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2352-20-0x00000000020C0000-0x00000000020DE000-memory.dmp

    Filesize

    120KB

  • memory/2352-21-0x00000000020E0000-0x00000000020FC000-memory.dmp

    Filesize

    112KB

  • memory/2352-22-0x00000000020E0000-0x00000000020F6000-memory.dmp

    Filesize

    88KB

  • memory/2512-59-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2512-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2512-65-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2512-66-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2512-68-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2512-70-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2512-63-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2512-62-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2512-61-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2512-60-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB