Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 23:21

General

  • Target

    2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe

  • Size

    928KB

  • MD5

    237f0453ec09669ea06948d3d012bca9

  • SHA1

    b57668880ac7bb91fa0a45dde4a6793ae3cde767

  • SHA256

    2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a

  • SHA512

    7a9022858544cee136bf701fca463a85055a92c9f26116596e364f25cb2197fa3d5fda114ba7420592afe3c24929615815857bae2b8f2442d53040b51f7403e7

  • SSDEEP

    12288:dMr6y90rv/kDDwTOIHJcm+vHGvI3igXQnFlr/D63z5ASw32jhGm/QD8F2O316uoV:Ty+2DwTLHOm+uvsQzGDC3ou8FImUD

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe
    "C:\Users\Admin\AppData\Local\Temp\2c87cb8abcfdc3d64682acf90c9bb67d16acd134c294fb2b51077947f551131a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8212383.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8212383.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6270797.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6270797.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5282751.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5282751.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2868
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2580
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2628
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 280
                  6⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:540

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8212383.exe

        Filesize

        826KB

        MD5

        8e4dcfe1e2d7cb98480652d6d17f3176

        SHA1

        55ca68e9a1a88aa1c22fbaa64e004988c79b01d9

        SHA256

        391bb62fd9fac9e484c049172f8fbaba3d1b5e01b9d74ef3c94352a97ff1e18d

        SHA512

        e8f2bc09551691e171472efb6e7166637bc0d8de76880d141da12241b7d9d582663745ff698c605886b6b7e7ff6712c0346d33507565295318bce9c0cb44c13b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8212383.exe

        Filesize

        826KB

        MD5

        8e4dcfe1e2d7cb98480652d6d17f3176

        SHA1

        55ca68e9a1a88aa1c22fbaa64e004988c79b01d9

        SHA256

        391bb62fd9fac9e484c049172f8fbaba3d1b5e01b9d74ef3c94352a97ff1e18d

        SHA512

        e8f2bc09551691e171472efb6e7166637bc0d8de76880d141da12241b7d9d582663745ff698c605886b6b7e7ff6712c0346d33507565295318bce9c0cb44c13b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6270797.exe

        Filesize

        566KB

        MD5

        b75463dc2cc1105e42f6ac36ad677e89

        SHA1

        563965ee6f02c11091b5bb08038ac1ca9632467b

        SHA256

        a265d07899f1984c13ef4fd0cfe0bdfead9f5932d9e49be015b7f62fdf1d9596

        SHA512

        c82b060bc92bfedff4541f77f96b07f73f4727dfeb0e75d859f03c04e4be71f5079c6b0df0fc9b9b81de30468d351022a5ae68cb880d460d6979055c96b300b7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6270797.exe

        Filesize

        566KB

        MD5

        b75463dc2cc1105e42f6ac36ad677e89

        SHA1

        563965ee6f02c11091b5bb08038ac1ca9632467b

        SHA256

        a265d07899f1984c13ef4fd0cfe0bdfead9f5932d9e49be015b7f62fdf1d9596

        SHA512

        c82b060bc92bfedff4541f77f96b07f73f4727dfeb0e75d859f03c04e4be71f5079c6b0df0fc9b9b81de30468d351022a5ae68cb880d460d6979055c96b300b7

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5282751.exe

        Filesize

        390KB

        MD5

        5fb5558a8bf8986befcf6285851f2b7f

        SHA1

        c4dae9dec2abc5df6374d3501cbe244592b75014

        SHA256

        cf76342b2c967836eb1f883d642c92b74f877f6498782efbbde79e34de973a9e

        SHA512

        32647a5883ef212096171e99c45c708cab0359a5c1096549dc5ff8f59c7136a966ea2e04d0eed7d3ef4bc4d10f073ad7e0cd7da4e8cf1298021a218c298f367a

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5282751.exe

        Filesize

        390KB

        MD5

        5fb5558a8bf8986befcf6285851f2b7f

        SHA1

        c4dae9dec2abc5df6374d3501cbe244592b75014

        SHA256

        cf76342b2c967836eb1f883d642c92b74f877f6498782efbbde79e34de973a9e

        SHA512

        32647a5883ef212096171e99c45c708cab0359a5c1096549dc5ff8f59c7136a966ea2e04d0eed7d3ef4bc4d10f073ad7e0cd7da4e8cf1298021a218c298f367a

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8212383.exe

        Filesize

        826KB

        MD5

        8e4dcfe1e2d7cb98480652d6d17f3176

        SHA1

        55ca68e9a1a88aa1c22fbaa64e004988c79b01d9

        SHA256

        391bb62fd9fac9e484c049172f8fbaba3d1b5e01b9d74ef3c94352a97ff1e18d

        SHA512

        e8f2bc09551691e171472efb6e7166637bc0d8de76880d141da12241b7d9d582663745ff698c605886b6b7e7ff6712c0346d33507565295318bce9c0cb44c13b

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8212383.exe

        Filesize

        826KB

        MD5

        8e4dcfe1e2d7cb98480652d6d17f3176

        SHA1

        55ca68e9a1a88aa1c22fbaa64e004988c79b01d9

        SHA256

        391bb62fd9fac9e484c049172f8fbaba3d1b5e01b9d74ef3c94352a97ff1e18d

        SHA512

        e8f2bc09551691e171472efb6e7166637bc0d8de76880d141da12241b7d9d582663745ff698c605886b6b7e7ff6712c0346d33507565295318bce9c0cb44c13b

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6270797.exe

        Filesize

        566KB

        MD5

        b75463dc2cc1105e42f6ac36ad677e89

        SHA1

        563965ee6f02c11091b5bb08038ac1ca9632467b

        SHA256

        a265d07899f1984c13ef4fd0cfe0bdfead9f5932d9e49be015b7f62fdf1d9596

        SHA512

        c82b060bc92bfedff4541f77f96b07f73f4727dfeb0e75d859f03c04e4be71f5079c6b0df0fc9b9b81de30468d351022a5ae68cb880d460d6979055c96b300b7

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6270797.exe

        Filesize

        566KB

        MD5

        b75463dc2cc1105e42f6ac36ad677e89

        SHA1

        563965ee6f02c11091b5bb08038ac1ca9632467b

        SHA256

        a265d07899f1984c13ef4fd0cfe0bdfead9f5932d9e49be015b7f62fdf1d9596

        SHA512

        c82b060bc92bfedff4541f77f96b07f73f4727dfeb0e75d859f03c04e4be71f5079c6b0df0fc9b9b81de30468d351022a5ae68cb880d460d6979055c96b300b7

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5282751.exe

        Filesize

        390KB

        MD5

        5fb5558a8bf8986befcf6285851f2b7f

        SHA1

        c4dae9dec2abc5df6374d3501cbe244592b75014

        SHA256

        cf76342b2c967836eb1f883d642c92b74f877f6498782efbbde79e34de973a9e

        SHA512

        32647a5883ef212096171e99c45c708cab0359a5c1096549dc5ff8f59c7136a966ea2e04d0eed7d3ef4bc4d10f073ad7e0cd7da4e8cf1298021a218c298f367a

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5282751.exe

        Filesize

        390KB

        MD5

        5fb5558a8bf8986befcf6285851f2b7f

        SHA1

        c4dae9dec2abc5df6374d3501cbe244592b75014

        SHA256

        cf76342b2c967836eb1f883d642c92b74f877f6498782efbbde79e34de973a9e

        SHA512

        32647a5883ef212096171e99c45c708cab0359a5c1096549dc5ff8f59c7136a966ea2e04d0eed7d3ef4bc4d10f073ad7e0cd7da4e8cf1298021a218c298f367a

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0214893.exe

        Filesize

        364KB

        MD5

        16d0f5ba3c4f006e63dd2c43008a6813

        SHA1

        46e4305b77f4b4f7b01f32eede69ab5750349c79

        SHA256

        2f777d758de4cfdbb7e9e31462dc216e01b86fc35e82c8f61ea4112e94666824

        SHA512

        c91cd14f95d2f35c5799129336e74b3e78e407629490c351c7fcc026b6b5f35a1a3bf31743f02934c73056fcb376aedf54ded03d0e97a67e6d720f144e8fa096

      • memory/2628-45-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-50-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-51-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2628-52-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-54-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-56-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-57-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-49-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-48-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-47-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-61-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2628-43-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB