Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 07:22

General

  • Target

    a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe

  • Size

    1.1MB

  • MD5

    822349336a1533f98fb3ce01d7075a6a

  • SHA1

    911690599c8f7b1f7e904110d6d28a63fafeafd0

  • SHA256

    a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc

  • SHA512

    56e9e0a24cba99f4e563c15b7546545e7238d9e20d66409ca1e011f5b0a06495d813c3ccfb29dc6cf3966ad730d420f00780789a018a088a34b9c95722565906

  • SSDEEP

    24576:ryAUnMn6XTw4x69hD0cJNYuH8cMxtquD4EMrbmETcKxbE:eAYX8f99NH8cMeHrbmsxb

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe
    "C:\Users\Admin\AppData\Local\Temp\a39a42cfd284ef1d0754f183603299ebfd3e49988ca83e32a8c2e147a380c4bc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3278374.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3278374.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5052510.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5052510.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4935405.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4935405.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2632
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2704
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2640
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 280
                  6⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2492

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3278374.exe

        Filesize

        1.0MB

        MD5

        41cb0e4dbe6af65917784c86da81145d

        SHA1

        7d53dcb4e4f1ecb2a356255738d532da77199dff

        SHA256

        eb7d4eabd79d34d3491cca4433c36e0834557b1fb3dbbdeaecf47c0923d7bebf

        SHA512

        cccdf30e7ddc3557e7b2bafedd1752f5a6ad3f7e18de87565f7fd3733a19c7daa3c4828ec19bc858d825f19fc6e9e26ac6ed97745c061573edc59456e2505cad

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3278374.exe

        Filesize

        1.0MB

        MD5

        41cb0e4dbe6af65917784c86da81145d

        SHA1

        7d53dcb4e4f1ecb2a356255738d532da77199dff

        SHA256

        eb7d4eabd79d34d3491cca4433c36e0834557b1fb3dbbdeaecf47c0923d7bebf

        SHA512

        cccdf30e7ddc3557e7b2bafedd1752f5a6ad3f7e18de87565f7fd3733a19c7daa3c4828ec19bc858d825f19fc6e9e26ac6ed97745c061573edc59456e2505cad

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5052510.exe

        Filesize

        675KB

        MD5

        94fc5256b9a629cb03d3c36cd41bd383

        SHA1

        8c5db756a17308cab9963cd03251e75f9ac46bd7

        SHA256

        5fe28bf92d80d3a0a12573ad9761961fed8b7a3f1ecc8253f0b31a5b153862f9

        SHA512

        ecab9f93687b2055c7572c513de7bd166ec7888a7e7d782898d3d757fa80747466579c696efbe03eff65970d03150daa5b48a311de1e964204019ecda851a235

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5052510.exe

        Filesize

        675KB

        MD5

        94fc5256b9a629cb03d3c36cd41bd383

        SHA1

        8c5db756a17308cab9963cd03251e75f9ac46bd7

        SHA256

        5fe28bf92d80d3a0a12573ad9761961fed8b7a3f1ecc8253f0b31a5b153862f9

        SHA512

        ecab9f93687b2055c7572c513de7bd166ec7888a7e7d782898d3d757fa80747466579c696efbe03eff65970d03150daa5b48a311de1e964204019ecda851a235

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4935405.exe

        Filesize

        509KB

        MD5

        fdb98b2ca8e2498543f41c1afff06625

        SHA1

        2bac8cab94c21e67c7a49ca68fb2fe4b4204a844

        SHA256

        f3263739cb6d3ff4df6f2bb12e146b96ae1ac87feec4176b9883ec23531da365

        SHA512

        a2e2fb7ce279586b2281cac3d9a0361a2b98795ec9f216c082ee500032dd1dd55f4c9190243fed244113bce11cc8a8a39291cf7b2d985223ba2cd8bb92a80d5c

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4935405.exe

        Filesize

        509KB

        MD5

        fdb98b2ca8e2498543f41c1afff06625

        SHA1

        2bac8cab94c21e67c7a49ca68fb2fe4b4204a844

        SHA256

        f3263739cb6d3ff4df6f2bb12e146b96ae1ac87feec4176b9883ec23531da365

        SHA512

        a2e2fb7ce279586b2281cac3d9a0361a2b98795ec9f216c082ee500032dd1dd55f4c9190243fed244113bce11cc8a8a39291cf7b2d985223ba2cd8bb92a80d5c

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3278374.exe

        Filesize

        1.0MB

        MD5

        41cb0e4dbe6af65917784c86da81145d

        SHA1

        7d53dcb4e4f1ecb2a356255738d532da77199dff

        SHA256

        eb7d4eabd79d34d3491cca4433c36e0834557b1fb3dbbdeaecf47c0923d7bebf

        SHA512

        cccdf30e7ddc3557e7b2bafedd1752f5a6ad3f7e18de87565f7fd3733a19c7daa3c4828ec19bc858d825f19fc6e9e26ac6ed97745c061573edc59456e2505cad

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x3278374.exe

        Filesize

        1.0MB

        MD5

        41cb0e4dbe6af65917784c86da81145d

        SHA1

        7d53dcb4e4f1ecb2a356255738d532da77199dff

        SHA256

        eb7d4eabd79d34d3491cca4433c36e0834557b1fb3dbbdeaecf47c0923d7bebf

        SHA512

        cccdf30e7ddc3557e7b2bafedd1752f5a6ad3f7e18de87565f7fd3733a19c7daa3c4828ec19bc858d825f19fc6e9e26ac6ed97745c061573edc59456e2505cad

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5052510.exe

        Filesize

        675KB

        MD5

        94fc5256b9a629cb03d3c36cd41bd383

        SHA1

        8c5db756a17308cab9963cd03251e75f9ac46bd7

        SHA256

        5fe28bf92d80d3a0a12573ad9761961fed8b7a3f1ecc8253f0b31a5b153862f9

        SHA512

        ecab9f93687b2055c7572c513de7bd166ec7888a7e7d782898d3d757fa80747466579c696efbe03eff65970d03150daa5b48a311de1e964204019ecda851a235

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5052510.exe

        Filesize

        675KB

        MD5

        94fc5256b9a629cb03d3c36cd41bd383

        SHA1

        8c5db756a17308cab9963cd03251e75f9ac46bd7

        SHA256

        5fe28bf92d80d3a0a12573ad9761961fed8b7a3f1ecc8253f0b31a5b153862f9

        SHA512

        ecab9f93687b2055c7572c513de7bd166ec7888a7e7d782898d3d757fa80747466579c696efbe03eff65970d03150daa5b48a311de1e964204019ecda851a235

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4935405.exe

        Filesize

        509KB

        MD5

        fdb98b2ca8e2498543f41c1afff06625

        SHA1

        2bac8cab94c21e67c7a49ca68fb2fe4b4204a844

        SHA256

        f3263739cb6d3ff4df6f2bb12e146b96ae1ac87feec4176b9883ec23531da365

        SHA512

        a2e2fb7ce279586b2281cac3d9a0361a2b98795ec9f216c082ee500032dd1dd55f4c9190243fed244113bce11cc8a8a39291cf7b2d985223ba2cd8bb92a80d5c

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4935405.exe

        Filesize

        509KB

        MD5

        fdb98b2ca8e2498543f41c1afff06625

        SHA1

        2bac8cab94c21e67c7a49ca68fb2fe4b4204a844

        SHA256

        f3263739cb6d3ff4df6f2bb12e146b96ae1ac87feec4176b9883ec23531da365

        SHA512

        a2e2fb7ce279586b2281cac3d9a0361a2b98795ec9f216c082ee500032dd1dd55f4c9190243fed244113bce11cc8a8a39291cf7b2d985223ba2cd8bb92a80d5c

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4204654.exe

        Filesize

        1016KB

        MD5

        393345f665a4329b49df2e18bfc2ab1c

        SHA1

        3b19343b788271ce46b98c88aeb9ca76c4fb2061

        SHA256

        ecfd0ea5f7f416769d310317e44be9b4a0778faf074f60be87c564f045f8b03e

        SHA512

        532bf7e55ee8ae930220640670045cbc7600f45792a6a3df93867c07c591b4adc4483a22e5530c263ef421e21d9ef4e0db081b4dbb6e55b1ae2652a404e6f464

      • memory/2640-50-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-48-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-51-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2640-52-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-54-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-56-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-57-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-43-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-49-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-47-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-45-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2640-62-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB