Analysis

  • max time kernel
    122s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 06:36

General

  • Target

    d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe

  • Size

    928KB

  • MD5

    bacef800a1cc6524cb7a72a1bfb940e1

  • SHA1

    ade0039895a1d0e6179127b9c6cc63df35bfac4c

  • SHA256

    d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d

  • SHA512

    676d3c90763804eb44579ee144a11eb482a9030fe4e57345e4fb67ef679aeaf9a1a411e58939d998b1c20bfa00c1d49c6889c171cc6be4d022a253daf3547c41

  • SSDEEP

    12288:pMrSy90j08aZHByNsyIhKiRxDk5KEwC/L2F2gAtwVmN+LT9eMVsRoDGtWYIE:byd8oBcsySK4x1zCL2Mg1mGpVsSDGYu

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe
    "C:\Users\Admin\AppData\Local\Temp\d0fab76ffc58a6f0d9cc00f46457aada164429b3db2e13e589a3b9673084b39d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9581551.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9581551.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6191232.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6191232.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9947503.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9947503.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1664
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:112
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 276
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2564

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9581551.exe

            Filesize

            826KB

            MD5

            cfb67fe0aafa7a9463441907387e97f7

            SHA1

            2a17d149b955de7e556a386f35a8e03ad57e76e9

            SHA256

            a4f7ab595d230aa7e65d21c42bc5cc1d365bb274ebfcbf8d0b5e3cd500f016cf

            SHA512

            6553bb7a2281d153e491b02c622f8fcb29729c54e394b1aa4228fffed6849e917bdc47935fd89500d154c58fd8819c1fe1d0a6001d6e344a66b7740cf7b6363f

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9581551.exe

            Filesize

            826KB

            MD5

            cfb67fe0aafa7a9463441907387e97f7

            SHA1

            2a17d149b955de7e556a386f35a8e03ad57e76e9

            SHA256

            a4f7ab595d230aa7e65d21c42bc5cc1d365bb274ebfcbf8d0b5e3cd500f016cf

            SHA512

            6553bb7a2281d153e491b02c622f8fcb29729c54e394b1aa4228fffed6849e917bdc47935fd89500d154c58fd8819c1fe1d0a6001d6e344a66b7740cf7b6363f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6191232.exe

            Filesize

            556KB

            MD5

            4bdef36f1bae62eae961fdcc6c187f40

            SHA1

            750bb61c3d73fbdff40ba8d4f5090f4a4f1830b7

            SHA256

            f858721439a30e8d494b19099f9fb24584a93523d2bd01c66acce8d1ca31317c

            SHA512

            cec644ff86fe77812fbd579a1316d16d3dc11dd45acd73257fa8340ab895361746ae1ab2ce2d2ee630179da89bc6da9cb25fc518e46bbc0b85137e952467e509

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6191232.exe

            Filesize

            556KB

            MD5

            4bdef36f1bae62eae961fdcc6c187f40

            SHA1

            750bb61c3d73fbdff40ba8d4f5090f4a4f1830b7

            SHA256

            f858721439a30e8d494b19099f9fb24584a93523d2bd01c66acce8d1ca31317c

            SHA512

            cec644ff86fe77812fbd579a1316d16d3dc11dd45acd73257fa8340ab895361746ae1ab2ce2d2ee630179da89bc6da9cb25fc518e46bbc0b85137e952467e509

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9947503.exe

            Filesize

            390KB

            MD5

            67e188b5a3aa2c0ed96bb3b30ac7686f

            SHA1

            9dbab52158381915abf29d4029096e43633dd295

            SHA256

            0424828e7ade27f996f4ffd1d0458113b48b38023a55569bbddbc84949efb352

            SHA512

            cd787f9e0e36c7bc0e08883c0b044ca526121a140e88d38bcb77ec888e0d84ae1070b3d2f277ba9f5b732be9fcb4f2d7c4185680669bc0ddf700dd36ca76cd16

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9947503.exe

            Filesize

            390KB

            MD5

            67e188b5a3aa2c0ed96bb3b30ac7686f

            SHA1

            9dbab52158381915abf29d4029096e43633dd295

            SHA256

            0424828e7ade27f996f4ffd1d0458113b48b38023a55569bbddbc84949efb352

            SHA512

            cd787f9e0e36c7bc0e08883c0b044ca526121a140e88d38bcb77ec888e0d84ae1070b3d2f277ba9f5b732be9fcb4f2d7c4185680669bc0ddf700dd36ca76cd16

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9581551.exe

            Filesize

            826KB

            MD5

            cfb67fe0aafa7a9463441907387e97f7

            SHA1

            2a17d149b955de7e556a386f35a8e03ad57e76e9

            SHA256

            a4f7ab595d230aa7e65d21c42bc5cc1d365bb274ebfcbf8d0b5e3cd500f016cf

            SHA512

            6553bb7a2281d153e491b02c622f8fcb29729c54e394b1aa4228fffed6849e917bdc47935fd89500d154c58fd8819c1fe1d0a6001d6e344a66b7740cf7b6363f

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x9581551.exe

            Filesize

            826KB

            MD5

            cfb67fe0aafa7a9463441907387e97f7

            SHA1

            2a17d149b955de7e556a386f35a8e03ad57e76e9

            SHA256

            a4f7ab595d230aa7e65d21c42bc5cc1d365bb274ebfcbf8d0b5e3cd500f016cf

            SHA512

            6553bb7a2281d153e491b02c622f8fcb29729c54e394b1aa4228fffed6849e917bdc47935fd89500d154c58fd8819c1fe1d0a6001d6e344a66b7740cf7b6363f

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6191232.exe

            Filesize

            556KB

            MD5

            4bdef36f1bae62eae961fdcc6c187f40

            SHA1

            750bb61c3d73fbdff40ba8d4f5090f4a4f1830b7

            SHA256

            f858721439a30e8d494b19099f9fb24584a93523d2bd01c66acce8d1ca31317c

            SHA512

            cec644ff86fe77812fbd579a1316d16d3dc11dd45acd73257fa8340ab895361746ae1ab2ce2d2ee630179da89bc6da9cb25fc518e46bbc0b85137e952467e509

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6191232.exe

            Filesize

            556KB

            MD5

            4bdef36f1bae62eae961fdcc6c187f40

            SHA1

            750bb61c3d73fbdff40ba8d4f5090f4a4f1830b7

            SHA256

            f858721439a30e8d494b19099f9fb24584a93523d2bd01c66acce8d1ca31317c

            SHA512

            cec644ff86fe77812fbd579a1316d16d3dc11dd45acd73257fa8340ab895361746ae1ab2ce2d2ee630179da89bc6da9cb25fc518e46bbc0b85137e952467e509

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9947503.exe

            Filesize

            390KB

            MD5

            67e188b5a3aa2c0ed96bb3b30ac7686f

            SHA1

            9dbab52158381915abf29d4029096e43633dd295

            SHA256

            0424828e7ade27f996f4ffd1d0458113b48b38023a55569bbddbc84949efb352

            SHA512

            cd787f9e0e36c7bc0e08883c0b044ca526121a140e88d38bcb77ec888e0d84ae1070b3d2f277ba9f5b732be9fcb4f2d7c4185680669bc0ddf700dd36ca76cd16

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9947503.exe

            Filesize

            390KB

            MD5

            67e188b5a3aa2c0ed96bb3b30ac7686f

            SHA1

            9dbab52158381915abf29d4029096e43633dd295

            SHA256

            0424828e7ade27f996f4ffd1d0458113b48b38023a55569bbddbc84949efb352

            SHA512

            cd787f9e0e36c7bc0e08883c0b044ca526121a140e88d38bcb77ec888e0d84ae1070b3d2f277ba9f5b732be9fcb4f2d7c4185680669bc0ddf700dd36ca76cd16

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2887451.exe

            Filesize

            356KB

            MD5

            4940525e4df6277e78b7fcd6d7944e3d

            SHA1

            8ea2d93f5685f13b1338b5dc68247317a7c52dd1

            SHA256

            12350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053

            SHA512

            b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359

          • memory/112-51-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-53-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-56-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-55-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/112-58-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-60-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-61-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-45-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-49-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-47-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-65-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/112-43-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB