Analysis

  • max time kernel
    118s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 12:35

General

  • Target

    e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe

  • Size

    942KB

  • MD5

    0a69c25f5ba3219dfa7119c054f3e2e3

  • SHA1

    ba6982f9299c68f5b079a7233c4b012fcce7cc0b

  • SHA256

    e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd

  • SHA512

    82c40176179e9b860ff447abae9b9fbcb9b891db2bdce840a4e3178f7d882b6b5608036ce3a09c7313ae342aa7025d961cdafe1d31ca2ceb6142d75e91baaed9

  • SSDEEP

    24576:1ywdvPPyamTgXEX1JVmqmTvwMj7W9PHopUhC6JF:QwVOTgXEFJr2Ygi/o6J

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe
    "C:\Users\Admin\AppData\Local\Temp\e6b10c946ead2a9907fb8b1eae58e91a249b89bc8aa11ee355909388269258dd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5273818.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5273818.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7314091.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7314091.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2148
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7119484.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7119484.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3052
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2744
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 272
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2848

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5273818.exe

            Filesize

            840KB

            MD5

            8427e8530cbb0730c159fb95cfaeee03

            SHA1

            5f7b976ac94c9b0ad2265557fee7c9f2f49848ca

            SHA256

            3ce3030dc03737e157ca6581193fc27b7f0440f29dc7643fd480e15e29e7e05f

            SHA512

            bcbed67cb9fb7a9d0656566e8599436cf7fe7c123d7e6cce1c8f24c3aeb26a8d6f9ad21e428ea527b15e07102645406102f6a5009e124a2191ceb621c2a88493

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5273818.exe

            Filesize

            840KB

            MD5

            8427e8530cbb0730c159fb95cfaeee03

            SHA1

            5f7b976ac94c9b0ad2265557fee7c9f2f49848ca

            SHA256

            3ce3030dc03737e157ca6581193fc27b7f0440f29dc7643fd480e15e29e7e05f

            SHA512

            bcbed67cb9fb7a9d0656566e8599436cf7fe7c123d7e6cce1c8f24c3aeb26a8d6f9ad21e428ea527b15e07102645406102f6a5009e124a2191ceb621c2a88493

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7314091.exe

            Filesize

            562KB

            MD5

            648172470e4e84aebd4650b6bb49e333

            SHA1

            6b0d9d244102c74ee15e7c7db06bd544e7b0dffd

            SHA256

            1bfdddf7991be2574b36079d6a5aa09db6f5f4df63a3a66e8e1fd955486a46b0

            SHA512

            277c14203bc1d5d65e6399daeb7a030e0f071175186a0d7e6cf37a4cb2d75f48f8555c329796eaaee33cf5e18876bcb0c8f202329699ecb3ab1d40b4579ae645

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7314091.exe

            Filesize

            562KB

            MD5

            648172470e4e84aebd4650b6bb49e333

            SHA1

            6b0d9d244102c74ee15e7c7db06bd544e7b0dffd

            SHA256

            1bfdddf7991be2574b36079d6a5aa09db6f5f4df63a3a66e8e1fd955486a46b0

            SHA512

            277c14203bc1d5d65e6399daeb7a030e0f071175186a0d7e6cf37a4cb2d75f48f8555c329796eaaee33cf5e18876bcb0c8f202329699ecb3ab1d40b4579ae645

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7119484.exe

            Filesize

            396KB

            MD5

            319fcdc6dd3e878ced1906601e171f4d

            SHA1

            42deddfd79b573683f70b7c66a2b5d56cf9b226b

            SHA256

            5942bca25e3c872def32f1e92819295f709f24e4cfe8fdeb7b6137c53506580a

            SHA512

            69a679a30c213838ba6f1eef52dc5a7ba9dd4f2f4f4c1dfabdd8d0a22e2ca4c2bf68a7f3bd512685baaed4f769fae3c421e81bc44967e0bfd713eb0ad1ad32f6

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7119484.exe

            Filesize

            396KB

            MD5

            319fcdc6dd3e878ced1906601e171f4d

            SHA1

            42deddfd79b573683f70b7c66a2b5d56cf9b226b

            SHA256

            5942bca25e3c872def32f1e92819295f709f24e4cfe8fdeb7b6137c53506580a

            SHA512

            69a679a30c213838ba6f1eef52dc5a7ba9dd4f2f4f4c1dfabdd8d0a22e2ca4c2bf68a7f3bd512685baaed4f769fae3c421e81bc44967e0bfd713eb0ad1ad32f6

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5273818.exe

            Filesize

            840KB

            MD5

            8427e8530cbb0730c159fb95cfaeee03

            SHA1

            5f7b976ac94c9b0ad2265557fee7c9f2f49848ca

            SHA256

            3ce3030dc03737e157ca6581193fc27b7f0440f29dc7643fd480e15e29e7e05f

            SHA512

            bcbed67cb9fb7a9d0656566e8599436cf7fe7c123d7e6cce1c8f24c3aeb26a8d6f9ad21e428ea527b15e07102645406102f6a5009e124a2191ceb621c2a88493

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5273818.exe

            Filesize

            840KB

            MD5

            8427e8530cbb0730c159fb95cfaeee03

            SHA1

            5f7b976ac94c9b0ad2265557fee7c9f2f49848ca

            SHA256

            3ce3030dc03737e157ca6581193fc27b7f0440f29dc7643fd480e15e29e7e05f

            SHA512

            bcbed67cb9fb7a9d0656566e8599436cf7fe7c123d7e6cce1c8f24c3aeb26a8d6f9ad21e428ea527b15e07102645406102f6a5009e124a2191ceb621c2a88493

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x7314091.exe

            Filesize

            562KB

            MD5

            648172470e4e84aebd4650b6bb49e333

            SHA1

            6b0d9d244102c74ee15e7c7db06bd544e7b0dffd

            SHA256

            1bfdddf7991be2574b36079d6a5aa09db6f5f4df63a3a66e8e1fd955486a46b0

            SHA512

            277c14203bc1d5d65e6399daeb7a030e0f071175186a0d7e6cf37a4cb2d75f48f8555c329796eaaee33cf5e18876bcb0c8f202329699ecb3ab1d40b4579ae645

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x7314091.exe

            Filesize

            562KB

            MD5

            648172470e4e84aebd4650b6bb49e333

            SHA1

            6b0d9d244102c74ee15e7c7db06bd544e7b0dffd

            SHA256

            1bfdddf7991be2574b36079d6a5aa09db6f5f4df63a3a66e8e1fd955486a46b0

            SHA512

            277c14203bc1d5d65e6399daeb7a030e0f071175186a0d7e6cf37a4cb2d75f48f8555c329796eaaee33cf5e18876bcb0c8f202329699ecb3ab1d40b4579ae645

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x7119484.exe

            Filesize

            396KB

            MD5

            319fcdc6dd3e878ced1906601e171f4d

            SHA1

            42deddfd79b573683f70b7c66a2b5d56cf9b226b

            SHA256

            5942bca25e3c872def32f1e92819295f709f24e4cfe8fdeb7b6137c53506580a

            SHA512

            69a679a30c213838ba6f1eef52dc5a7ba9dd4f2f4f4c1dfabdd8d0a22e2ca4c2bf68a7f3bd512685baaed4f769fae3c421e81bc44967e0bfd713eb0ad1ad32f6

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x7119484.exe

            Filesize

            396KB

            MD5

            319fcdc6dd3e878ced1906601e171f4d

            SHA1

            42deddfd79b573683f70b7c66a2b5d56cf9b226b

            SHA256

            5942bca25e3c872def32f1e92819295f709f24e4cfe8fdeb7b6137c53506580a

            SHA512

            69a679a30c213838ba6f1eef52dc5a7ba9dd4f2f4f4c1dfabdd8d0a22e2ca4c2bf68a7f3bd512685baaed4f769fae3c421e81bc44967e0bfd713eb0ad1ad32f6

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4552702.exe

            Filesize

            379KB

            MD5

            6471f849e3678a2a6d495d2ccc11dcfa

            SHA1

            7762c6dc3c470737e4dda63cebe45187197894d9

            SHA256

            c9dd438247f57af6dd83c47a5129e9a923bc78ccaa1e447451998ea06e49ccf5

            SHA512

            4a0862055abeb46a43125eca6fd9afc2d1c21dc3ed410d49edac7636b2a1f9d2f55bcf4ecec549902b0128d9d2d7cac37a72ca396b18b8d51b03a8fd9517d9eb

          • memory/2744-49-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-50-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-51-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2744-52-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-54-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-56-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-57-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-43-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-48-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-47-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-45-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2744-62-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB