Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 12:40

General

  • Target

    3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe

  • Size

    942KB

  • MD5

    5e24d68c1ffd39affe7061e59a8a583c

  • SHA1

    8422a179fe6090389a3014eceb351e5153a673c8

  • SHA256

    3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973

  • SHA512

    b17fd556fe0121429ba261e80c29a8d8e9a7a1180cc68ca2909162bba7eaa444fa6b1c2d0c74e70ccee75b3da71e818d55af64a4c6dcf909fa45f52480111c84

  • SSDEEP

    24576:8yvXgJUdpAqUcHo7YzzGawjiYe7rbNu6ByL4W:rvQJUvAdgzVbzNu68

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe
    "C:\Users\Admin\AppData\Local\Temp\3d5e19bb476f94f089702548a0995704cb530363dcd49e8f5a05e78645698973.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4102823.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4102823.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3620296.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3620296.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5443075.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5443075.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2132
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 272
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2660

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4102823.exe

            Filesize

            839KB

            MD5

            1c5c115095a5146c9313a16b69c070d3

            SHA1

            a0da0f651de5016e2e5503d689b4cfe1dbdb9e23

            SHA256

            c4fccbfbe584a349873e3096d36d8717d6393b3bc6bfe1e70649e8b1df5a0406

            SHA512

            3541d597531a544e6795559246b07db293c7b57e4b1dc81ed076ad85bec5e8663a85bc1bf62d1d04d6afbd0d97b263534cfe8ac747425ff27489127d75c9d9d3

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4102823.exe

            Filesize

            839KB

            MD5

            1c5c115095a5146c9313a16b69c070d3

            SHA1

            a0da0f651de5016e2e5503d689b4cfe1dbdb9e23

            SHA256

            c4fccbfbe584a349873e3096d36d8717d6393b3bc6bfe1e70649e8b1df5a0406

            SHA512

            3541d597531a544e6795559246b07db293c7b57e4b1dc81ed076ad85bec5e8663a85bc1bf62d1d04d6afbd0d97b263534cfe8ac747425ff27489127d75c9d9d3

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3620296.exe

            Filesize

            561KB

            MD5

            e843171c60655be4097558beae38e99f

            SHA1

            2075f84cface9a01d8868077b2abee4ff3ab78a0

            SHA256

            5c8d632f10ddc409d52c3d43de4829a21181e041905b7d1f1b431a763a4ba9a9

            SHA512

            c0058a67ee03c7ec8cc37ad6b4cdc62a1a8a73f281c951591dd6bce316cd4c7a98af566e7515b72670fdc2cfc3cd0df4e7f9675887eab5b582836f8096c08079

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3620296.exe

            Filesize

            561KB

            MD5

            e843171c60655be4097558beae38e99f

            SHA1

            2075f84cface9a01d8868077b2abee4ff3ab78a0

            SHA256

            5c8d632f10ddc409d52c3d43de4829a21181e041905b7d1f1b431a763a4ba9a9

            SHA512

            c0058a67ee03c7ec8cc37ad6b4cdc62a1a8a73f281c951591dd6bce316cd4c7a98af566e7515b72670fdc2cfc3cd0df4e7f9675887eab5b582836f8096c08079

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5443075.exe

            Filesize

            396KB

            MD5

            4161b575688122e1d631d3d03008db9a

            SHA1

            5afcc20df1beb4f88976293b642980e1c0d2c910

            SHA256

            8eaf0595c01be220e39739fc1be87a05db39ba61ce61b7a9c4f3f3c20fa7d7a5

            SHA512

            1084e42487f8e5ba3e2e61960ce93230fcb10e3412d0b7737f809e7c46525cdd00b05b2b8aa097c323f3744daa0cd1b67bef063df5b0739fb0e7636e6ad0df30

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5443075.exe

            Filesize

            396KB

            MD5

            4161b575688122e1d631d3d03008db9a

            SHA1

            5afcc20df1beb4f88976293b642980e1c0d2c910

            SHA256

            8eaf0595c01be220e39739fc1be87a05db39ba61ce61b7a9c4f3f3c20fa7d7a5

            SHA512

            1084e42487f8e5ba3e2e61960ce93230fcb10e3412d0b7737f809e7c46525cdd00b05b2b8aa097c323f3744daa0cd1b67bef063df5b0739fb0e7636e6ad0df30

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x4102823.exe

            Filesize

            839KB

            MD5

            1c5c115095a5146c9313a16b69c070d3

            SHA1

            a0da0f651de5016e2e5503d689b4cfe1dbdb9e23

            SHA256

            c4fccbfbe584a349873e3096d36d8717d6393b3bc6bfe1e70649e8b1df5a0406

            SHA512

            3541d597531a544e6795559246b07db293c7b57e4b1dc81ed076ad85bec5e8663a85bc1bf62d1d04d6afbd0d97b263534cfe8ac747425ff27489127d75c9d9d3

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x4102823.exe

            Filesize

            839KB

            MD5

            1c5c115095a5146c9313a16b69c070d3

            SHA1

            a0da0f651de5016e2e5503d689b4cfe1dbdb9e23

            SHA256

            c4fccbfbe584a349873e3096d36d8717d6393b3bc6bfe1e70649e8b1df5a0406

            SHA512

            3541d597531a544e6795559246b07db293c7b57e4b1dc81ed076ad85bec5e8663a85bc1bf62d1d04d6afbd0d97b263534cfe8ac747425ff27489127d75c9d9d3

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3620296.exe

            Filesize

            561KB

            MD5

            e843171c60655be4097558beae38e99f

            SHA1

            2075f84cface9a01d8868077b2abee4ff3ab78a0

            SHA256

            5c8d632f10ddc409d52c3d43de4829a21181e041905b7d1f1b431a763a4ba9a9

            SHA512

            c0058a67ee03c7ec8cc37ad6b4cdc62a1a8a73f281c951591dd6bce316cd4c7a98af566e7515b72670fdc2cfc3cd0df4e7f9675887eab5b582836f8096c08079

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3620296.exe

            Filesize

            561KB

            MD5

            e843171c60655be4097558beae38e99f

            SHA1

            2075f84cface9a01d8868077b2abee4ff3ab78a0

            SHA256

            5c8d632f10ddc409d52c3d43de4829a21181e041905b7d1f1b431a763a4ba9a9

            SHA512

            c0058a67ee03c7ec8cc37ad6b4cdc62a1a8a73f281c951591dd6bce316cd4c7a98af566e7515b72670fdc2cfc3cd0df4e7f9675887eab5b582836f8096c08079

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5443075.exe

            Filesize

            396KB

            MD5

            4161b575688122e1d631d3d03008db9a

            SHA1

            5afcc20df1beb4f88976293b642980e1c0d2c910

            SHA256

            8eaf0595c01be220e39739fc1be87a05db39ba61ce61b7a9c4f3f3c20fa7d7a5

            SHA512

            1084e42487f8e5ba3e2e61960ce93230fcb10e3412d0b7737f809e7c46525cdd00b05b2b8aa097c323f3744daa0cd1b67bef063df5b0739fb0e7636e6ad0df30

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5443075.exe

            Filesize

            396KB

            MD5

            4161b575688122e1d631d3d03008db9a

            SHA1

            5afcc20df1beb4f88976293b642980e1c0d2c910

            SHA256

            8eaf0595c01be220e39739fc1be87a05db39ba61ce61b7a9c4f3f3c20fa7d7a5

            SHA512

            1084e42487f8e5ba3e2e61960ce93230fcb10e3412d0b7737f809e7c46525cdd00b05b2b8aa097c323f3744daa0cd1b67bef063df5b0739fb0e7636e6ad0df30

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0409876.exe

            Filesize

            379KB

            MD5

            b3f56a9c6ea9eb38673eba0f9678b4ec

            SHA1

            38e16997b4c12572a6bf1648101d63a7abad1468

            SHA256

            be5f49c6766f12148090e624d69c909232dfc0963c856b164e25149c48f529d8

            SHA512

            fe385ba656e6ba3abc0dbef163da48c4959e3972d603f50c561b2ef1c7a63132b23c680f4aa5a21510d89e1a183cd1de726da83c0780f180e42e5c99f381aed6

          • memory/2132-45-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-53-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-55-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2132-56-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-58-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-60-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-61-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-51-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-49-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-47-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-65-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2132-43-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB