Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 15:11

General

  • Target

    0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe

  • Size

    930KB

  • MD5

    b5b8275871d3e90880243c2f63773b44

  • SHA1

    68cee9fcc2c3fb423e76f315e6674ad78c5aa470

  • SHA256

    0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa

  • SHA512

    1797f3f8cf29ef8b3d6f487b5ed8895c8e6f52f40068af26b3a64655ca7abbb2210b530e0a445fa12db73b70fb3dc881d73ff75bb12baf12fa7c7a32797af565

  • SSDEEP

    24576:JyGHzE2na/rmOY642zUZO1sGiNptAS3Q+oUji:8Gi/rfYYzUhGiNAQ5oUj

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe
    "C:\Users\Admin\AppData\Local\Temp\0ace97e500233accdd2c9acf29982d630386122f7629be629de7a6a782662ffa.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8148181.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8148181.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6430449.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6430449.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0095840.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0095840.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1252
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2944
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2688
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                    PID:2612
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    6⤵
                      PID:2488
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      6⤵
                        PID:2620
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 304
                        6⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:2456

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8148181.exe

                    Filesize

                    828KB

                    MD5

                    2cee37f7b418d91fa7b5886e696508b6

                    SHA1

                    62967c33d35ab853fefbfda14edd2ad0de4e91b2

                    SHA256

                    373bc546fe541081a6eb9b5263e6bfe4a6d17ebe2860a1647df2091be64ce04a

                    SHA512

                    90958c9d356a616b0a50771ba8664d614f1a75f28cef3411ea3d78454f8363510f369ed3dda15648c10f4c913afbfd637f2635b2abcd2308d2241570d29c4ac2

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8148181.exe

                    Filesize

                    828KB

                    MD5

                    2cee37f7b418d91fa7b5886e696508b6

                    SHA1

                    62967c33d35ab853fefbfda14edd2ad0de4e91b2

                    SHA256

                    373bc546fe541081a6eb9b5263e6bfe4a6d17ebe2860a1647df2091be64ce04a

                    SHA512

                    90958c9d356a616b0a50771ba8664d614f1a75f28cef3411ea3d78454f8363510f369ed3dda15648c10f4c913afbfd637f2635b2abcd2308d2241570d29c4ac2

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6430449.exe

                    Filesize

                    557KB

                    MD5

                    748d3a468294e61050acc81bbdf54e93

                    SHA1

                    dd69ab55168fa6754580494246ad9c632eb65204

                    SHA256

                    9ca4d2402efa30daed13f1b7f470c838278b3631a75fce8f8f252e177e47ecc1

                    SHA512

                    ec80dccc618812ae429ecb91030c25436cc0c5f12a775688a3f63424866266e088556a392e2cdc04820795ad1e29f9d7bc3bfa4d47a98092fa0610fd634c0986

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6430449.exe

                    Filesize

                    557KB

                    MD5

                    748d3a468294e61050acc81bbdf54e93

                    SHA1

                    dd69ab55168fa6754580494246ad9c632eb65204

                    SHA256

                    9ca4d2402efa30daed13f1b7f470c838278b3631a75fce8f8f252e177e47ecc1

                    SHA512

                    ec80dccc618812ae429ecb91030c25436cc0c5f12a775688a3f63424866266e088556a392e2cdc04820795ad1e29f9d7bc3bfa4d47a98092fa0610fd634c0986

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0095840.exe

                    Filesize

                    391KB

                    MD5

                    4670cf09188d20f44f1e5fa0a799d629

                    SHA1

                    cd4d95cb5eef8be0dd69b02eca8cb868291105b8

                    SHA256

                    fbd94623bbe6094166d921a1ae453d9152ed864dd87af31d3dfc98a799d4272f

                    SHA512

                    7cdcfa4c20a8db9b445ec17001377ec6fd6c294c9ac4ef1bf405eb69e3d4fa75158993fa07ea8f0924575c7caf137bc7cfe9572cba809986b9bac8a19740b2a2

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0095840.exe

                    Filesize

                    391KB

                    MD5

                    4670cf09188d20f44f1e5fa0a799d629

                    SHA1

                    cd4d95cb5eef8be0dd69b02eca8cb868291105b8

                    SHA256

                    fbd94623bbe6094166d921a1ae453d9152ed864dd87af31d3dfc98a799d4272f

                    SHA512

                    7cdcfa4c20a8db9b445ec17001377ec6fd6c294c9ac4ef1bf405eb69e3d4fa75158993fa07ea8f0924575c7caf137bc7cfe9572cba809986b9bac8a19740b2a2

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8148181.exe

                    Filesize

                    828KB

                    MD5

                    2cee37f7b418d91fa7b5886e696508b6

                    SHA1

                    62967c33d35ab853fefbfda14edd2ad0de4e91b2

                    SHA256

                    373bc546fe541081a6eb9b5263e6bfe4a6d17ebe2860a1647df2091be64ce04a

                    SHA512

                    90958c9d356a616b0a50771ba8664d614f1a75f28cef3411ea3d78454f8363510f369ed3dda15648c10f4c913afbfd637f2635b2abcd2308d2241570d29c4ac2

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8148181.exe

                    Filesize

                    828KB

                    MD5

                    2cee37f7b418d91fa7b5886e696508b6

                    SHA1

                    62967c33d35ab853fefbfda14edd2ad0de4e91b2

                    SHA256

                    373bc546fe541081a6eb9b5263e6bfe4a6d17ebe2860a1647df2091be64ce04a

                    SHA512

                    90958c9d356a616b0a50771ba8664d614f1a75f28cef3411ea3d78454f8363510f369ed3dda15648c10f4c913afbfd637f2635b2abcd2308d2241570d29c4ac2

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6430449.exe

                    Filesize

                    557KB

                    MD5

                    748d3a468294e61050acc81bbdf54e93

                    SHA1

                    dd69ab55168fa6754580494246ad9c632eb65204

                    SHA256

                    9ca4d2402efa30daed13f1b7f470c838278b3631a75fce8f8f252e177e47ecc1

                    SHA512

                    ec80dccc618812ae429ecb91030c25436cc0c5f12a775688a3f63424866266e088556a392e2cdc04820795ad1e29f9d7bc3bfa4d47a98092fa0610fd634c0986

                  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6430449.exe

                    Filesize

                    557KB

                    MD5

                    748d3a468294e61050acc81bbdf54e93

                    SHA1

                    dd69ab55168fa6754580494246ad9c632eb65204

                    SHA256

                    9ca4d2402efa30daed13f1b7f470c838278b3631a75fce8f8f252e177e47ecc1

                    SHA512

                    ec80dccc618812ae429ecb91030c25436cc0c5f12a775688a3f63424866266e088556a392e2cdc04820795ad1e29f9d7bc3bfa4d47a98092fa0610fd634c0986

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0095840.exe

                    Filesize

                    391KB

                    MD5

                    4670cf09188d20f44f1e5fa0a799d629

                    SHA1

                    cd4d95cb5eef8be0dd69b02eca8cb868291105b8

                    SHA256

                    fbd94623bbe6094166d921a1ae453d9152ed864dd87af31d3dfc98a799d4272f

                    SHA512

                    7cdcfa4c20a8db9b445ec17001377ec6fd6c294c9ac4ef1bf405eb69e3d4fa75158993fa07ea8f0924575c7caf137bc7cfe9572cba809986b9bac8a19740b2a2

                  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0095840.exe

                    Filesize

                    391KB

                    MD5

                    4670cf09188d20f44f1e5fa0a799d629

                    SHA1

                    cd4d95cb5eef8be0dd69b02eca8cb868291105b8

                    SHA256

                    fbd94623bbe6094166d921a1ae453d9152ed864dd87af31d3dfc98a799d4272f

                    SHA512

                    7cdcfa4c20a8db9b445ec17001377ec6fd6c294c9ac4ef1bf405eb69e3d4fa75158993fa07ea8f0924575c7caf137bc7cfe9572cba809986b9bac8a19740b2a2

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9960039.exe

                    Filesize

                    364KB

                    MD5

                    6ea7375de68b14af3a1c599cb7907a6b

                    SHA1

                    2ce6474ad65fa64454df4863fc0e6df8eaa24b59

                    SHA256

                    cd03729a839b71a48c7b2e2d68dd7c4518c48e2a194331ce8f9a45c946e10193

                    SHA512

                    1a674fc35dc6cdb6aac7cb67737281525532d9584fcbad52a485354eff40b9a89fb0d5e6985c983e5d5c4c64e7c331d23eeee9a3f2028f5ebe80398a4e1c792a

                  • memory/2620-45-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-50-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-51-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/2620-52-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-54-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-56-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-57-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-49-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-48-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-47-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-61-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/2620-43-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB