Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 17:18

General

  • Target

    6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe

  • Size

    928KB

  • MD5

    67f1ace4e9ee8bc91558eaec87a77636

  • SHA1

    ec1941040cfc9c6369b5187ebd1e970bd6131e88

  • SHA256

    6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e

  • SHA512

    4ddef8d3409c97ce40fb13ae5b8e27166e833656ad4b5754ebb079917de7e37fe02eda832ca1241a7fec24148600965ff8f1f067e45bd5f2273b9c7da74287a9

  • SSDEEP

    12288:AMrUy90nRBeXIYBP8Q0bOimBo7kPlcrCdPw8KBaNa81VpfyaSpXg8ejjVbdY43GG:EyvrBcbMS7drhBaNasKacIWgr

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe
    "C:\Users\Admin\AppData\Local\Temp\6f35c251c0f8b35f0d2dd32a3ade49f4b01cac3b7ab9c0c1e9985d0b4966161e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0243303.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0243303.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5047351.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5047351.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9022496.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9022496.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2768
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2728
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 272
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2600

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0243303.exe

            Filesize

            827KB

            MD5

            bce02ec329069fb565b97bc03e8d3cbd

            SHA1

            8bb2a838e5d1bd7ec476307da3651694849029b3

            SHA256

            76663eb4338197b88ff34f14e3339bb0a66b120bc598384c18b74e9db71d558d

            SHA512

            bae4e099a8d5767fcb1f0d6e5a7cf23e61bbbb91177fb9576db37a10a2c2708d1533fa0e8cf32584069dabae88a992faf415f6b716cdef5b9dee515b5ad6f49b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0243303.exe

            Filesize

            827KB

            MD5

            bce02ec329069fb565b97bc03e8d3cbd

            SHA1

            8bb2a838e5d1bd7ec476307da3651694849029b3

            SHA256

            76663eb4338197b88ff34f14e3339bb0a66b120bc598384c18b74e9db71d558d

            SHA512

            bae4e099a8d5767fcb1f0d6e5a7cf23e61bbbb91177fb9576db37a10a2c2708d1533fa0e8cf32584069dabae88a992faf415f6b716cdef5b9dee515b5ad6f49b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5047351.exe

            Filesize

            556KB

            MD5

            8de840ce62b7fcecbe5028105d9c0727

            SHA1

            0d5bc59c3cbf4675c83477fa7b44c878ed894ebb

            SHA256

            0d1633d6e884ff20f487ce20a49a1eacdc85e394487da2708728a9c3c73b15af

            SHA512

            924d11f3d9a26f9f3928369745584cb38b2c480cb592795c50c4e73b4f85639fb52532a87cfee53715b4095521d7625fc5b7643c970afde0dd61359cb77a31a0

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5047351.exe

            Filesize

            556KB

            MD5

            8de840ce62b7fcecbe5028105d9c0727

            SHA1

            0d5bc59c3cbf4675c83477fa7b44c878ed894ebb

            SHA256

            0d1633d6e884ff20f487ce20a49a1eacdc85e394487da2708728a9c3c73b15af

            SHA512

            924d11f3d9a26f9f3928369745584cb38b2c480cb592795c50c4e73b4f85639fb52532a87cfee53715b4095521d7625fc5b7643c970afde0dd61359cb77a31a0

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9022496.exe

            Filesize

            390KB

            MD5

            849234cb5df1b282d4c52bc12fedcbce

            SHA1

            ad767c5587699eae9460afd45abc4aca365a4093

            SHA256

            2dc02641bc82d2f8e637bd698a69d86ee86ed120fb128e1791e42bda8059b0bb

            SHA512

            8656781911354e6f3121f61442da803eaaf812977686ae205c8dbf2d21710f8282d78ff3f4f5839dca020c0f1116963daf83de37dad0cae6fce6f41b3b248396

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9022496.exe

            Filesize

            390KB

            MD5

            849234cb5df1b282d4c52bc12fedcbce

            SHA1

            ad767c5587699eae9460afd45abc4aca365a4093

            SHA256

            2dc02641bc82d2f8e637bd698a69d86ee86ed120fb128e1791e42bda8059b0bb

            SHA512

            8656781911354e6f3121f61442da803eaaf812977686ae205c8dbf2d21710f8282d78ff3f4f5839dca020c0f1116963daf83de37dad0cae6fce6f41b3b248396

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0243303.exe

            Filesize

            827KB

            MD5

            bce02ec329069fb565b97bc03e8d3cbd

            SHA1

            8bb2a838e5d1bd7ec476307da3651694849029b3

            SHA256

            76663eb4338197b88ff34f14e3339bb0a66b120bc598384c18b74e9db71d558d

            SHA512

            bae4e099a8d5767fcb1f0d6e5a7cf23e61bbbb91177fb9576db37a10a2c2708d1533fa0e8cf32584069dabae88a992faf415f6b716cdef5b9dee515b5ad6f49b

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0243303.exe

            Filesize

            827KB

            MD5

            bce02ec329069fb565b97bc03e8d3cbd

            SHA1

            8bb2a838e5d1bd7ec476307da3651694849029b3

            SHA256

            76663eb4338197b88ff34f14e3339bb0a66b120bc598384c18b74e9db71d558d

            SHA512

            bae4e099a8d5767fcb1f0d6e5a7cf23e61bbbb91177fb9576db37a10a2c2708d1533fa0e8cf32584069dabae88a992faf415f6b716cdef5b9dee515b5ad6f49b

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5047351.exe

            Filesize

            556KB

            MD5

            8de840ce62b7fcecbe5028105d9c0727

            SHA1

            0d5bc59c3cbf4675c83477fa7b44c878ed894ebb

            SHA256

            0d1633d6e884ff20f487ce20a49a1eacdc85e394487da2708728a9c3c73b15af

            SHA512

            924d11f3d9a26f9f3928369745584cb38b2c480cb592795c50c4e73b4f85639fb52532a87cfee53715b4095521d7625fc5b7643c970afde0dd61359cb77a31a0

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5047351.exe

            Filesize

            556KB

            MD5

            8de840ce62b7fcecbe5028105d9c0727

            SHA1

            0d5bc59c3cbf4675c83477fa7b44c878ed894ebb

            SHA256

            0d1633d6e884ff20f487ce20a49a1eacdc85e394487da2708728a9c3c73b15af

            SHA512

            924d11f3d9a26f9f3928369745584cb38b2c480cb592795c50c4e73b4f85639fb52532a87cfee53715b4095521d7625fc5b7643c970afde0dd61359cb77a31a0

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9022496.exe

            Filesize

            390KB

            MD5

            849234cb5df1b282d4c52bc12fedcbce

            SHA1

            ad767c5587699eae9460afd45abc4aca365a4093

            SHA256

            2dc02641bc82d2f8e637bd698a69d86ee86ed120fb128e1791e42bda8059b0bb

            SHA512

            8656781911354e6f3121f61442da803eaaf812977686ae205c8dbf2d21710f8282d78ff3f4f5839dca020c0f1116963daf83de37dad0cae6fce6f41b3b248396

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9022496.exe

            Filesize

            390KB

            MD5

            849234cb5df1b282d4c52bc12fedcbce

            SHA1

            ad767c5587699eae9460afd45abc4aca365a4093

            SHA256

            2dc02641bc82d2f8e637bd698a69d86ee86ed120fb128e1791e42bda8059b0bb

            SHA512

            8656781911354e6f3121f61442da803eaaf812977686ae205c8dbf2d21710f8282d78ff3f4f5839dca020c0f1116963daf83de37dad0cae6fce6f41b3b248396

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1862720.exe

            Filesize

            364KB

            MD5

            a1838fe574b9b433baae72b33e645d10

            SHA1

            b5c7051dde7a58bbcca4ecea3667a37a94d965af

            SHA256

            de75a4d5cc3cc27eca73c846088c1ee5a2876ea7034328f0ec33d471b41e6087

            SHA512

            84b20b478bd8cf68120396cbd0cbb32176f1f310aa80f74c3733ff855dce97afed7af1c77d5326b0f61ffc505215eab4a66a08953a2570bc866a41a41dff711f

          • memory/2728-45-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-53-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-55-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2728-56-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-58-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-60-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-61-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-51-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-49-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-47-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-43-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2728-66-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB