Analysis

  • max time kernel
    119s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 02:51

General

  • Target

    88f4a56aa3fbc6d2f08484255ed158c3abf324233bf4e7268e19556c8ed01ca9.exe

  • Size

    1.0MB

  • MD5

    bc1ed13bc7bab353b19cb23d8b598e20

  • SHA1

    c6ecbba130c05c4b53ace7974a4eb8a62f27e12f

  • SHA256

    88f4a56aa3fbc6d2f08484255ed158c3abf324233bf4e7268e19556c8ed01ca9

  • SHA512

    d1043dabbebd2d0c3751435f8f0e6c998628605a40688a74897c70e1fb4918a30e1642b9cd993379c1673763a101fe111d023914ef80f58c72cb87b158a4bdb3

  • SSDEEP

    24576:VytoW1GZBe2cjBOuq6QFT2TWEomUIErNKAuoiyqzbB:wtoCGG2cg3twomUpSoi

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88f4a56aa3fbc6d2f08484255ed158c3abf324233bf4e7268e19556c8ed01ca9.exe
    "C:\Users\Admin\AppData\Local\Temp\88f4a56aa3fbc6d2f08484255ed158c3abf324233bf4e7268e19556c8ed01ca9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9638143.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9638143.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9298967.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9298967.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0304472.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0304472.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9783598.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9783598.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2584
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7024965.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7024965.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2740
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3000
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2476
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2472
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2492
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                        PID:2508
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                        7⤵
                          PID:2540
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 304
                          7⤵
                          • Loads dropped DLL
                          • Program crash
                          PID:1772

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9638143.exe

              Filesize

              969KB

              MD5

              e98bded1ffa030c776996ba69c24428e

              SHA1

              ccb831cb0186e3b7d4622760390f44db07541bf9

              SHA256

              17980ded136ef7879fa02103523badae1c9c4b09d4673ec7e9ea3764764647f7

              SHA512

              85f8a42121237eb44480d98fcb4dfaab05e380f3d41a21a1d98d427d2d453fd5d6c3337f22324514ad4a7c4aeb609bc26c9c9c9b3c8142144816469cfb9f4a1c

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9638143.exe

              Filesize

              969KB

              MD5

              e98bded1ffa030c776996ba69c24428e

              SHA1

              ccb831cb0186e3b7d4622760390f44db07541bf9

              SHA256

              17980ded136ef7879fa02103523badae1c9c4b09d4673ec7e9ea3764764647f7

              SHA512

              85f8a42121237eb44480d98fcb4dfaab05e380f3d41a21a1d98d427d2d453fd5d6c3337f22324514ad4a7c4aeb609bc26c9c9c9b3c8142144816469cfb9f4a1c

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9298967.exe

              Filesize

              787KB

              MD5

              f18ff00e3203d062f20723fbeea8c432

              SHA1

              a0d0e6c8e77819d18f21e082233a7786644bed6d

              SHA256

              e4a1a582053eefdc6fa2c038bbd511774b5ae21126983ce2ffb7272368945864

              SHA512

              6ffa0d1345fe5a2eea608de3e4ef3786d6d638c17d2a5a0df36788273c962f9b8e58aa5651dc76a1bed30a0ea91e762225f4ebce5cbe3e7f9a2dfc0fc18b2d19

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9298967.exe

              Filesize

              787KB

              MD5

              f18ff00e3203d062f20723fbeea8c432

              SHA1

              a0d0e6c8e77819d18f21e082233a7786644bed6d

              SHA256

              e4a1a582053eefdc6fa2c038bbd511774b5ae21126983ce2ffb7272368945864

              SHA512

              6ffa0d1345fe5a2eea608de3e4ef3786d6d638c17d2a5a0df36788273c962f9b8e58aa5651dc76a1bed30a0ea91e762225f4ebce5cbe3e7f9a2dfc0fc18b2d19

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0304472.exe

              Filesize

              604KB

              MD5

              23132a5400a98e39e5ece159cd67bdbf

              SHA1

              ba18a697f36c5aa16a766df18f2598b85cf5da4d

              SHA256

              e5acd9fd4fdaf1d30f3e7959ef81c5e4a231d2c70a8e63c98261b3a07e6af7a8

              SHA512

              640d7569ba791ca3b24915e66c739178c5f4dafc1f85fcf3a7004f66856446277da50f46dbd9f1fd2ab566662428512354942b309c7b5f9d38d0d9ac5dcfbf71

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0304472.exe

              Filesize

              604KB

              MD5

              23132a5400a98e39e5ece159cd67bdbf

              SHA1

              ba18a697f36c5aa16a766df18f2598b85cf5da4d

              SHA256

              e5acd9fd4fdaf1d30f3e7959ef81c5e4a231d2c70a8e63c98261b3a07e6af7a8

              SHA512

              640d7569ba791ca3b24915e66c739178c5f4dafc1f85fcf3a7004f66856446277da50f46dbd9f1fd2ab566662428512354942b309c7b5f9d38d0d9ac5dcfbf71

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9783598.exe

              Filesize

              339KB

              MD5

              8f22f85eed2250335197132db7f83f97

              SHA1

              e93d77470d36310a767897ea5cc0871227417d99

              SHA256

              5de1cfb478b798106428127afcb442aa194944b626cc171fc301cfddc4c39872

              SHA512

              aeef65477e882619abf2d3195c16d52b7671b8db9285085ffc7276a0c41829362ed2020e326eb89c4abade9d23af00b65fa628369577eaef1cb137cb3038143b

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9783598.exe

              Filesize

              339KB

              MD5

              8f22f85eed2250335197132db7f83f97

              SHA1

              e93d77470d36310a767897ea5cc0871227417d99

              SHA256

              5de1cfb478b798106428127afcb442aa194944b626cc171fc301cfddc4c39872

              SHA512

              aeef65477e882619abf2d3195c16d52b7671b8db9285085ffc7276a0c41829362ed2020e326eb89c4abade9d23af00b65fa628369577eaef1cb137cb3038143b

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7024965.exe

              Filesize

              12KB

              MD5

              2d71a843885e40d54438c0886bf47322

              SHA1

              1159bbf0df047e7e2d7aad696ee59c886e3a4bf8

              SHA256

              a017d996178495d9a5e59b95979647b645a1881fdc7419b5764c4e1d61b01d41

              SHA512

              7b593da186e2a293a204735390f299fd66c5b72c4faaf12156f46865f78c5dfb23d9da1610cac53aea9e19f3e2037bf89993ccad6ce67d9509bdce386421b73c

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7024965.exe

              Filesize

              12KB

              MD5

              2d71a843885e40d54438c0886bf47322

              SHA1

              1159bbf0df047e7e2d7aad696ee59c886e3a4bf8

              SHA256

              a017d996178495d9a5e59b95979647b645a1881fdc7419b5764c4e1d61b01d41

              SHA512

              7b593da186e2a293a204735390f299fd66c5b72c4faaf12156f46865f78c5dfb23d9da1610cac53aea9e19f3e2037bf89993ccad6ce67d9509bdce386421b73c

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe

              Filesize

              365KB

              MD5

              8a5ef4569aa275bbd0f42c263be5a8c4

              SHA1

              a7f260ae2b1b79e188dd1dd99bcf6f5c74b4d796

              SHA256

              88e9a7f2863ba5100d2bb84405c5a446c7167210f6dc596a88fa33d6f2870b60

              SHA512

              b3945eca3c5b7f25713ca2ba9c9bb3730ab104ab27a3553c46bbe7cbe176148c920e63e55602c6b06950fc9a69658e5223692c13312f37783419cbc677a850fd

            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe

              Filesize

              365KB

              MD5

              8a5ef4569aa275bbd0f42c263be5a8c4

              SHA1

              a7f260ae2b1b79e188dd1dd99bcf6f5c74b4d796

              SHA256

              88e9a7f2863ba5100d2bb84405c5a446c7167210f6dc596a88fa33d6f2870b60

              SHA512

              b3945eca3c5b7f25713ca2ba9c9bb3730ab104ab27a3553c46bbe7cbe176148c920e63e55602c6b06950fc9a69658e5223692c13312f37783419cbc677a850fd

            • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9638143.exe

              Filesize

              969KB

              MD5

              e98bded1ffa030c776996ba69c24428e

              SHA1

              ccb831cb0186e3b7d4622760390f44db07541bf9

              SHA256

              17980ded136ef7879fa02103523badae1c9c4b09d4673ec7e9ea3764764647f7

              SHA512

              85f8a42121237eb44480d98fcb4dfaab05e380f3d41a21a1d98d427d2d453fd5d6c3337f22324514ad4a7c4aeb609bc26c9c9c9b3c8142144816469cfb9f4a1c

            • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9638143.exe

              Filesize

              969KB

              MD5

              e98bded1ffa030c776996ba69c24428e

              SHA1

              ccb831cb0186e3b7d4622760390f44db07541bf9

              SHA256

              17980ded136ef7879fa02103523badae1c9c4b09d4673ec7e9ea3764764647f7

              SHA512

              85f8a42121237eb44480d98fcb4dfaab05e380f3d41a21a1d98d427d2d453fd5d6c3337f22324514ad4a7c4aeb609bc26c9c9c9b3c8142144816469cfb9f4a1c

            • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9298967.exe

              Filesize

              787KB

              MD5

              f18ff00e3203d062f20723fbeea8c432

              SHA1

              a0d0e6c8e77819d18f21e082233a7786644bed6d

              SHA256

              e4a1a582053eefdc6fa2c038bbd511774b5ae21126983ce2ffb7272368945864

              SHA512

              6ffa0d1345fe5a2eea608de3e4ef3786d6d638c17d2a5a0df36788273c962f9b8e58aa5651dc76a1bed30a0ea91e762225f4ebce5cbe3e7f9a2dfc0fc18b2d19

            • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9298967.exe

              Filesize

              787KB

              MD5

              f18ff00e3203d062f20723fbeea8c432

              SHA1

              a0d0e6c8e77819d18f21e082233a7786644bed6d

              SHA256

              e4a1a582053eefdc6fa2c038bbd511774b5ae21126983ce2ffb7272368945864

              SHA512

              6ffa0d1345fe5a2eea608de3e4ef3786d6d638c17d2a5a0df36788273c962f9b8e58aa5651dc76a1bed30a0ea91e762225f4ebce5cbe3e7f9a2dfc0fc18b2d19

            • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0304472.exe

              Filesize

              604KB

              MD5

              23132a5400a98e39e5ece159cd67bdbf

              SHA1

              ba18a697f36c5aa16a766df18f2598b85cf5da4d

              SHA256

              e5acd9fd4fdaf1d30f3e7959ef81c5e4a231d2c70a8e63c98261b3a07e6af7a8

              SHA512

              640d7569ba791ca3b24915e66c739178c5f4dafc1f85fcf3a7004f66856446277da50f46dbd9f1fd2ab566662428512354942b309c7b5f9d38d0d9ac5dcfbf71

            • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0304472.exe

              Filesize

              604KB

              MD5

              23132a5400a98e39e5ece159cd67bdbf

              SHA1

              ba18a697f36c5aa16a766df18f2598b85cf5da4d

              SHA256

              e5acd9fd4fdaf1d30f3e7959ef81c5e4a231d2c70a8e63c98261b3a07e6af7a8

              SHA512

              640d7569ba791ca3b24915e66c739178c5f4dafc1f85fcf3a7004f66856446277da50f46dbd9f1fd2ab566662428512354942b309c7b5f9d38d0d9ac5dcfbf71

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9783598.exe

              Filesize

              339KB

              MD5

              8f22f85eed2250335197132db7f83f97

              SHA1

              e93d77470d36310a767897ea5cc0871227417d99

              SHA256

              5de1cfb478b798106428127afcb442aa194944b626cc171fc301cfddc4c39872

              SHA512

              aeef65477e882619abf2d3195c16d52b7671b8db9285085ffc7276a0c41829362ed2020e326eb89c4abade9d23af00b65fa628369577eaef1cb137cb3038143b

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9783598.exe

              Filesize

              339KB

              MD5

              8f22f85eed2250335197132db7f83f97

              SHA1

              e93d77470d36310a767897ea5cc0871227417d99

              SHA256

              5de1cfb478b798106428127afcb442aa194944b626cc171fc301cfddc4c39872

              SHA512

              aeef65477e882619abf2d3195c16d52b7671b8db9285085ffc7276a0c41829362ed2020e326eb89c4abade9d23af00b65fa628369577eaef1cb137cb3038143b

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7024965.exe

              Filesize

              12KB

              MD5

              2d71a843885e40d54438c0886bf47322

              SHA1

              1159bbf0df047e7e2d7aad696ee59c886e3a4bf8

              SHA256

              a017d996178495d9a5e59b95979647b645a1881fdc7419b5764c4e1d61b01d41

              SHA512

              7b593da186e2a293a204735390f299fd66c5b72c4faaf12156f46865f78c5dfb23d9da1610cac53aea9e19f3e2037bf89993ccad6ce67d9509bdce386421b73c

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe

              Filesize

              365KB

              MD5

              8a5ef4569aa275bbd0f42c263be5a8c4

              SHA1

              a7f260ae2b1b79e188dd1dd99bcf6f5c74b4d796

              SHA256

              88e9a7f2863ba5100d2bb84405c5a446c7167210f6dc596a88fa33d6f2870b60

              SHA512

              b3945eca3c5b7f25713ca2ba9c9bb3730ab104ab27a3553c46bbe7cbe176148c920e63e55602c6b06950fc9a69658e5223692c13312f37783419cbc677a850fd

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe

              Filesize

              365KB

              MD5

              8a5ef4569aa275bbd0f42c263be5a8c4

              SHA1

              a7f260ae2b1b79e188dd1dd99bcf6f5c74b4d796

              SHA256

              88e9a7f2863ba5100d2bb84405c5a446c7167210f6dc596a88fa33d6f2870b60

              SHA512

              b3945eca3c5b7f25713ca2ba9c9bb3730ab104ab27a3553c46bbe7cbe176148c920e63e55602c6b06950fc9a69658e5223692c13312f37783419cbc677a850fd

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe

              Filesize

              365KB

              MD5

              8a5ef4569aa275bbd0f42c263be5a8c4

              SHA1

              a7f260ae2b1b79e188dd1dd99bcf6f5c74b4d796

              SHA256

              88e9a7f2863ba5100d2bb84405c5a446c7167210f6dc596a88fa33d6f2870b60

              SHA512

              b3945eca3c5b7f25713ca2ba9c9bb3730ab104ab27a3553c46bbe7cbe176148c920e63e55602c6b06950fc9a69658e5223692c13312f37783419cbc677a850fd

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe

              Filesize

              365KB

              MD5

              8a5ef4569aa275bbd0f42c263be5a8c4

              SHA1

              a7f260ae2b1b79e188dd1dd99bcf6f5c74b4d796

              SHA256

              88e9a7f2863ba5100d2bb84405c5a446c7167210f6dc596a88fa33d6f2870b60

              SHA512

              b3945eca3c5b7f25713ca2ba9c9bb3730ab104ab27a3553c46bbe7cbe176148c920e63e55602c6b06950fc9a69658e5223692c13312f37783419cbc677a850fd

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe

              Filesize

              365KB

              MD5

              8a5ef4569aa275bbd0f42c263be5a8c4

              SHA1

              a7f260ae2b1b79e188dd1dd99bcf6f5c74b4d796

              SHA256

              88e9a7f2863ba5100d2bb84405c5a446c7167210f6dc596a88fa33d6f2870b60

              SHA512

              b3945eca3c5b7f25713ca2ba9c9bb3730ab104ab27a3553c46bbe7cbe176148c920e63e55602c6b06950fc9a69658e5223692c13312f37783419cbc677a850fd

            • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2273487.exe

              Filesize

              365KB

              MD5

              8a5ef4569aa275bbd0f42c263be5a8c4

              SHA1

              a7f260ae2b1b79e188dd1dd99bcf6f5c74b4d796

              SHA256

              88e9a7f2863ba5100d2bb84405c5a446c7167210f6dc596a88fa33d6f2870b60

              SHA512

              b3945eca3c5b7f25713ca2ba9c9bb3730ab104ab27a3553c46bbe7cbe176148c920e63e55602c6b06950fc9a69658e5223692c13312f37783419cbc677a850fd

            • memory/2540-64-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-71-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-62-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-58-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-66-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-68-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-70-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

              Filesize

              4KB

            • memory/2540-60-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-76-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-75-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-73-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2540-80-0x0000000000400000-0x000000000042C000-memory.dmp

              Filesize

              176KB

            • memory/2740-50-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

              Filesize

              9.9MB

            • memory/2740-49-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

              Filesize

              9.9MB

            • memory/2740-51-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

              Filesize

              9.9MB

            • memory/2740-48-0x0000000000D90000-0x0000000000D9A000-memory.dmp

              Filesize

              40KB