Analysis

  • max time kernel
    33s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2023 21:16

General

  • Target

    NEAS.30b1d024147aa37722a8a7ce9a1e9570.exe

  • Size

    1.1MB

  • MD5

    30b1d024147aa37722a8a7ce9a1e9570

  • SHA1

    d0d43285720b4891bdefce6d1118f928ae7f6104

  • SHA256

    d260b91a13a881b6013c9956842f2943e567f964a9107e4ce3a900094caca5e6

  • SHA512

    54c3eb8007a1297dfaac748e00baa622ac332a3471abe1ea8f45abb3d57ba781f6a4f056acb3ca6a144e423713e840d6cbfa8fce9ca203c92ed4531dfed90d61

  • SSDEEP

    24576:hfyJh/lbJy3QxNjeHQGNCGDGgM4O9/QmZPGyz56gQQXQC9:IpbJJutN7DBM7lPZ/or

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.30b1d024147aa37722a8a7ce9a1e9570.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.30b1d024147aa37722a8a7ce9a1e9570.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ow7vx3aI.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ow7vx3aI.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Vu5Po2Oe.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Vu5Po2Oe.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iS9Ud0nM.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iS9Ud0nM.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2920
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2676
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 268
                7⤵
                • Program crash
                PID:2492
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2548

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ow7vx3aI.exe
    Filesize

    936KB

    MD5

    77ff7e83375074c4d0bc85202b4e7be0

    SHA1

    4c7b4438017b056331abe84479393177cebd00ec

    SHA256

    122d299be58fe5b4b3fb06b491d50461ca02e4eb8f710de840e47178d5866d10

    SHA512

    e80e67d2094a4f77780dfc6a0873880910188e057706f16bc8c5a60399bd4292c41b1fbd9be6b0a75a346166d4ff7b13a42a6d68cf2077e755f4b3f152419910

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ow7vx3aI.exe
    Filesize

    936KB

    MD5

    77ff7e83375074c4d0bc85202b4e7be0

    SHA1

    4c7b4438017b056331abe84479393177cebd00ec

    SHA256

    122d299be58fe5b4b3fb06b491d50461ca02e4eb8f710de840e47178d5866d10

    SHA512

    e80e67d2094a4f77780dfc6a0873880910188e057706f16bc8c5a60399bd4292c41b1fbd9be6b0a75a346166d4ff7b13a42a6d68cf2077e755f4b3f152419910

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Vu5Po2Oe.exe
    Filesize

    641KB

    MD5

    33866bf56942e84402d6065c392c3f08

    SHA1

    66cc530ac4ee632704b4cf103676543066e9b953

    SHA256

    5e089291756e2d75947c01a743a0668be834a337934ab2794324c460395a2aff

    SHA512

    d90e41e22748a8c70213a85d826611e361bb5e888b3cbc295aebf6380194a75d3ddb1d40362a5b25b6c487e03e2932d7a7f2cb1f0964341f5b236bbb1a14f5c8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Vu5Po2Oe.exe
    Filesize

    641KB

    MD5

    33866bf56942e84402d6065c392c3f08

    SHA1

    66cc530ac4ee632704b4cf103676543066e9b953

    SHA256

    5e089291756e2d75947c01a743a0668be834a337934ab2794324c460395a2aff

    SHA512

    d90e41e22748a8c70213a85d826611e361bb5e888b3cbc295aebf6380194a75d3ddb1d40362a5b25b6c487e03e2932d7a7f2cb1f0964341f5b236bbb1a14f5c8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iS9Ud0nM.exe
    Filesize

    444KB

    MD5

    16605f65d5ab8197b766a1cbe6aa5096

    SHA1

    09fab68d3bd0a1fad0655af0653ca9a8a6587b9f

    SHA256

    99a532ef73e312636a9804a1a00337d073852594266e4deca22033d3363fa105

    SHA512

    88ae224bf86c50fe0db3d2c7154cc865db77c2d810c6e5402f4b7e01393a0bda1c44d7047172954cf24283e373349ff75f23beda4d711054a95a3f04ecece3c4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iS9Ud0nM.exe
    Filesize

    444KB

    MD5

    16605f65d5ab8197b766a1cbe6aa5096

    SHA1

    09fab68d3bd0a1fad0655af0653ca9a8a6587b9f

    SHA256

    99a532ef73e312636a9804a1a00337d073852594266e4deca22033d3363fa105

    SHA512

    88ae224bf86c50fe0db3d2c7154cc865db77c2d810c6e5402f4b7e01393a0bda1c44d7047172954cf24283e373349ff75f23beda4d711054a95a3f04ecece3c4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ow7vx3aI.exe
    Filesize

    936KB

    MD5

    77ff7e83375074c4d0bc85202b4e7be0

    SHA1

    4c7b4438017b056331abe84479393177cebd00ec

    SHA256

    122d299be58fe5b4b3fb06b491d50461ca02e4eb8f710de840e47178d5866d10

    SHA512

    e80e67d2094a4f77780dfc6a0873880910188e057706f16bc8c5a60399bd4292c41b1fbd9be6b0a75a346166d4ff7b13a42a6d68cf2077e755f4b3f152419910

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ow7vx3aI.exe
    Filesize

    936KB

    MD5

    77ff7e83375074c4d0bc85202b4e7be0

    SHA1

    4c7b4438017b056331abe84479393177cebd00ec

    SHA256

    122d299be58fe5b4b3fb06b491d50461ca02e4eb8f710de840e47178d5866d10

    SHA512

    e80e67d2094a4f77780dfc6a0873880910188e057706f16bc8c5a60399bd4292c41b1fbd9be6b0a75a346166d4ff7b13a42a6d68cf2077e755f4b3f152419910

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Vu5Po2Oe.exe
    Filesize

    641KB

    MD5

    33866bf56942e84402d6065c392c3f08

    SHA1

    66cc530ac4ee632704b4cf103676543066e9b953

    SHA256

    5e089291756e2d75947c01a743a0668be834a337934ab2794324c460395a2aff

    SHA512

    d90e41e22748a8c70213a85d826611e361bb5e888b3cbc295aebf6380194a75d3ddb1d40362a5b25b6c487e03e2932d7a7f2cb1f0964341f5b236bbb1a14f5c8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Vu5Po2Oe.exe
    Filesize

    641KB

    MD5

    33866bf56942e84402d6065c392c3f08

    SHA1

    66cc530ac4ee632704b4cf103676543066e9b953

    SHA256

    5e089291756e2d75947c01a743a0668be834a337934ab2794324c460395a2aff

    SHA512

    d90e41e22748a8c70213a85d826611e361bb5e888b3cbc295aebf6380194a75d3ddb1d40362a5b25b6c487e03e2932d7a7f2cb1f0964341f5b236bbb1a14f5c8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\iS9Ud0nM.exe
    Filesize

    444KB

    MD5

    16605f65d5ab8197b766a1cbe6aa5096

    SHA1

    09fab68d3bd0a1fad0655af0653ca9a8a6587b9f

    SHA256

    99a532ef73e312636a9804a1a00337d073852594266e4deca22033d3363fa105

    SHA512

    88ae224bf86c50fe0db3d2c7154cc865db77c2d810c6e5402f4b7e01393a0bda1c44d7047172954cf24283e373349ff75f23beda4d711054a95a3f04ecece3c4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\iS9Ud0nM.exe
    Filesize

    444KB

    MD5

    16605f65d5ab8197b766a1cbe6aa5096

    SHA1

    09fab68d3bd0a1fad0655af0653ca9a8a6587b9f

    SHA256

    99a532ef73e312636a9804a1a00337d073852594266e4deca22033d3363fa105

    SHA512

    88ae224bf86c50fe0db3d2c7154cc865db77c2d810c6e5402f4b7e01393a0bda1c44d7047172954cf24283e373349ff75f23beda4d711054a95a3f04ecece3c4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1Qx86ey7.exe
    Filesize

    423KB

    MD5

    a1166e4a80d05011bcfefe57d8a57260

    SHA1

    9ea8719cbcc5414d257670f82edd0e9a70a0c0af

    SHA256

    7ab72b7260c23375f014efebb6f93dd5cec449a701a1803809b9a5d7f2e3d866

    SHA512

    48b4290b3b437b2216728e1e3c5d31813a062ca94c907eaf991d0ddb83574c633bf7b1ab5ab99a921ac7884321d5db795db8904a64fd373bfa258b62c0383961

  • memory/2676-50-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2676-48-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2676-43-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2676-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2676-52-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2676-54-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2676-47-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2676-46-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2676-45-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2676-44-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB