Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2023 23:01

General

  • Target

    d02c72136c3af3512d97fb12931cc9fffe7d758e010d9f146d2af4c4d001fbf1.exe

  • Size

    700KB

  • MD5

    5ac63e46b61878a640c9492045312de4

  • SHA1

    16a482120662bee02de2825d70b9333286189e7d

  • SHA256

    d02c72136c3af3512d97fb12931cc9fffe7d758e010d9f146d2af4c4d001fbf1

  • SHA512

    d30cb3176533307ffc23c57b2d02705e09e29f2c29071d867fb31adee310bcfb5703f386f5d30bfbd4c61a4fbd16996fedfa9742230b79a990a865233ae50198

  • SSDEEP

    6144:p86vGALXgBEIy8wluzNcq/PVucQp/7r4WGIy9+ud9bpdJbmLetFvfr:pVHXgFysVucQp/7rz1y9+udPKMr

Score
10/10

Malware Config

Signatures

  • Mystic

    Mystic is an infostealer written in C++.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d02c72136c3af3512d97fb12931cc9fffe7d758e010d9f146d2af4c4d001fbf1.exe
    "C:\Users\Admin\AppData\Local\Temp\d02c72136c3af3512d97fb12931cc9fffe7d758e010d9f146d2af4c4d001fbf1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:3420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 156
        2⤵
        • Program crash
        PID:2312
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1292 -ip 1292
      1⤵
        PID:3736

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3420-0-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3420-1-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3420-2-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3420-3-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3420-4-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3420-5-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB