Analysis

  • max time kernel
    102s
  • max time network
    106s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/10/2023, 22:15

General

  • Target

    d43e38f21e7617b81b8a3cab0af3a30d31b0ab4234b02efdba332f3b25c7350a.exe

  • Size

    1.7MB

  • MD5

    487026e70c9c38f46b5427c99406ea65

  • SHA1

    19b19197859083967c083bd0a33697c10c8d5c20

  • SHA256

    d43e38f21e7617b81b8a3cab0af3a30d31b0ab4234b02efdba332f3b25c7350a

  • SHA512

    22b132644c36c6ac6493cc021d51ca7af4b2e8b83b98071e351863fe7aa21d178f4bc504f55d0214be0129a0f9d1710e57f99cd054f18c43aa743e04ef85d1be

  • SSDEEP

    24576:HVxY5A0vimILMPcVJT6gH/A2Z46a9Dhvhb64a3f:H/0vimILMP4V6SAO46a3vE4Ef

Score
10/10

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 5 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d43e38f21e7617b81b8a3cab0af3a30d31b0ab4234b02efdba332f3b25c7350a.exe
    "C:\Users\Admin\AppData\Local\Temp\d43e38f21e7617b81b8a3cab0af3a30d31b0ab4234b02efdba332f3b25c7350a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:168
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:4692
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 168 -s 352
        2⤵
        • Program crash
        PID:4844

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4692-0-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4692-3-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4692-4-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4692-5-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4692-6-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB