Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
05/10/2023, 12:29
Static task
static1
1 signatures
General
-
Target
3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe
-
Size
1.8MB
-
MD5
6e048dfe418439ad4638c111fd040b9a
-
SHA1
2b73271dfac18451b5fd3478bebf8d6ed4eab815
-
SHA256
3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a
-
SHA512
a944088d6b2a317c14372c0385f0c8ad0cfe8afd609152ba3e9cf25deed7148464d17210b30d8cc5a65f24ee8c3abbaf70f3ac4ab4a0f3fd7700aa771f1b0c0a
-
SSDEEP
12288:T0JbUyuJ4dXMJGdDQd19QyVeidvIpQpFBU26uBavV9X6a9Dhvhv6rCdTNl61n2Nq:yuJ4d8JGdDQd1vtdv7Dm6a9Dhvhi2
Malware Config
Extracted
Family
mystic
C2
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral1/memory/5036-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/5036-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/5036-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/5036-5-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/5036-6-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 -
Program crash 1 IoCs
pid pid_target Process procid_target 4736 3004 WerFault.exe 68 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69 PID 3004 wrote to memory of 5036 3004 3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe"C:\Users\Admin\AppData\Local\Temp\3eef8702ad0c0ca74a96b70e37147c47e2aaa0a8715b19d010e7a53dcedb991a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 3362⤵
- Program crash
PID:4736
-