Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2023 14:40
Static task
static1
1 signatures
General
-
Target
04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe
-
Size
1.7MB
-
MD5
37920458c35e410cf895c51b03b778f5
-
SHA1
dc56cc32e535ab62b0c0ffb714bd6ba2fc4dbd36
-
SHA256
04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869
-
SHA512
8fc2a0b73c58d20532fdf6d78dd8b520d03f3008f3b86cf0298066ce459bbb12abb31c996093b1f5c145745f2e0f358a72ae8477514b59cd53cdff46c3b822f6
-
SSDEEP
24576:WxY5gDVim9LMjNVX7qgHHY2oW6a9Dhvh6u5Ttg:YDVim9LMjbLqKY/W6a3vAyg
Malware Config
Extracted
Family
mystic
C2
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral1/memory/4292-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/4292-1-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/4292-2-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/4292-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/4292-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4584 set thread context of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 5008 4584 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4584 wrote to memory of 2424 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 86 PID 4584 wrote to memory of 2424 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 86 PID 4584 wrote to memory of 2424 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 86 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87 PID 4584 wrote to memory of 4292 4584 04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe"C:\Users\Admin\AppData\Local\Temp\04a3654c9732750a6f77f46cac04140cda0670ddae1d6714c757a7162e36b869.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 4202⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4584 -ip 45841⤵PID:4668