Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 13:06
Static task
static1
General
-
Target
f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe
-
Size
378KB
-
MD5
a287abcb41af64105e145140f14bbcbe
-
SHA1
0895e29b2ed57c2cd94dda07d805f69bf74c21b2
-
SHA256
f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f
-
SHA512
0edc2d93ed11a8883e62b6b0afbf7e3b7f594ca0d6dec55fef36cc80fa5b941cb74b2c5447f36d25165d5e0280505ac93b4ea3f64f159eb06df5fb884d5826dc
-
SSDEEP
6144:m4JSI92pCryG4kfjSGwEi56AOcGE0dHcfReK92EWl4YLZwUItQ0oVf759dxo0D:m4Jl2wryNSxbHvI2VLZwUItQ0oVf75PD
Malware Config
Extracted
Family
mystic
C2
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral1/memory/4088-1-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/4088-2-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/4088-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/4088-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/4088-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1408 set thread context of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 628 1408 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84 PID 1408 wrote to memory of 4088 1408 f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe"C:\Users\Admin\AppData\Local\Temp\f15690601fd6506abd89ccbffae20bebd2996abc70c1ea4c05fd94241fb5125f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 4162⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1408 -ip 14081⤵PID:552