Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 22:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
General
-
Target
f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe
-
Size
356KB
-
MD5
e7e09c5075a4b1659442d3d3a6663ddf
-
SHA1
4011e1a610ae62c1c7329985de9635d782aef860
-
SHA256
f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f
-
SHA512
79766c71cc9aaacb958de6f195341ca76c1ef7ae583605b92df836655d8aa45672f4057f1efedf25f307f6fdc67c25e0b0d80d62ae0b59bb46267fa8617edb90
-
SSDEEP
6144:khTeW/s5GqrO5aXnfEGIXWPvZAONyMY2EO0+h8vIj0AKUVkullH9aEvLe9Vs0BC+:RmcGqrOk86x/YEv+s0BC+
Malware Config
Extracted
Family
mystic
C2
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral2/memory/2952-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2952-1-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2952-2-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2952-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2952-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3760 set thread context of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 1052 3760 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90 PID 3760 wrote to memory of 2952 3760 f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe"C:\Users\Admin\AppData\Local\Temp\f7cb850d3461f742356beb890fc8eb14af08185d3f371bbf35ca39c8583cd24f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 2722⤵
- Program crash
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3760 -ip 37601⤵PID:1820