Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 09:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe
-
Size
350KB
-
MD5
33f9de24e677259f9ce04b48c24bea96
-
SHA1
887d78b552e7a785efc7b47fbd0ca097235fa232
-
SHA256
40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852
-
SHA512
b8d479367ea8a43802e6386afe1491e3f3b0419d78fb5093f98e875829e4bd5cdfe473de76204bf31254caa77464cdec81f22b3751e78bdedbc9ef64516a8e65
-
SSDEEP
6144:9tqLsrNJmc30jXud9b7zAOTp70n62uQvfjEc0bJD74K4Th0naJF4S:9xxJm+bzdpwn62HvfI9d/74TmSF4S
Malware Config
Extracted
Family
mystic
C2
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral2/memory/2900-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2900-1-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2900-2-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2900-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2900-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1376 set thread context of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 5024 1376 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86 PID 1376 wrote to memory of 2900 1376 40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe"C:\Users\Admin\AppData\Local\Temp\40ea653b970e1d682593f90c40baf80c8375566c2d1a370190228992d69ad852.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 2282⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1376 -ip 13761⤵PID:1480