Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 11:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe
-
Size
346KB
-
MD5
0d4507df6c4f697f5c2e61dd574a55d3
-
SHA1
2644c9b8da6a26510d8d38c586834f223c374e15
-
SHA256
ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d
-
SHA512
f6e17885e5bd1b4fbca1827a0b189d0124c773d6443d2ce4a05601e0e6898b8822b22fef98bad85e34e45b75ddd798a80a3c20811867b5b7055f417776b0af9c
-
SSDEEP
6144:7NCTljS9PgGzqLHvw1t6mAOfd5pBgepdWq+R0z4viKC:7NgS9PgGimf5pBgIWH5iKC
Malware Config
Extracted
Family
mystic
C2
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral2/memory/1740-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1740-1-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1740-2-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1740-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1740-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1740-5-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2812 set thread context of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 4336 2812 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2052 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 87 PID 2812 wrote to memory of 2052 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 87 PID 2812 wrote to memory of 2052 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 87 PID 2812 wrote to memory of 1076 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 88 PID 2812 wrote to memory of 1076 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 88 PID 2812 wrote to memory of 1076 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 88 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89 PID 2812 wrote to memory of 1740 2812 ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe"C:\Users\Admin\AppData\Local\Temp\ecf879394639be2b544d62d7b904223c106cb07bf0c5dc87429282b52a0ba86d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2052
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1076
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 1482⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2812 -ip 28121⤵PID:5092