Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 14:32

General

  • Target

    61a98cc43e24046e732e5201a32401a5aeb4ca28211f0930f8445675ed548be3.exe

  • Size

    379KB

  • MD5

    3985ba38930348743d3c8426db2cb68b

  • SHA1

    9e83afe03557498853d02789b8dc48d8614c1fca

  • SHA256

    61a98cc43e24046e732e5201a32401a5aeb4ca28211f0930f8445675ed548be3

  • SHA512

    636eb3c99c2ad4a0d070d6d6dd1a3f3628eacc020d4b02d2d81f884e6ee5bb0195cd90d92da3e75c2801debabae367098770dc486b3bf0e06bac12e61552f610

  • SSDEEP

    6144:JsycRgs3r9vIum2Tg0N63KAO/TyF2kDzATWJGhmnvF1faSy4g3F:JsZRP3r9HmepTy0kDzATWJImnvF163F

Score
10/10

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 5 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61a98cc43e24046e732e5201a32401a5aeb4ca28211f0930f8445675ed548be3.exe
    "C:\Users\Admin\AppData\Local\Temp\61a98cc43e24046e732e5201a32401a5aeb4ca28211f0930f8445675ed548be3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:1976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 304
        2⤵
        • Program crash
        PID:4168
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4304 -ip 4304
      1⤵
        PID:3620

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1976-0-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1976-2-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1976-3-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1976-1-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1976-4-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB