Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe
-
Size
380KB
-
MD5
0cf15a89f9f6e02ab9aaeafc7816a79e
-
SHA1
5c1d39b5e8675823ed307134e657111e52db70ff
-
SHA256
1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1
-
SHA512
265e319bc042a648165c02924d54dce016e86ddbcc93b81be813936029706b40e7cea95cf8bc1a76c13933ba5213d0ccd27287e23777bd8c2f81f12e703a627d
-
SSDEEP
6144:olPYhHX110KwTVSf3pOCq5b6uAOsUQSiGBs60GIyzQICQDL0S7qwm:olP+3110dVaUcuWPjGtzPCpwm
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2208-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2208-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2208-5-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2208-7-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2208-9-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2208-11-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1272 set thread context of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 -
Program crash 2 IoCs
pid pid_target Process procid_target 2368 1272 WerFault.exe 24 2656 2208 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2208 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 28 PID 1272 wrote to memory of 2368 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 29 PID 1272 wrote to memory of 2368 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 29 PID 1272 wrote to memory of 2368 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 29 PID 1272 wrote to memory of 2368 1272 1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe 29 PID 2208 wrote to memory of 2656 2208 AppLaunch.exe 30 PID 2208 wrote to memory of 2656 2208 AppLaunch.exe 30 PID 2208 wrote to memory of 2656 2208 AppLaunch.exe 30 PID 2208 wrote to memory of 2656 2208 AppLaunch.exe 30 PID 2208 wrote to memory of 2656 2208 AppLaunch.exe 30 PID 2208 wrote to memory of 2656 2208 AppLaunch.exe 30 PID 2208 wrote to memory of 2656 2208 AppLaunch.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe"C:\Users\Admin\AppData\Local\Temp\1cf94f3a5941709a35527aaf5f1d731e4fcfecd9ad578e59a1439517b3215da1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 1963⤵
- Program crash
PID:2656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 522⤵
- Program crash
PID:2368
-