Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 12:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
General
-
Target
dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe
-
Size
365KB
-
MD5
0ee869d07fbe3dcd00790b0009f84427
-
SHA1
ae7479eaeff8a938afb6376b2c8e4e2af807a3ad
-
SHA256
dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964
-
SHA512
f52b66fe92b3960e08935128183f986c0439f76d263718c23bce456f9f55b83c884e0cb364e273adc9756fbbf9e48ccf875b1e16e84ef9376ad9ba4b6662ea75
-
SSDEEP
6144:zbtjEY2jicP5iOo2T8VrSd/sUAOhUlNOt/DliduKb4FCpBn9xo1Sa:zbt1qiG59ouLUirMdumHp/+1Sa
Malware Config
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral2/memory/4664-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4664-1-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4664-2-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4664-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4664-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 992 set thread context of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 992 wrote to memory of 4356 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 85 PID 992 wrote to memory of 4356 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 85 PID 992 wrote to memory of 4356 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 85 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86 PID 992 wrote to memory of 4664 992 dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe"C:\Users\Admin\AppData\Local\Temp\dcda132b6230809b65aa53fc7ac3b5ea6b0b706c4ce1cc2f303821fbd348e964_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4664
-