Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 14:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
365KB
-
MD5
4039b8b64e45056eaabd6b051d56c4d3
-
SHA1
466e305ba81a1b1b755c7065f07d8e06e61a5f02
-
SHA256
e520b22a1beaa0fed00c3f72263ae9b0037bdd568bf0792199e027b6a5b20c9f
-
SHA512
4b91a7c28b477411340f0fe54e16b60942ece8df276344eecc59d6628547818f09ab9885ebf5ada36df0f2b1f54278c1d7daabaf7d2a1cf973438454e2a0ecb5
-
SSDEEP
6144:AJKjEr2jicP5iOo2T8VrSd/sUAOeUl4Ta/tNGsvW7CvoMv8i3XU0Yr71Sa:AJKqqiG59ou8UBU7CvDL3E0s71Sa
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2692-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2692-5-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2692-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2692-7-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2692-9-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2692-11-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 2692 1724 file.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2748 2692 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 1724 wrote to memory of 2692 1724 file.exe 29 PID 2692 wrote to memory of 2748 2692 AppLaunch.exe 30 PID 2692 wrote to memory of 2748 2692 AppLaunch.exe 30 PID 2692 wrote to memory of 2748 2692 AppLaunch.exe 30 PID 2692 wrote to memory of 2748 2692 AppLaunch.exe 30 PID 2692 wrote to memory of 2748 2692 AppLaunch.exe 30 PID 2692 wrote to memory of 2748 2692 AppLaunch.exe 30 PID 2692 wrote to memory of 2748 2692 AppLaunch.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 1963⤵
- Program crash
PID:2748
-
-