Analysis
-
max time kernel
44s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 03:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe
-
Size
358KB
-
MD5
8b9d0bb0934caeff7b4f46c7c07a28f6
-
SHA1
3026b5691f81a9950b2d446f4bbf1644250b5ac1
-
SHA256
ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826
-
SHA512
3b6ff591026435958c6f51f2979230e4178d195bc4bbedabfd4e22b3ad0258e97435dd9b9f6ceb2e028d94056e6e327b851594de6a2fea3bb4327a3d97a46af9
-
SSDEEP
6144:V/QXR/bOEHHkwxOSeyCKrJz4AOaUEvO9+EBfZZxP0Hipfc0euimFm8fi:hQX1aEHEw94onOEMZzP0CS0C/8fi
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2180-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2180-5-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2180-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2180-7-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2180-9-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2180-11-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1692 set thread context of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2720 2180 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 1692 wrote to memory of 2180 1692 ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe 30 PID 2180 wrote to memory of 2720 2180 AppLaunch.exe 31 PID 2180 wrote to memory of 2720 2180 AppLaunch.exe 31 PID 2180 wrote to memory of 2720 2180 AppLaunch.exe 31 PID 2180 wrote to memory of 2720 2180 AppLaunch.exe 31 PID 2180 wrote to memory of 2720 2180 AppLaunch.exe 31 PID 2180 wrote to memory of 2720 2180 AppLaunch.exe 31 PID 2180 wrote to memory of 2720 2180 AppLaunch.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe"C:\Users\Admin\AppData\Local\Temp\ea061cd16f4d88a86f481fb249fd193ab308028612d284463092e783030ca826.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 1963⤵
- Program crash
PID:2720
-
-