Analysis

  • max time kernel
    68s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2023 09:55

General

  • Target

    mystic_0.exe

  • Size

    140KB

  • MD5

    346e6159966a2de9c8c33f67bc2f4e6b

  • SHA1

    a45ea84ff0c4c10d3e34a6d2af67b63d181a4908

  • SHA256

    0f25abd7883b4fde66a267efdc2b81276660e4e086609f1e463eaf148a845412

  • SHA512

    41b9efd1cb9a766a8df41fb6bfad15d15da44e75d4947b6a7c89a9f01c77940533f714a1b8b11cf43fce917f5b67ce9c37d5d02c44b47a1c8739029d4c5e7def

  • SSDEEP

    3072:n8aToSf1NP4sUtCIuOoH+CesVBMHvk1AEwjem5RR/muzNb+KVJ:n/oSDyto2sk5D50KVJ

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mystic_0.exe
    "C:\Users\Admin\AppData\Local\Temp\mystic_0.exe"
    1⤵
      PID:1704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 216
        2⤵
        • Program crash
        PID:4604
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1704 -ip 1704
      1⤵
        PID:3848
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:3604
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
            PID:4332

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

            Filesize

            16KB

            MD5

            842cb410628f0df83e67a26ba9ac3a69

            SHA1

            45212fd99f19541c2079ad6aaaa82d4afe47637a

            SHA256

            a0e15929cf80804cbd2b01fb96ae9da25971224dac8c49cfbf0c61cb638635fa

            SHA512

            480459057125d31d1465033e106b4a689492e2c6fb13d97b669d0fbba65e698acbf7ef8b2a010fda8188887cbc99bd00f9a19d8bbcb66ee1333d626efb089213

          • memory/4332-36-0x000001D563800000-0x000001D563801000-memory.dmp

            Filesize

            4KB

          • memory/4332-35-0x000001D563800000-0x000001D563801000-memory.dmp

            Filesize

            4KB

          • memory/4332-43-0x000001D563430000-0x000001D563431000-memory.dmp

            Filesize

            4KB

          • memory/4332-40-0x000001D563800000-0x000001D563801000-memory.dmp

            Filesize

            4KB

          • memory/4332-42-0x000001D563A00000-0x000001D563A01000-memory.dmp

            Filesize

            4KB

          • memory/4332-41-0x000001D563A00000-0x000001D563A01000-memory.dmp

            Filesize

            4KB

          • memory/4332-39-0x000001D563800000-0x000001D563801000-memory.dmp

            Filesize

            4KB

          • memory/4332-38-0x000001D563800000-0x000001D563801000-memory.dmp

            Filesize

            4KB

          • memory/4332-46-0x000001D563430000-0x000001D563431000-memory.dmp

            Filesize

            4KB

          • memory/4332-16-0x000001D55B240000-0x000001D55B250000-memory.dmp

            Filesize

            64KB

          • memory/4332-0-0x000001D55B140000-0x000001D55B150000-memory.dmp

            Filesize

            64KB

          • memory/4332-33-0x000001D563800000-0x000001D563801000-memory.dmp

            Filesize

            4KB

          • memory/4332-37-0x000001D563800000-0x000001D563801000-memory.dmp

            Filesize

            4KB

          • memory/4332-52-0x000001D563360000-0x000001D563361000-memory.dmp

            Filesize

            4KB

          • memory/4332-68-0x000001D563680000-0x000001D563681000-memory.dmp

            Filesize

            4KB

          • memory/4332-67-0x000001D563570000-0x000001D563571000-memory.dmp

            Filesize

            4KB

          • memory/4332-66-0x000001D563570000-0x000001D563571000-memory.dmp

            Filesize

            4KB

          • memory/4332-64-0x000001D563560000-0x000001D563561000-memory.dmp

            Filesize

            4KB

          • memory/4332-32-0x000001D5637E0000-0x000001D5637E1000-memory.dmp

            Filesize

            4KB

          • memory/4332-49-0x000001D563420000-0x000001D563421000-memory.dmp

            Filesize

            4KB

          • memory/4332-34-0x000001D563800000-0x000001D563801000-memory.dmp

            Filesize

            4KB

          • memory/4332-44-0x000001D563420000-0x000001D563421000-memory.dmp

            Filesize

            4KB