Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 18:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
123d187ccb46d1d8e892e9e9be0b9b60N.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
123d187ccb46d1d8e892e9e9be0b9b60N.exe
-
Size
1.8MB
-
MD5
123d187ccb46d1d8e892e9e9be0b9b60
-
SHA1
82c5bb0f78a641c3bbf4b0bbda279a29d6468969
-
SHA256
0dbc220cdd1e829db342525158a1402fead21f8931411b41235ec083ce56ab50
-
SHA512
04cee82c24856c20ce6ade46dd2d14134dd8a1bbdcff4f10ab09233fa4768dae1a0fd19b285e3fd38520a4a6f49f0d34f6aebb1e0b4df46d62449619e38f315d
-
SSDEEP
24576:iGAfSfS8a1TD3EvdxE6a9DhvhgkwDWVlct0q76I:iIS8a1TAdW6a3vQWItp6
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/1436-5-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-9-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-7-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-4-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-3-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-11-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1828 set thread context of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 1440 1436 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123d187ccb46d1d8e892e9e9be0b9b60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe 30 PID 1436 wrote to memory of 1440 1436 AppLaunch.exe 31 PID 1436 wrote to memory of 1440 1436 AppLaunch.exe 31 PID 1436 wrote to memory of 1440 1436 AppLaunch.exe 31 PID 1436 wrote to memory of 1440 1436 AppLaunch.exe 31 PID 1436 wrote to memory of 1440 1436 AppLaunch.exe 31 PID 1436 wrote to memory of 1440 1436 AppLaunch.exe 31 PID 1436 wrote to memory of 1440 1436 AppLaunch.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\123d187ccb46d1d8e892e9e9be0b9b60N.exe"C:\Users\Admin\AppData\Local\Temp\123d187ccb46d1d8e892e9e9be0b9b60N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 1963⤵
- Program crash
PID:1440
-
-