Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 18:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
123d187ccb46d1d8e892e9e9be0b9b60N.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
123d187ccb46d1d8e892e9e9be0b9b60N.exe
-
Size
1.8MB
-
MD5
123d187ccb46d1d8e892e9e9be0b9b60
-
SHA1
82c5bb0f78a641c3bbf4b0bbda279a29d6468969
-
SHA256
0dbc220cdd1e829db342525158a1402fead21f8931411b41235ec083ce56ab50
-
SHA512
04cee82c24856c20ce6ade46dd2d14134dd8a1bbdcff4f10ab09233fa4768dae1a0fd19b285e3fd38520a4a6f49f0d34f6aebb1e0b4df46d62449619e38f315d
-
SSDEEP
24576:iGAfSfS8a1TD3EvdxE6a9DhvhgkwDWVlct0q76I:iIS8a1TAdW6a3vQWItp6
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1436-5-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-9-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-7-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-4-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-3-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/1436-11-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
Suspicious use of SetThreadContext 1 IoCs
Processes:
123d187ccb46d1d8e892e9e9be0b9b60N.exedescription pid process target process PID 1828 set thread context of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1440 1436 WerFault.exe AppLaunch.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
123d187ccb46d1d8e892e9e9be0b9b60N.exeAppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123d187ccb46d1d8e892e9e9be0b9b60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
123d187ccb46d1d8e892e9e9be0b9b60N.exeAppLaunch.exedescription pid process target process PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1828 wrote to memory of 1436 1828 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 1436 wrote to memory of 1440 1436 AppLaunch.exe WerFault.exe PID 1436 wrote to memory of 1440 1436 AppLaunch.exe WerFault.exe PID 1436 wrote to memory of 1440 1436 AppLaunch.exe WerFault.exe PID 1436 wrote to memory of 1440 1436 AppLaunch.exe WerFault.exe PID 1436 wrote to memory of 1440 1436 AppLaunch.exe WerFault.exe PID 1436 wrote to memory of 1440 1436 AppLaunch.exe WerFault.exe PID 1436 wrote to memory of 1440 1436 AppLaunch.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\123d187ccb46d1d8e892e9e9be0b9b60N.exe"C:\Users\Admin\AppData\Local\Temp\123d187ccb46d1d8e892e9e9be0b9b60N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 1963⤵
- Program crash
PID:1440