Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 18:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
123d187ccb46d1d8e892e9e9be0b9b60N.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
123d187ccb46d1d8e892e9e9be0b9b60N.exe
-
Size
1.8MB
-
MD5
123d187ccb46d1d8e892e9e9be0b9b60
-
SHA1
82c5bb0f78a641c3bbf4b0bbda279a29d6468969
-
SHA256
0dbc220cdd1e829db342525158a1402fead21f8931411b41235ec083ce56ab50
-
SHA512
04cee82c24856c20ce6ade46dd2d14134dd8a1bbdcff4f10ab09233fa4768dae1a0fd19b285e3fd38520a4a6f49f0d34f6aebb1e0b4df46d62449619e38f315d
-
SSDEEP
24576:iGAfSfS8a1TD3EvdxE6a9DhvhgkwDWVlct0q76I:iIS8a1TAdW6a3vQWItp6
Malware Config
Signatures
-
Detect Mystic stealer payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3056-2-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral2/memory/3056-3-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral2/memory/3056-1-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral2/memory/3056-0-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral2/memory/3056-4-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
Suspicious use of SetThreadContext 1 IoCs
Processes:
123d187ccb46d1d8e892e9e9be0b9b60N.exedescription pid process target process PID 4488 set thread context of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
123d187ccb46d1d8e892e9e9be0b9b60N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123d187ccb46d1d8e892e9e9be0b9b60N.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
123d187ccb46d1d8e892e9e9be0b9b60N.exedescription pid process target process PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe PID 4488 wrote to memory of 3056 4488 123d187ccb46d1d8e892e9e9be0b9b60N.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\123d187ccb46d1d8e892e9e9be0b9b60N.exe"C:\Users\Admin\AppData\Local\Temp\123d187ccb46d1d8e892e9e9be0b9b60N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3056