Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 10:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
123d187ccb46d1d8e892e9e9be0b9b60N.exe
Resource
win7-20240729-en
windows7-x64
6 signatures
120 seconds
General
-
Target
123d187ccb46d1d8e892e9e9be0b9b60N.exe
-
Size
1.8MB
-
MD5
123d187ccb46d1d8e892e9e9be0b9b60
-
SHA1
82c5bb0f78a641c3bbf4b0bbda279a29d6468969
-
SHA256
0dbc220cdd1e829db342525158a1402fead21f8931411b41235ec083ce56ab50
-
SHA512
04cee82c24856c20ce6ade46dd2d14134dd8a1bbdcff4f10ab09233fa4768dae1a0fd19b285e3fd38520a4a6f49f0d34f6aebb1e0b4df46d62449619e38f315d
-
SSDEEP
24576:iGAfSfS8a1TD3EvdxE6a9DhvhgkwDWVlct0q76I:iIS8a1TAdW6a3vQWItp6
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2132-7-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/2132-5-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/2132-4-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/2132-3-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/2132-9-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/2132-11-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2356 set thread context of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2332 2132 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123d187ccb46d1d8e892e9e9be0b9b60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2356 wrote to memory of 2132 2356 123d187ccb46d1d8e892e9e9be0b9b60N.exe 31 PID 2132 wrote to memory of 2332 2132 AppLaunch.exe 32 PID 2132 wrote to memory of 2332 2132 AppLaunch.exe 32 PID 2132 wrote to memory of 2332 2132 AppLaunch.exe 32 PID 2132 wrote to memory of 2332 2132 AppLaunch.exe 32 PID 2132 wrote to memory of 2332 2132 AppLaunch.exe 32 PID 2132 wrote to memory of 2332 2132 AppLaunch.exe 32 PID 2132 wrote to memory of 2332 2132 AppLaunch.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\123d187ccb46d1d8e892e9e9be0b9b60N.exe"C:\Users\Admin\AppData\Local\Temp\123d187ccb46d1d8e892e9e9be0b9b60N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 1963⤵
- Program crash
PID:2332
-
-