Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 04:42
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ba26d1fb90c49929e058635655cd7e30.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ba26d1fb90c49929e058635655cd7e30.exe
-
Size
330KB
-
MD5
ba26d1fb90c49929e058635655cd7e30
-
SHA1
aa59a7a0645e8fd5a9be6bae6e749f8e2e6a022a
-
SHA256
cf1b7c877498a94f6342840ca8f5be9e2543ee23eaf7269126fddd023f72a3cd
-
SHA512
f26382b696e1469d0e134a5a86430537bf83a2997fc0ba9a6e7912ec46ce913632acee120f3e8205a3f0e771aadb592cff05f48c1f7ace1bb6ce511b3c88e2ba
-
SSDEEP
6144:Kny+bnr+Tp0yN90QEvPYGozB3ko4Vo6Aw5TpeGYIpAfkNgoZjcP2HE:RMrry90BYGGB3q2FGXHiEjY
Malware Config
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/4576-7-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4576-8-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4576-9-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4576-11-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation 5yZ7IP2.exe -
Executes dropped EXE 2 IoCs
pid Process 1708 4XW440tT.exe 3436 5yZ7IP2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.ba26d1fb90c49929e058635655cd7e30.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1708 set thread context of 4576 1708 4XW440tT.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4792 4576 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4768 wrote to memory of 1708 4768 NEAS.ba26d1fb90c49929e058635655cd7e30.exe 85 PID 4768 wrote to memory of 1708 4768 NEAS.ba26d1fb90c49929e058635655cd7e30.exe 85 PID 4768 wrote to memory of 1708 4768 NEAS.ba26d1fb90c49929e058635655cd7e30.exe 85 PID 1708 wrote to memory of 1728 1708 4XW440tT.exe 88 PID 1708 wrote to memory of 1728 1708 4XW440tT.exe 88 PID 1708 wrote to memory of 1728 1708 4XW440tT.exe 88 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 1708 wrote to memory of 4576 1708 4XW440tT.exe 89 PID 4768 wrote to memory of 3436 4768 NEAS.ba26d1fb90c49929e058635655cd7e30.exe 91 PID 4768 wrote to memory of 3436 4768 NEAS.ba26d1fb90c49929e058635655cd7e30.exe 91 PID 4768 wrote to memory of 3436 4768 NEAS.ba26d1fb90c49929e058635655cd7e30.exe 91 PID 3436 wrote to memory of 2536 3436 5yZ7IP2.exe 96 PID 3436 wrote to memory of 2536 3436 5yZ7IP2.exe 96 PID 3436 wrote to memory of 2536 3436 5yZ7IP2.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ba26d1fb90c49929e058635655cd7e30.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ba26d1fb90c49929e058635655cd7e30.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4XW440tT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4XW440tT.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:1728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 5404⤵
- Program crash
PID:4792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5yZ7IP2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5yZ7IP2.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\is64.bat" "3⤵PID:2536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4576 -ip 45761⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD57c2202b6f6d9308b345f07260804d62f
SHA1870362f6e528216392561ecafe9fe868876ca649
SHA256906adf2c13e0c208b70017a7111ae576dd5881d954d67b0bf969c186b00da44c
SHA51218df1c9a914c3b7b8438c639c320da1760a74f3949b4502a6a56c7808f7478ae4bdc64e2958e7ed2140a72671fc5bbdb2de3dfe12d7ad6fd765884dc51a26706
-
Filesize
300KB
MD57c2202b6f6d9308b345f07260804d62f
SHA1870362f6e528216392561ecafe9fe868876ca649
SHA256906adf2c13e0c208b70017a7111ae576dd5881d954d67b0bf969c186b00da44c
SHA51218df1c9a914c3b7b8438c639c320da1760a74f3949b4502a6a56c7808f7478ae4bdc64e2958e7ed2140a72671fc5bbdb2de3dfe12d7ad6fd765884dc51a26706
-
Filesize
73KB
MD56e778a79ac0a93896cc3dc343102d661
SHA12cc8b428e53e7cccf0b5b5d9e88fad5a1fc9a08c
SHA256db01c6c017845c0c7f8bf65455ef480a67ba5a71a757000aa99a60935493df1d
SHA51268c6dcaa1f7a659a5a19763fc9bc89eb497cca3deb4fdcb85a7370be79ef8cb87537b4af62350e30ff4705124d4dcfd4e0922d227c01bbdc1840dbcc6fc7a75a
-
Filesize
73KB
MD56e778a79ac0a93896cc3dc343102d661
SHA12cc8b428e53e7cccf0b5b5d9e88fad5a1fc9a08c
SHA256db01c6c017845c0c7f8bf65455ef480a67ba5a71a757000aa99a60935493df1d
SHA51268c6dcaa1f7a659a5a19763fc9bc89eb497cca3deb4fdcb85a7370be79ef8cb87537b4af62350e30ff4705124d4dcfd4e0922d227c01bbdc1840dbcc6fc7a75a
-
Filesize
181B
MD5225edee1d46e0a80610db26b275d72fb
SHA1ce206abf11aaf19278b72f5021cc64b1b427b7e8
SHA256e1befb57d724c9dc760cf42d7e0609212b22faeb2dc0c3ffe2fbd7134ff69559
SHA5124f01a2a248a1322cb690b7395b818d2780e46f4884e59f1ab96125d642b6358eea97c7fad6023ef17209b218daa9c88d15ea2b92f124ecb8434c0c7b4a710504
-
Filesize
3B
MD5a5ea0ad9260b1550a14cc58d2c39b03d
SHA1f0aedf295071ed34ab8c6a7692223d22b6a19841
SHA256f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04
SHA5127c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74