Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2023, 16:01

General

  • Target

    0b6827a5a7da71f78251f81f1b8aa47acd9fce1ff9931c530bd0fc9dfbf02d9b_JC.exe

  • Size

    1.5MB

  • MD5

    a2defa5f01d1ac54c776752781326855

  • SHA1

    86261b3c37a74561a9439e054fa90a48da38680c

  • SHA256

    0b6827a5a7da71f78251f81f1b8aa47acd9fce1ff9931c530bd0fc9dfbf02d9b

  • SHA512

    a945540ea8a6b427ee3872db7d36a444c93582831da27fbb45c88d44e9823664346639b39a40d747b6ac093bca5175be4db45aa112cf5baa030db045ba2b0b99

  • SSDEEP

    24576:pyZq8lMR8wCvEIlhXHbmJjg1WOezoL752e31eMWHtBZp3kuRByNRL0MANFfrd:cZ7VwCv5Cg1WCN2e3QMYt31pR4f0MAN

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b6827a5a7da71f78251f81f1b8aa47acd9fce1ff9931c530bd0fc9dfbf02d9b_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\0b6827a5a7da71f78251f81f1b8aa47acd9fce1ff9931c530bd0fc9dfbf02d9b_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yn7Fd70.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yn7Fd70.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fb0xG37.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fb0xG37.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP8FQ44.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP8FQ44.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2864
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1OG92Bg4.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1OG92Bg4.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2852
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2844
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2824
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 268
                7⤵
                • Program crash
                PID:2000
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 284
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yn7Fd70.exe

    Filesize

    1.4MB

    MD5

    c4cd90f4431034d72a92eb351b5b9b08

    SHA1

    e20491b7ec319af3f246983f26aedc312e02b238

    SHA256

    907eb369b9b83a752970df24d20646ec69ef4e869db0ca96f2983892db4ea4f3

    SHA512

    404d8ad582a94f4168c7c64a9e55349520d47624ce3899de771315a46ad98807b0061bef0e1b45ce0303e044fa235b95d141fc1b27570fcc253301555b9125be

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Yn7Fd70.exe

    Filesize

    1.4MB

    MD5

    c4cd90f4431034d72a92eb351b5b9b08

    SHA1

    e20491b7ec319af3f246983f26aedc312e02b238

    SHA256

    907eb369b9b83a752970df24d20646ec69ef4e869db0ca96f2983892db4ea4f3

    SHA512

    404d8ad582a94f4168c7c64a9e55349520d47624ce3899de771315a46ad98807b0061bef0e1b45ce0303e044fa235b95d141fc1b27570fcc253301555b9125be

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fb0xG37.exe

    Filesize

    985KB

    MD5

    30e40f2dd75cc54d85faebef9f75bafb

    SHA1

    25970006ba341b2e04b8fc0f4fec97cbddf8f52c

    SHA256

    73de9aa8bd600a7ef6f0aba48b7f691d5683517583432945234db0778c541198

    SHA512

    7560dd0aa7090496cc908aef89aa4e933188237025e365f540a06df04cbcd50541b52e8dc7904b6c661089ccae9af4fcfa336fc7f8954f3c4d9c73a0c90b853f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Fb0xG37.exe

    Filesize

    985KB

    MD5

    30e40f2dd75cc54d85faebef9f75bafb

    SHA1

    25970006ba341b2e04b8fc0f4fec97cbddf8f52c

    SHA256

    73de9aa8bd600a7ef6f0aba48b7f691d5683517583432945234db0778c541198

    SHA512

    7560dd0aa7090496cc908aef89aa4e933188237025e365f540a06df04cbcd50541b52e8dc7904b6c661089ccae9af4fcfa336fc7f8954f3c4d9c73a0c90b853f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP8FQ44.exe

    Filesize

    598KB

    MD5

    b62e68030619643131cc89bab6b86a95

    SHA1

    86b73bdd6f8d1ba9ae7f754786379d4f8b13a5ec

    SHA256

    e1b1c5a477b7d570bf660bc7ca9537c2e46adfaadec1b64696deb47e1b3fc91d

    SHA512

    c977f578ec8d08032eb57b63d0d2cf1ee3c9e78851e263cdc407f73a3242fcaa78e082065640722f55740a5d58e5d77ac893d8d106b95e4ddc5629d4a7ca4b1d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP8FQ44.exe

    Filesize

    598KB

    MD5

    b62e68030619643131cc89bab6b86a95

    SHA1

    86b73bdd6f8d1ba9ae7f754786379d4f8b13a5ec

    SHA256

    e1b1c5a477b7d570bf660bc7ca9537c2e46adfaadec1b64696deb47e1b3fc91d

    SHA512

    c977f578ec8d08032eb57b63d0d2cf1ee3c9e78851e263cdc407f73a3242fcaa78e082065640722f55740a5d58e5d77ac893d8d106b95e4ddc5629d4a7ca4b1d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1OG92Bg4.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1OG92Bg4.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe

    Filesize

    1.4MB

    MD5

    1c5b02235cd2097929953cda84016b2f

    SHA1

    23ffab5a9df5806f5bebe2da1a59301139cf0403

    SHA256

    7d4807955157c84e1703dc26a2abf4656df76a2122b7efd2f2229057c19146a3

    SHA512

    01f9ffcc515daf788d9f41b5bcbcb00a911d1240927a8e99e5ef4500558fa90c4a4771e923ba7826a047ddc5e6673da6246a2090cca67c5aad95bfa901ee98b8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe

    Filesize

    1.4MB

    MD5

    1c5b02235cd2097929953cda84016b2f

    SHA1

    23ffab5a9df5806f5bebe2da1a59301139cf0403

    SHA256

    7d4807955157c84e1703dc26a2abf4656df76a2122b7efd2f2229057c19146a3

    SHA512

    01f9ffcc515daf788d9f41b5bcbcb00a911d1240927a8e99e5ef4500558fa90c4a4771e923ba7826a047ddc5e6673da6246a2090cca67c5aad95bfa901ee98b8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Yn7Fd70.exe

    Filesize

    1.4MB

    MD5

    c4cd90f4431034d72a92eb351b5b9b08

    SHA1

    e20491b7ec319af3f246983f26aedc312e02b238

    SHA256

    907eb369b9b83a752970df24d20646ec69ef4e869db0ca96f2983892db4ea4f3

    SHA512

    404d8ad582a94f4168c7c64a9e55349520d47624ce3899de771315a46ad98807b0061bef0e1b45ce0303e044fa235b95d141fc1b27570fcc253301555b9125be

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Yn7Fd70.exe

    Filesize

    1.4MB

    MD5

    c4cd90f4431034d72a92eb351b5b9b08

    SHA1

    e20491b7ec319af3f246983f26aedc312e02b238

    SHA256

    907eb369b9b83a752970df24d20646ec69ef4e869db0ca96f2983892db4ea4f3

    SHA512

    404d8ad582a94f4168c7c64a9e55349520d47624ce3899de771315a46ad98807b0061bef0e1b45ce0303e044fa235b95d141fc1b27570fcc253301555b9125be

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Fb0xG37.exe

    Filesize

    985KB

    MD5

    30e40f2dd75cc54d85faebef9f75bafb

    SHA1

    25970006ba341b2e04b8fc0f4fec97cbddf8f52c

    SHA256

    73de9aa8bd600a7ef6f0aba48b7f691d5683517583432945234db0778c541198

    SHA512

    7560dd0aa7090496cc908aef89aa4e933188237025e365f540a06df04cbcd50541b52e8dc7904b6c661089ccae9af4fcfa336fc7f8954f3c4d9c73a0c90b853f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Fb0xG37.exe

    Filesize

    985KB

    MD5

    30e40f2dd75cc54d85faebef9f75bafb

    SHA1

    25970006ba341b2e04b8fc0f4fec97cbddf8f52c

    SHA256

    73de9aa8bd600a7ef6f0aba48b7f691d5683517583432945234db0778c541198

    SHA512

    7560dd0aa7090496cc908aef89aa4e933188237025e365f540a06df04cbcd50541b52e8dc7904b6c661089ccae9af4fcfa336fc7f8954f3c4d9c73a0c90b853f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP8FQ44.exe

    Filesize

    598KB

    MD5

    b62e68030619643131cc89bab6b86a95

    SHA1

    86b73bdd6f8d1ba9ae7f754786379d4f8b13a5ec

    SHA256

    e1b1c5a477b7d570bf660bc7ca9537c2e46adfaadec1b64696deb47e1b3fc91d

    SHA512

    c977f578ec8d08032eb57b63d0d2cf1ee3c9e78851e263cdc407f73a3242fcaa78e082065640722f55740a5d58e5d77ac893d8d106b95e4ddc5629d4a7ca4b1d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\ZP8FQ44.exe

    Filesize

    598KB

    MD5

    b62e68030619643131cc89bab6b86a95

    SHA1

    86b73bdd6f8d1ba9ae7f754786379d4f8b13a5ec

    SHA256

    e1b1c5a477b7d570bf660bc7ca9537c2e46adfaadec1b64696deb47e1b3fc91d

    SHA512

    c977f578ec8d08032eb57b63d0d2cf1ee3c9e78851e263cdc407f73a3242fcaa78e082065640722f55740a5d58e5d77ac893d8d106b95e4ddc5629d4a7ca4b1d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1OG92Bg4.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1OG92Bg4.exe

    Filesize

    192KB

    MD5

    8904f85abd522c7d0cb5789d9583ccff

    SHA1

    5b34d8595b37c9e1fb9682b06dc5228efe07f0c6

    SHA256

    7624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f

    SHA512

    04dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe

    Filesize

    1.4MB

    MD5

    1c5b02235cd2097929953cda84016b2f

    SHA1

    23ffab5a9df5806f5bebe2da1a59301139cf0403

    SHA256

    7d4807955157c84e1703dc26a2abf4656df76a2122b7efd2f2229057c19146a3

    SHA512

    01f9ffcc515daf788d9f41b5bcbcb00a911d1240927a8e99e5ef4500558fa90c4a4771e923ba7826a047ddc5e6673da6246a2090cca67c5aad95bfa901ee98b8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe

    Filesize

    1.4MB

    MD5

    1c5b02235cd2097929953cda84016b2f

    SHA1

    23ffab5a9df5806f5bebe2da1a59301139cf0403

    SHA256

    7d4807955157c84e1703dc26a2abf4656df76a2122b7efd2f2229057c19146a3

    SHA512

    01f9ffcc515daf788d9f41b5bcbcb00a911d1240927a8e99e5ef4500558fa90c4a4771e923ba7826a047ddc5e6673da6246a2090cca67c5aad95bfa901ee98b8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe

    Filesize

    1.4MB

    MD5

    1c5b02235cd2097929953cda84016b2f

    SHA1

    23ffab5a9df5806f5bebe2da1a59301139cf0403

    SHA256

    7d4807955157c84e1703dc26a2abf4656df76a2122b7efd2f2229057c19146a3

    SHA512

    01f9ffcc515daf788d9f41b5bcbcb00a911d1240927a8e99e5ef4500558fa90c4a4771e923ba7826a047ddc5e6673da6246a2090cca67c5aad95bfa901ee98b8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe

    Filesize

    1.4MB

    MD5

    1c5b02235cd2097929953cda84016b2f

    SHA1

    23ffab5a9df5806f5bebe2da1a59301139cf0403

    SHA256

    7d4807955157c84e1703dc26a2abf4656df76a2122b7efd2f2229057c19146a3

    SHA512

    01f9ffcc515daf788d9f41b5bcbcb00a911d1240927a8e99e5ef4500558fa90c4a4771e923ba7826a047ddc5e6673da6246a2090cca67c5aad95bfa901ee98b8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe

    Filesize

    1.4MB

    MD5

    1c5b02235cd2097929953cda84016b2f

    SHA1

    23ffab5a9df5806f5bebe2da1a59301139cf0403

    SHA256

    7d4807955157c84e1703dc26a2abf4656df76a2122b7efd2f2229057c19146a3

    SHA512

    01f9ffcc515daf788d9f41b5bcbcb00a911d1240927a8e99e5ef4500558fa90c4a4771e923ba7826a047ddc5e6673da6246a2090cca67c5aad95bfa901ee98b8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2JZ1064.exe

    Filesize

    1.4MB

    MD5

    1c5b02235cd2097929953cda84016b2f

    SHA1

    23ffab5a9df5806f5bebe2da1a59301139cf0403

    SHA256

    7d4807955157c84e1703dc26a2abf4656df76a2122b7efd2f2229057c19146a3

    SHA512

    01f9ffcc515daf788d9f41b5bcbcb00a911d1240927a8e99e5ef4500558fa90c4a4771e923ba7826a047ddc5e6673da6246a2090cca67c5aad95bfa901ee98b8

  • memory/2824-85-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2824-87-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2824-76-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2824-83-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2824-82-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2824-81-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2824-80-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2824-79-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2824-78-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2824-77-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2852-61-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-59-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-40-0x00000000003E0000-0x00000000003FE000-memory.dmp

    Filesize

    120KB

  • memory/2852-42-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-43-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-49-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-51-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-53-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-57-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-41-0x0000000000750000-0x000000000076C000-memory.dmp

    Filesize

    112KB

  • memory/2852-45-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-63-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-65-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-69-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-67-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-55-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB

  • memory/2852-47-0x0000000000750000-0x0000000000766000-memory.dmp

    Filesize

    88KB