Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 21:17
Static task
static1
1 signatures
General
-
Target
621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe
-
Size
1.7MB
-
MD5
6357f8c537d9b16a05b0b79d78d795b9
-
SHA1
dd07eca325aed9ea786c0da3738d468253596bc0
-
SHA256
621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2
-
SHA512
b32c54f88d1098ba65017576a31d24547ce255cfa39b39cfb29eec8f55feeec908801f9ab17631416ca6612396fd5669a2645b46f6522b456c17ed406285a9be
-
SSDEEP
24576:h1xY5A0vimILMPcVJT6gH/A2Z46a9Dhvh6TDiZZf:hf0vimILMP4V6SAO46a3vmDiff
Malware Config
Extracted
Family
mystic
C2
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral1/memory/2852-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2852-1-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2852-2-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2852-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2852-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 8 1900 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85 PID 1900 wrote to memory of 2852 1900 621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe"C:\Users\Admin\AppData\Local\Temp\621bab0b8867573e47467ed1e84b873b1d3a97a9658d9c8744e301f12a87e1d2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 4162⤵
- Program crash
PID:8
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1900 -ip 19001⤵PID:1352