Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2023, 10:38

General

  • Target

    NEAS.04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa_JC.exe

  • Size

    1.2MB

  • MD5

    7b68089b89d04dd24d22a1332d87cf08

  • SHA1

    66d956dadfe8dc098330dc3ec94a6a625c6a0462

  • SHA256

    04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa

  • SHA512

    0c1e561ae6e3c4111379c19618bc871c9c12b27ea5d2ae50396682e433e8369a97577e1b5f5ee3816fd2f4dfe2d8f749261a19c4cc20d0c517edfb282b45b592

  • SSDEEP

    24576:dyXzrx5oWmhku7V5d2FZ9+p3tthEEovRH3OIspEK:4XJ5oJhR0Ff+t3EEopeIw

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.04a87b8f058d7530d2e2d860d9792e27ac4a33a3865644f618340a1614a011aa_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gp6VD5cp.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gp6VD5cp.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Di7kU6hV.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Di7kU6hV.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx0JO7Ga.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx0JO7Ga.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\OD7gs6lm.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\OD7gs6lm.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2500
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2516
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:3024
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2456
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                        PID:2548
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 268
                          8⤵
                          • Program crash
                          PID:2612
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 308
                        7⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:2564

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gp6VD5cp.exe

            Filesize

            1.0MB

            MD5

            350a9aefb013b853f73d99cedd610549

            SHA1

            9b31e2f5ecd0d35f40ee4ef9b178065d015183b6

            SHA256

            0708a0d94f95345b0f7971438db685a48b2fe9f61f2776bca56d20e6415ef320

            SHA512

            58727bf11ace8b19aa4bb3064ef124fb7f240ec5e5083dc7ee7ab28d199f1003d7b90fd4c0cdcf8f11bf63b9cf2dd742881a109071f2c95fd72b16f49e7e14d2

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gp6VD5cp.exe

            Filesize

            1.0MB

            MD5

            350a9aefb013b853f73d99cedd610549

            SHA1

            9b31e2f5ecd0d35f40ee4ef9b178065d015183b6

            SHA256

            0708a0d94f95345b0f7971438db685a48b2fe9f61f2776bca56d20e6415ef320

            SHA512

            58727bf11ace8b19aa4bb3064ef124fb7f240ec5e5083dc7ee7ab28d199f1003d7b90fd4c0cdcf8f11bf63b9cf2dd742881a109071f2c95fd72b16f49e7e14d2

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Di7kU6hV.exe

            Filesize

            884KB

            MD5

            faf29c5bfb1c743cfb4533d937cb948e

            SHA1

            0c6cbc17f12f05ed0901b26acbfd2c602d407259

            SHA256

            8b23865c9d2ef9bb55779b50828a932163c41986847859fbf7a7aa7036a2b66a

            SHA512

            99ea67c12671e2cd2185f6dc360fee776b0f5e3e984b4130889ba563d1e0293159451de135508cdd6ef5dff86f2f7290a208ac7dfd169d760192339fa94fe1f0

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Di7kU6hV.exe

            Filesize

            884KB

            MD5

            faf29c5bfb1c743cfb4533d937cb948e

            SHA1

            0c6cbc17f12f05ed0901b26acbfd2c602d407259

            SHA256

            8b23865c9d2ef9bb55779b50828a932163c41986847859fbf7a7aa7036a2b66a

            SHA512

            99ea67c12671e2cd2185f6dc360fee776b0f5e3e984b4130889ba563d1e0293159451de135508cdd6ef5dff86f2f7290a208ac7dfd169d760192339fa94fe1f0

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx0JO7Ga.exe

            Filesize

            590KB

            MD5

            0967c4ca01d4cba8a138452daad2a4b7

            SHA1

            6a9f5a8af4f8fbf4804001cd2eb47b4f27cbe9d2

            SHA256

            b030de41361a5885ed02752bf9b2d11da1af3e778bbcc46a4c6f74976facf89b

            SHA512

            c00a6d9e096ee77ffb4835ad16e1b517ebffad4282db226ed9f0c43f67d8950dd32b54310e0a66aebca1f091e017a885bc0664180673a3fafcc344c5d406f6e0

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx0JO7Ga.exe

            Filesize

            590KB

            MD5

            0967c4ca01d4cba8a138452daad2a4b7

            SHA1

            6a9f5a8af4f8fbf4804001cd2eb47b4f27cbe9d2

            SHA256

            b030de41361a5885ed02752bf9b2d11da1af3e778bbcc46a4c6f74976facf89b

            SHA512

            c00a6d9e096ee77ffb4835ad16e1b517ebffad4282db226ed9f0c43f67d8950dd32b54310e0a66aebca1f091e017a885bc0664180673a3fafcc344c5d406f6e0

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\OD7gs6lm.exe

            Filesize

            417KB

            MD5

            3445d676db6b3d9d4928cbfdee5ce3be

            SHA1

            fa37bee8ae0d2beeb22d5722648fd296df0decaa

            SHA256

            90cc0eb1b01bca5b36373198fd7c25b5760042a69030929d29fbf03db7eaf894

            SHA512

            a1d0d850f3b2145e3c3c7eb9112bea017e0c760591bb0c192b2437fca3513e5aa046d85360a006704b6ebc43981a03a4ee642172780a00f8dc31f562f1bfdf24

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\OD7gs6lm.exe

            Filesize

            417KB

            MD5

            3445d676db6b3d9d4928cbfdee5ce3be

            SHA1

            fa37bee8ae0d2beeb22d5722648fd296df0decaa

            SHA256

            90cc0eb1b01bca5b36373198fd7c25b5760042a69030929d29fbf03db7eaf894

            SHA512

            a1d0d850f3b2145e3c3c7eb9112bea017e0c760591bb0c192b2437fca3513e5aa046d85360a006704b6ebc43981a03a4ee642172780a00f8dc31f562f1bfdf24

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Gp6VD5cp.exe

            Filesize

            1.0MB

            MD5

            350a9aefb013b853f73d99cedd610549

            SHA1

            9b31e2f5ecd0d35f40ee4ef9b178065d015183b6

            SHA256

            0708a0d94f95345b0f7971438db685a48b2fe9f61f2776bca56d20e6415ef320

            SHA512

            58727bf11ace8b19aa4bb3064ef124fb7f240ec5e5083dc7ee7ab28d199f1003d7b90fd4c0cdcf8f11bf63b9cf2dd742881a109071f2c95fd72b16f49e7e14d2

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Gp6VD5cp.exe

            Filesize

            1.0MB

            MD5

            350a9aefb013b853f73d99cedd610549

            SHA1

            9b31e2f5ecd0d35f40ee4ef9b178065d015183b6

            SHA256

            0708a0d94f95345b0f7971438db685a48b2fe9f61f2776bca56d20e6415ef320

            SHA512

            58727bf11ace8b19aa4bb3064ef124fb7f240ec5e5083dc7ee7ab28d199f1003d7b90fd4c0cdcf8f11bf63b9cf2dd742881a109071f2c95fd72b16f49e7e14d2

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Di7kU6hV.exe

            Filesize

            884KB

            MD5

            faf29c5bfb1c743cfb4533d937cb948e

            SHA1

            0c6cbc17f12f05ed0901b26acbfd2c602d407259

            SHA256

            8b23865c9d2ef9bb55779b50828a932163c41986847859fbf7a7aa7036a2b66a

            SHA512

            99ea67c12671e2cd2185f6dc360fee776b0f5e3e984b4130889ba563d1e0293159451de135508cdd6ef5dff86f2f7290a208ac7dfd169d760192339fa94fe1f0

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\Di7kU6hV.exe

            Filesize

            884KB

            MD5

            faf29c5bfb1c743cfb4533d937cb948e

            SHA1

            0c6cbc17f12f05ed0901b26acbfd2c602d407259

            SHA256

            8b23865c9d2ef9bb55779b50828a932163c41986847859fbf7a7aa7036a2b66a

            SHA512

            99ea67c12671e2cd2185f6dc360fee776b0f5e3e984b4130889ba563d1e0293159451de135508cdd6ef5dff86f2f7290a208ac7dfd169d760192339fa94fe1f0

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx0JO7Ga.exe

            Filesize

            590KB

            MD5

            0967c4ca01d4cba8a138452daad2a4b7

            SHA1

            6a9f5a8af4f8fbf4804001cd2eb47b4f27cbe9d2

            SHA256

            b030de41361a5885ed02752bf9b2d11da1af3e778bbcc46a4c6f74976facf89b

            SHA512

            c00a6d9e096ee77ffb4835ad16e1b517ebffad4282db226ed9f0c43f67d8950dd32b54310e0a66aebca1f091e017a885bc0664180673a3fafcc344c5d406f6e0

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Qx0JO7Ga.exe

            Filesize

            590KB

            MD5

            0967c4ca01d4cba8a138452daad2a4b7

            SHA1

            6a9f5a8af4f8fbf4804001cd2eb47b4f27cbe9d2

            SHA256

            b030de41361a5885ed02752bf9b2d11da1af3e778bbcc46a4c6f74976facf89b

            SHA512

            c00a6d9e096ee77ffb4835ad16e1b517ebffad4282db226ed9f0c43f67d8950dd32b54310e0a66aebca1f091e017a885bc0664180673a3fafcc344c5d406f6e0

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\OD7gs6lm.exe

            Filesize

            417KB

            MD5

            3445d676db6b3d9d4928cbfdee5ce3be

            SHA1

            fa37bee8ae0d2beeb22d5722648fd296df0decaa

            SHA256

            90cc0eb1b01bca5b36373198fd7c25b5760042a69030929d29fbf03db7eaf894

            SHA512

            a1d0d850f3b2145e3c3c7eb9112bea017e0c760591bb0c192b2437fca3513e5aa046d85360a006704b6ebc43981a03a4ee642172780a00f8dc31f562f1bfdf24

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\OD7gs6lm.exe

            Filesize

            417KB

            MD5

            3445d676db6b3d9d4928cbfdee5ce3be

            SHA1

            fa37bee8ae0d2beeb22d5722648fd296df0decaa

            SHA256

            90cc0eb1b01bca5b36373198fd7c25b5760042a69030929d29fbf03db7eaf894

            SHA512

            a1d0d850f3b2145e3c3c7eb9112bea017e0c760591bb0c192b2437fca3513e5aa046d85360a006704b6ebc43981a03a4ee642172780a00f8dc31f562f1bfdf24

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1Ou44cU8.exe

            Filesize

            378KB

            MD5

            f0831f173733de08511f3a0739f278a6

            SHA1

            06dc809d653c5d2c97386084ae13b50a73eb5b60

            SHA256

            8b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27

            SHA512

            19e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3

          • memory/2548-53-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2548-58-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2548-60-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2548-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2548-62-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2548-64-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2548-57-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2548-56-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2548-55-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/2548-54-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB