Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe
Resource
win10v2004-20230915-en
General
-
Target
1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe
-
Size
928KB
-
MD5
8a5caf15a8c70fce4cfb968409d66eba
-
SHA1
aeac8f699219fd85bd7a95929e42559604e6ddc1
-
SHA256
1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09
-
SHA512
821fc813fa7280be1d9c53ed486348207184212c22701974f6145d52f68f9df9d6afbd2911fb0f12302c380c2a4c9e6c96f18201aa6552a302eb79674c489f67
-
SSDEEP
24576:9y4wAFsQ4we3rtLuy/03jhgTuGhq6SniF:Y4wkfKrtFmOTuGhqu
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2804-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2804-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2804-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2804-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2804-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2804-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2920 x1481112.exe 2640 x2689925.exe 2648 x1172542.exe 2672 g1375864.exe -
Loads dropped DLL 13 IoCs
pid Process 2576 1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe 2920 x1481112.exe 2920 x1481112.exe 2640 x2689925.exe 2640 x2689925.exe 2648 x1172542.exe 2648 x1172542.exe 2648 x1172542.exe 2672 g1375864.exe 2548 WerFault.exe 2548 WerFault.exe 2548 WerFault.exe 2548 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1481112.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2689925.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1172542.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 2804 2672 g1375864.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2548 2672 WerFault.exe 31 2488 2804 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2920 2576 1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe 28 PID 2576 wrote to memory of 2920 2576 1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe 28 PID 2576 wrote to memory of 2920 2576 1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe 28 PID 2576 wrote to memory of 2920 2576 1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe 28 PID 2576 wrote to memory of 2920 2576 1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe 28 PID 2576 wrote to memory of 2920 2576 1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe 28 PID 2576 wrote to memory of 2920 2576 1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe 28 PID 2920 wrote to memory of 2640 2920 x1481112.exe 29 PID 2920 wrote to memory of 2640 2920 x1481112.exe 29 PID 2920 wrote to memory of 2640 2920 x1481112.exe 29 PID 2920 wrote to memory of 2640 2920 x1481112.exe 29 PID 2920 wrote to memory of 2640 2920 x1481112.exe 29 PID 2920 wrote to memory of 2640 2920 x1481112.exe 29 PID 2920 wrote to memory of 2640 2920 x1481112.exe 29 PID 2640 wrote to memory of 2648 2640 x2689925.exe 30 PID 2640 wrote to memory of 2648 2640 x2689925.exe 30 PID 2640 wrote to memory of 2648 2640 x2689925.exe 30 PID 2640 wrote to memory of 2648 2640 x2689925.exe 30 PID 2640 wrote to memory of 2648 2640 x2689925.exe 30 PID 2640 wrote to memory of 2648 2640 x2689925.exe 30 PID 2640 wrote to memory of 2648 2640 x2689925.exe 30 PID 2648 wrote to memory of 2672 2648 x1172542.exe 31 PID 2648 wrote to memory of 2672 2648 x1172542.exe 31 PID 2648 wrote to memory of 2672 2648 x1172542.exe 31 PID 2648 wrote to memory of 2672 2648 x1172542.exe 31 PID 2648 wrote to memory of 2672 2648 x1172542.exe 31 PID 2648 wrote to memory of 2672 2648 x1172542.exe 31 PID 2648 wrote to memory of 2672 2648 x1172542.exe 31 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2804 2672 g1375864.exe 33 PID 2672 wrote to memory of 2548 2672 g1375864.exe 34 PID 2672 wrote to memory of 2548 2672 g1375864.exe 34 PID 2672 wrote to memory of 2548 2672 g1375864.exe 34 PID 2672 wrote to memory of 2548 2672 g1375864.exe 34 PID 2672 wrote to memory of 2548 2672 g1375864.exe 34 PID 2672 wrote to memory of 2548 2672 g1375864.exe 34 PID 2672 wrote to memory of 2548 2672 g1375864.exe 34 PID 2804 wrote to memory of 2488 2804 AppLaunch.exe 35 PID 2804 wrote to memory of 2488 2804 AppLaunch.exe 35 PID 2804 wrote to memory of 2488 2804 AppLaunch.exe 35 PID 2804 wrote to memory of 2488 2804 AppLaunch.exe 35 PID 2804 wrote to memory of 2488 2804 AppLaunch.exe 35 PID 2804 wrote to memory of 2488 2804 AppLaunch.exe 35 PID 2804 wrote to memory of 2488 2804 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe"C:\Users\Admin\AppData\Local\Temp\1c629958e1c5d0ef1ba58f7e917271d33c0e5bd156802918200e57b64e2cdc09.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1481112.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1481112.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2689925.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2689925.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1172542.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1172542.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1375864.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1375864.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 2687⤵
- Program crash
PID:2488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2548
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5c1a8f99ca19bda0b3a10bce13478b9bc
SHA143d6ce7ec0b0c770d8dccd75aafc21ca710099c0
SHA25650f23ac31a0e2ed35fbdf8a8c63c34bcdbba2ca32e067a9f5e0500e4f2d61d8a
SHA5121a91e391a73a50cc0d09f572a7a06991b368b3687553784f5b3fc44ef2197deaf5f99f47d2a104f7bf651ecbd631546301719d2a7baad998ab261a050cec3d45
-
Filesize
828KB
MD5c1a8f99ca19bda0b3a10bce13478b9bc
SHA143d6ce7ec0b0c770d8dccd75aafc21ca710099c0
SHA25650f23ac31a0e2ed35fbdf8a8c63c34bcdbba2ca32e067a9f5e0500e4f2d61d8a
SHA5121a91e391a73a50cc0d09f572a7a06991b368b3687553784f5b3fc44ef2197deaf5f99f47d2a104f7bf651ecbd631546301719d2a7baad998ab261a050cec3d45
-
Filesize
555KB
MD586752d2472117bc1bf565a7aa0c9344b
SHA11abef02d57621ef4b57fa11e94ab3c0a1e8b6e31
SHA2567cb9c6af3283e77f00676e5875cd0f74cc8480c8f29559307521d862c308f1c5
SHA512d510e303e2af8025fe69bae3ac8eb7cfe4a015de0acfa2a73b2c0d588e827e023fe6be2ba77aa1d0a9d02fb02fd3e2e3cc6ffc6df75d01d277ef4ba90bdbf3c9
-
Filesize
555KB
MD586752d2472117bc1bf565a7aa0c9344b
SHA11abef02d57621ef4b57fa11e94ab3c0a1e8b6e31
SHA2567cb9c6af3283e77f00676e5875cd0f74cc8480c8f29559307521d862c308f1c5
SHA512d510e303e2af8025fe69bae3ac8eb7cfe4a015de0acfa2a73b2c0d588e827e023fe6be2ba77aa1d0a9d02fb02fd3e2e3cc6ffc6df75d01d277ef4ba90bdbf3c9
-
Filesize
389KB
MD55d51395f9c386207ec0f974afe939fb9
SHA16862315c0e9eaba72c477d9f1d66fadcb18a5878
SHA256716c74f8887a4997d16404fa9d11b8e7d207f91dfd83d0eb9b86ae12db50efb2
SHA5126ee4ea375e72fea82703395f4a5ee315bf54cdceaa97fb9149f1c7e18344e2e90b4bd26177af1422412334f0d5492091587596df434c656d869bdbbb69723e52
-
Filesize
389KB
MD55d51395f9c386207ec0f974afe939fb9
SHA16862315c0e9eaba72c477d9f1d66fadcb18a5878
SHA256716c74f8887a4997d16404fa9d11b8e7d207f91dfd83d0eb9b86ae12db50efb2
SHA5126ee4ea375e72fea82703395f4a5ee315bf54cdceaa97fb9149f1c7e18344e2e90b4bd26177af1422412334f0d5492091587596df434c656d869bdbbb69723e52
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a
-
Filesize
828KB
MD5c1a8f99ca19bda0b3a10bce13478b9bc
SHA143d6ce7ec0b0c770d8dccd75aafc21ca710099c0
SHA25650f23ac31a0e2ed35fbdf8a8c63c34bcdbba2ca32e067a9f5e0500e4f2d61d8a
SHA5121a91e391a73a50cc0d09f572a7a06991b368b3687553784f5b3fc44ef2197deaf5f99f47d2a104f7bf651ecbd631546301719d2a7baad998ab261a050cec3d45
-
Filesize
828KB
MD5c1a8f99ca19bda0b3a10bce13478b9bc
SHA143d6ce7ec0b0c770d8dccd75aafc21ca710099c0
SHA25650f23ac31a0e2ed35fbdf8a8c63c34bcdbba2ca32e067a9f5e0500e4f2d61d8a
SHA5121a91e391a73a50cc0d09f572a7a06991b368b3687553784f5b3fc44ef2197deaf5f99f47d2a104f7bf651ecbd631546301719d2a7baad998ab261a050cec3d45
-
Filesize
555KB
MD586752d2472117bc1bf565a7aa0c9344b
SHA11abef02d57621ef4b57fa11e94ab3c0a1e8b6e31
SHA2567cb9c6af3283e77f00676e5875cd0f74cc8480c8f29559307521d862c308f1c5
SHA512d510e303e2af8025fe69bae3ac8eb7cfe4a015de0acfa2a73b2c0d588e827e023fe6be2ba77aa1d0a9d02fb02fd3e2e3cc6ffc6df75d01d277ef4ba90bdbf3c9
-
Filesize
555KB
MD586752d2472117bc1bf565a7aa0c9344b
SHA11abef02d57621ef4b57fa11e94ab3c0a1e8b6e31
SHA2567cb9c6af3283e77f00676e5875cd0f74cc8480c8f29559307521d862c308f1c5
SHA512d510e303e2af8025fe69bae3ac8eb7cfe4a015de0acfa2a73b2c0d588e827e023fe6be2ba77aa1d0a9d02fb02fd3e2e3cc6ffc6df75d01d277ef4ba90bdbf3c9
-
Filesize
389KB
MD55d51395f9c386207ec0f974afe939fb9
SHA16862315c0e9eaba72c477d9f1d66fadcb18a5878
SHA256716c74f8887a4997d16404fa9d11b8e7d207f91dfd83d0eb9b86ae12db50efb2
SHA5126ee4ea375e72fea82703395f4a5ee315bf54cdceaa97fb9149f1c7e18344e2e90b4bd26177af1422412334f0d5492091587596df434c656d869bdbbb69723e52
-
Filesize
389KB
MD55d51395f9c386207ec0f974afe939fb9
SHA16862315c0e9eaba72c477d9f1d66fadcb18a5878
SHA256716c74f8887a4997d16404fa9d11b8e7d207f91dfd83d0eb9b86ae12db50efb2
SHA5126ee4ea375e72fea82703395f4a5ee315bf54cdceaa97fb9149f1c7e18344e2e90b4bd26177af1422412334f0d5492091587596df434c656d869bdbbb69723e52
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a
-
Filesize
356KB
MD52e26324e6bc278a965bc4c9bb90d340c
SHA151b40440965c1de24f6aac349221ee6ba9612601
SHA25644b7868fe3a50c7a63c14fafaac27a7bd1abc27bd28698c11b02ef2533050150
SHA512bc50e3b15f108b0ae948c1b5f5b6d2c14a39747063ecd0531824894363acf2b6257b6925c95b3151629092531183e032fa76f76eced0ceaec09c43f52c786b7a