Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 04:58

General

  • Target

    c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe

  • Size

    928KB

  • MD5

    982778b4358e2bfcdcb3d1f9f849cea8

  • SHA1

    fe22b58030a0a222f414c5083deb681ac6cda9fc

  • SHA256

    c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359

  • SHA512

    efebc7e5db6ea636b85453d914555c33422c6307bbe50dd9bce3aeb940e983a3427a55e580e48826e7b6abf731fa57f257d0ae20f7a24a9a4b5cf45f2bbad71a

  • SSDEEP

    24576:lybVUlyjCTtX+fJpwWChynpokECz6rtPFcW1EjYm:AbVK5X+fJpwWCwokECmR6Qh

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe
    "C:\Users\Admin\AppData\Local\Temp\c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5929040.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5929040.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7414518.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7414518.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4237956.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4237956.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2888
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2508
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 268
                7⤵
                • Program crash
                PID:2516
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 276
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5929040.exe

    Filesize

    826KB

    MD5

    f186a3ee41e930f5da41ce3f68b4b681

    SHA1

    a584570d2513675a40c6feca50b882f517d5f6f8

    SHA256

    8303a68b5e2204a698d2ed31c768dd0026d84f7d242cfed55d72948b8d999279

    SHA512

    3305d1564a4390ef5a2882e946ee499c484e5a45fa10f883e9d04f064ec7e08744461f618c028d72cf23d6f8723d45ecc46df3630f1b6ed9a0f850945dfed2bd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5929040.exe

    Filesize

    826KB

    MD5

    f186a3ee41e930f5da41ce3f68b4b681

    SHA1

    a584570d2513675a40c6feca50b882f517d5f6f8

    SHA256

    8303a68b5e2204a698d2ed31c768dd0026d84f7d242cfed55d72948b8d999279

    SHA512

    3305d1564a4390ef5a2882e946ee499c484e5a45fa10f883e9d04f064ec7e08744461f618c028d72cf23d6f8723d45ecc46df3630f1b6ed9a0f850945dfed2bd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7414518.exe

    Filesize

    555KB

    MD5

    0e17859cfc66165f8e47674fa21e4c44

    SHA1

    ca626696b487f9f21ce780589f249bc692717ebe

    SHA256

    2e39c69d85a87f57498bc86031b244a253168feb37776324a3a1bc81da173cd4

    SHA512

    faa8390465f351d2eac84217bb91534c6b8190fa40b5e05e479def7e7430cc68ded4d164e806351aa1d5e12334463cc8719468913dd6e91d3d811e43f534ddc6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7414518.exe

    Filesize

    555KB

    MD5

    0e17859cfc66165f8e47674fa21e4c44

    SHA1

    ca626696b487f9f21ce780589f249bc692717ebe

    SHA256

    2e39c69d85a87f57498bc86031b244a253168feb37776324a3a1bc81da173cd4

    SHA512

    faa8390465f351d2eac84217bb91534c6b8190fa40b5e05e479def7e7430cc68ded4d164e806351aa1d5e12334463cc8719468913dd6e91d3d811e43f534ddc6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4237956.exe

    Filesize

    389KB

    MD5

    d0ec86fa6d83c46557cbfbb505aaca8e

    SHA1

    af2fb64884276cd9c327a36248af654c1810ac60

    SHA256

    2536003fadb5857043bd66745889c686803adf1ce3810b4d2967cf3bd9df0b68

    SHA512

    155ec0344a166682b4033801705609b7f309356543c02a1f190ebd2a4555404690bf1f7ceec3dc0458771245001738e8b43e6dc69b0f20f172dc46432c618b5a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4237956.exe

    Filesize

    389KB

    MD5

    d0ec86fa6d83c46557cbfbb505aaca8e

    SHA1

    af2fb64884276cd9c327a36248af654c1810ac60

    SHA256

    2536003fadb5857043bd66745889c686803adf1ce3810b4d2967cf3bd9df0b68

    SHA512

    155ec0344a166682b4033801705609b7f309356543c02a1f190ebd2a4555404690bf1f7ceec3dc0458771245001738e8b43e6dc69b0f20f172dc46432c618b5a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5929040.exe

    Filesize

    826KB

    MD5

    f186a3ee41e930f5da41ce3f68b4b681

    SHA1

    a584570d2513675a40c6feca50b882f517d5f6f8

    SHA256

    8303a68b5e2204a698d2ed31c768dd0026d84f7d242cfed55d72948b8d999279

    SHA512

    3305d1564a4390ef5a2882e946ee499c484e5a45fa10f883e9d04f064ec7e08744461f618c028d72cf23d6f8723d45ecc46df3630f1b6ed9a0f850945dfed2bd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5929040.exe

    Filesize

    826KB

    MD5

    f186a3ee41e930f5da41ce3f68b4b681

    SHA1

    a584570d2513675a40c6feca50b882f517d5f6f8

    SHA256

    8303a68b5e2204a698d2ed31c768dd0026d84f7d242cfed55d72948b8d999279

    SHA512

    3305d1564a4390ef5a2882e946ee499c484e5a45fa10f883e9d04f064ec7e08744461f618c028d72cf23d6f8723d45ecc46df3630f1b6ed9a0f850945dfed2bd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x7414518.exe

    Filesize

    555KB

    MD5

    0e17859cfc66165f8e47674fa21e4c44

    SHA1

    ca626696b487f9f21ce780589f249bc692717ebe

    SHA256

    2e39c69d85a87f57498bc86031b244a253168feb37776324a3a1bc81da173cd4

    SHA512

    faa8390465f351d2eac84217bb91534c6b8190fa40b5e05e479def7e7430cc68ded4d164e806351aa1d5e12334463cc8719468913dd6e91d3d811e43f534ddc6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x7414518.exe

    Filesize

    555KB

    MD5

    0e17859cfc66165f8e47674fa21e4c44

    SHA1

    ca626696b487f9f21ce780589f249bc692717ebe

    SHA256

    2e39c69d85a87f57498bc86031b244a253168feb37776324a3a1bc81da173cd4

    SHA512

    faa8390465f351d2eac84217bb91534c6b8190fa40b5e05e479def7e7430cc68ded4d164e806351aa1d5e12334463cc8719468913dd6e91d3d811e43f534ddc6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4237956.exe

    Filesize

    389KB

    MD5

    d0ec86fa6d83c46557cbfbb505aaca8e

    SHA1

    af2fb64884276cd9c327a36248af654c1810ac60

    SHA256

    2536003fadb5857043bd66745889c686803adf1ce3810b4d2967cf3bd9df0b68

    SHA512

    155ec0344a166682b4033801705609b7f309356543c02a1f190ebd2a4555404690bf1f7ceec3dc0458771245001738e8b43e6dc69b0f20f172dc46432c618b5a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4237956.exe

    Filesize

    389KB

    MD5

    d0ec86fa6d83c46557cbfbb505aaca8e

    SHA1

    af2fb64884276cd9c327a36248af654c1810ac60

    SHA256

    2536003fadb5857043bd66745889c686803adf1ce3810b4d2967cf3bd9df0b68

    SHA512

    155ec0344a166682b4033801705609b7f309356543c02a1f190ebd2a4555404690bf1f7ceec3dc0458771245001738e8b43e6dc69b0f20f172dc46432c618b5a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe

    Filesize

    356KB

    MD5

    230f7f2579c06831ed55ec3a685a854b

    SHA1

    20cc3172eab9c3123aa23922e5640c1ce7a05eb7

    SHA256

    bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415

    SHA512

    6e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124

  • memory/2508-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2508-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2508-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2508-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2508-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2508-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2508-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2508-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2508-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2508-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB