Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe
Resource
win10v2004-20230915-en
General
-
Target
c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe
-
Size
928KB
-
MD5
982778b4358e2bfcdcb3d1f9f849cea8
-
SHA1
fe22b58030a0a222f414c5083deb681ac6cda9fc
-
SHA256
c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359
-
SHA512
efebc7e5db6ea636b85453d914555c33422c6307bbe50dd9bce3aeb940e983a3427a55e580e48826e7b6abf731fa57f257d0ae20f7a24a9a4b5cf45f2bbad71a
-
SSDEEP
24576:lybVUlyjCTtX+fJpwWChynpokECz6rtPFcW1EjYm:AbVK5X+fJpwWCwokECmR6Qh
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2508-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2508-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2508-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2508-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2508-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2508-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2280 x5929040.exe 2740 x7414518.exe 2888 x4237956.exe 2704 g5349699.exe -
Loads dropped DLL 13 IoCs
pid Process 2412 c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe 2280 x5929040.exe 2280 x5929040.exe 2740 x7414518.exe 2740 x7414518.exe 2888 x4237956.exe 2888 x4237956.exe 2888 x4237956.exe 2704 g5349699.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5929040.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7414518.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4237956.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2704 set thread context of 2508 2704 g5349699.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2496 2704 WerFault.exe 31 2516 2508 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2280 2412 c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe 28 PID 2412 wrote to memory of 2280 2412 c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe 28 PID 2412 wrote to memory of 2280 2412 c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe 28 PID 2412 wrote to memory of 2280 2412 c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe 28 PID 2412 wrote to memory of 2280 2412 c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe 28 PID 2412 wrote to memory of 2280 2412 c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe 28 PID 2412 wrote to memory of 2280 2412 c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe 28 PID 2280 wrote to memory of 2740 2280 x5929040.exe 29 PID 2280 wrote to memory of 2740 2280 x5929040.exe 29 PID 2280 wrote to memory of 2740 2280 x5929040.exe 29 PID 2280 wrote to memory of 2740 2280 x5929040.exe 29 PID 2280 wrote to memory of 2740 2280 x5929040.exe 29 PID 2280 wrote to memory of 2740 2280 x5929040.exe 29 PID 2280 wrote to memory of 2740 2280 x5929040.exe 29 PID 2740 wrote to memory of 2888 2740 x7414518.exe 30 PID 2740 wrote to memory of 2888 2740 x7414518.exe 30 PID 2740 wrote to memory of 2888 2740 x7414518.exe 30 PID 2740 wrote to memory of 2888 2740 x7414518.exe 30 PID 2740 wrote to memory of 2888 2740 x7414518.exe 30 PID 2740 wrote to memory of 2888 2740 x7414518.exe 30 PID 2740 wrote to memory of 2888 2740 x7414518.exe 30 PID 2888 wrote to memory of 2704 2888 x4237956.exe 31 PID 2888 wrote to memory of 2704 2888 x4237956.exe 31 PID 2888 wrote to memory of 2704 2888 x4237956.exe 31 PID 2888 wrote to memory of 2704 2888 x4237956.exe 31 PID 2888 wrote to memory of 2704 2888 x4237956.exe 31 PID 2888 wrote to memory of 2704 2888 x4237956.exe 31 PID 2888 wrote to memory of 2704 2888 x4237956.exe 31 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2704 wrote to memory of 2508 2704 g5349699.exe 33 PID 2508 wrote to memory of 2516 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2516 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2516 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2516 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2516 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2516 2508 AppLaunch.exe 35 PID 2508 wrote to memory of 2516 2508 AppLaunch.exe 35 PID 2704 wrote to memory of 2496 2704 g5349699.exe 34 PID 2704 wrote to memory of 2496 2704 g5349699.exe 34 PID 2704 wrote to memory of 2496 2704 g5349699.exe 34 PID 2704 wrote to memory of 2496 2704 g5349699.exe 34 PID 2704 wrote to memory of 2496 2704 g5349699.exe 34 PID 2704 wrote to memory of 2496 2704 g5349699.exe 34 PID 2704 wrote to memory of 2496 2704 g5349699.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe"C:\Users\Admin\AppData\Local\Temp\c628953c10d54e957d17721468ecd5d954a3096d96b7e4f23823d55cfa6b7359.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5929040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5929040.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7414518.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7414518.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4237956.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4237956.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5349699.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2687⤵
- Program crash
PID:2516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2496
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD5f186a3ee41e930f5da41ce3f68b4b681
SHA1a584570d2513675a40c6feca50b882f517d5f6f8
SHA2568303a68b5e2204a698d2ed31c768dd0026d84f7d242cfed55d72948b8d999279
SHA5123305d1564a4390ef5a2882e946ee499c484e5a45fa10f883e9d04f064ec7e08744461f618c028d72cf23d6f8723d45ecc46df3630f1b6ed9a0f850945dfed2bd
-
Filesize
826KB
MD5f186a3ee41e930f5da41ce3f68b4b681
SHA1a584570d2513675a40c6feca50b882f517d5f6f8
SHA2568303a68b5e2204a698d2ed31c768dd0026d84f7d242cfed55d72948b8d999279
SHA5123305d1564a4390ef5a2882e946ee499c484e5a45fa10f883e9d04f064ec7e08744461f618c028d72cf23d6f8723d45ecc46df3630f1b6ed9a0f850945dfed2bd
-
Filesize
555KB
MD50e17859cfc66165f8e47674fa21e4c44
SHA1ca626696b487f9f21ce780589f249bc692717ebe
SHA2562e39c69d85a87f57498bc86031b244a253168feb37776324a3a1bc81da173cd4
SHA512faa8390465f351d2eac84217bb91534c6b8190fa40b5e05e479def7e7430cc68ded4d164e806351aa1d5e12334463cc8719468913dd6e91d3d811e43f534ddc6
-
Filesize
555KB
MD50e17859cfc66165f8e47674fa21e4c44
SHA1ca626696b487f9f21ce780589f249bc692717ebe
SHA2562e39c69d85a87f57498bc86031b244a253168feb37776324a3a1bc81da173cd4
SHA512faa8390465f351d2eac84217bb91534c6b8190fa40b5e05e479def7e7430cc68ded4d164e806351aa1d5e12334463cc8719468913dd6e91d3d811e43f534ddc6
-
Filesize
389KB
MD5d0ec86fa6d83c46557cbfbb505aaca8e
SHA1af2fb64884276cd9c327a36248af654c1810ac60
SHA2562536003fadb5857043bd66745889c686803adf1ce3810b4d2967cf3bd9df0b68
SHA512155ec0344a166682b4033801705609b7f309356543c02a1f190ebd2a4555404690bf1f7ceec3dc0458771245001738e8b43e6dc69b0f20f172dc46432c618b5a
-
Filesize
389KB
MD5d0ec86fa6d83c46557cbfbb505aaca8e
SHA1af2fb64884276cd9c327a36248af654c1810ac60
SHA2562536003fadb5857043bd66745889c686803adf1ce3810b4d2967cf3bd9df0b68
SHA512155ec0344a166682b4033801705609b7f309356543c02a1f190ebd2a4555404690bf1f7ceec3dc0458771245001738e8b43e6dc69b0f20f172dc46432c618b5a
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124
-
Filesize
826KB
MD5f186a3ee41e930f5da41ce3f68b4b681
SHA1a584570d2513675a40c6feca50b882f517d5f6f8
SHA2568303a68b5e2204a698d2ed31c768dd0026d84f7d242cfed55d72948b8d999279
SHA5123305d1564a4390ef5a2882e946ee499c484e5a45fa10f883e9d04f064ec7e08744461f618c028d72cf23d6f8723d45ecc46df3630f1b6ed9a0f850945dfed2bd
-
Filesize
826KB
MD5f186a3ee41e930f5da41ce3f68b4b681
SHA1a584570d2513675a40c6feca50b882f517d5f6f8
SHA2568303a68b5e2204a698d2ed31c768dd0026d84f7d242cfed55d72948b8d999279
SHA5123305d1564a4390ef5a2882e946ee499c484e5a45fa10f883e9d04f064ec7e08744461f618c028d72cf23d6f8723d45ecc46df3630f1b6ed9a0f850945dfed2bd
-
Filesize
555KB
MD50e17859cfc66165f8e47674fa21e4c44
SHA1ca626696b487f9f21ce780589f249bc692717ebe
SHA2562e39c69d85a87f57498bc86031b244a253168feb37776324a3a1bc81da173cd4
SHA512faa8390465f351d2eac84217bb91534c6b8190fa40b5e05e479def7e7430cc68ded4d164e806351aa1d5e12334463cc8719468913dd6e91d3d811e43f534ddc6
-
Filesize
555KB
MD50e17859cfc66165f8e47674fa21e4c44
SHA1ca626696b487f9f21ce780589f249bc692717ebe
SHA2562e39c69d85a87f57498bc86031b244a253168feb37776324a3a1bc81da173cd4
SHA512faa8390465f351d2eac84217bb91534c6b8190fa40b5e05e479def7e7430cc68ded4d164e806351aa1d5e12334463cc8719468913dd6e91d3d811e43f534ddc6
-
Filesize
389KB
MD5d0ec86fa6d83c46557cbfbb505aaca8e
SHA1af2fb64884276cd9c327a36248af654c1810ac60
SHA2562536003fadb5857043bd66745889c686803adf1ce3810b4d2967cf3bd9df0b68
SHA512155ec0344a166682b4033801705609b7f309356543c02a1f190ebd2a4555404690bf1f7ceec3dc0458771245001738e8b43e6dc69b0f20f172dc46432c618b5a
-
Filesize
389KB
MD5d0ec86fa6d83c46557cbfbb505aaca8e
SHA1af2fb64884276cd9c327a36248af654c1810ac60
SHA2562536003fadb5857043bd66745889c686803adf1ce3810b4d2967cf3bd9df0b68
SHA512155ec0344a166682b4033801705609b7f309356543c02a1f190ebd2a4555404690bf1f7ceec3dc0458771245001738e8b43e6dc69b0f20f172dc46432c618b5a
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124
-
Filesize
356KB
MD5230f7f2579c06831ed55ec3a685a854b
SHA120cc3172eab9c3123aa23922e5640c1ce7a05eb7
SHA256bffabc8478c1f14bca83c66aefd8836b552f634915f1cdbd0d410eaf4b8a7415
SHA5126e5ae5226e289f04c76bad547b5d7430aa8cd83a060f27281c23476adbc8da1744d5082b7e8d12e35f28b37f25305ea636b231be09a3f754e03310144a8dc124