Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
199s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 06:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe
-
Size
1016KB
-
MD5
9197894f082bcbf9de819c2770a5207d
-
SHA1
fabcfad80b27394644712a25564c3de399a8e126
-
SHA256
3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58
-
SHA512
89810df68fda615939204d78ce6a567780c35a4cac483a6742f45cff4c46d45ad40f118583910ddf1ccddacb1cdbd2c51856e28154fcae94c92724020bf3b383
-
SSDEEP
12288:d+uAoZYyBYDKzcx9jkmP8bey7/0RDMmZZxnyUuyyutrY9PXY8/9:dNpYDKzcx9jkmPe/knxyerY9PoE9
Malware Config
Extracted
Family
mystic
C2
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral2/memory/3392-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3392-2-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3392-1-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3392-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3392-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1860 set thread context of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 844 1860 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89 PID 1860 wrote to memory of 3392 1860 3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe"C:\Users\Admin\AppData\Local\Temp\3d53faf7fb3af3a735df7179ce8dc731ea9017e32365b0ede294d5f21f748e58.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 3042⤵
- Program crash
PID:844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1860 -ip 18601⤵PID:4308