Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 09:21
Static task
static1
Behavioral task
behavioral1
Sample
ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe
Resource
win10v2004-20230915-en
General
-
Target
ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe
-
Size
907KB
-
MD5
1609538cc65c63edce6b5c220371e2b4
-
SHA1
adb56a58e570cf51e48dafb38d11cb2803cd59fb
-
SHA256
ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6
-
SHA512
db7c54537311dc60d35331eaa692d26a24fd4ee770f1e5668d74d8e1ef90fa9c9440e5f85319af1194731ad3feff04a9f2564cc93578750c7e7f9bb387efd063
-
SSDEEP
12288:lMr/y90+mD8zCT3r69wXHu3/Dke760amsfpc4HAGMwFCI3nWLNDlQFIGcUdxWeoK:Kyf6n3pu3/HcmGuhkCI3nTqOR6I
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2552-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2660 x5726644.exe 2764 x8805806.exe 2536 x0262204.exe 2672 g3485536.exe -
Loads dropped DLL 13 IoCs
pid Process 2716 ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe 2660 x5726644.exe 2660 x5726644.exe 2764 x8805806.exe 2764 x8805806.exe 2536 x0262204.exe 2536 x0262204.exe 2536 x0262204.exe 2672 g3485536.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5726644.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8805806.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0262204.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 2552 2672 g3485536.exe 34 -
Program crash 2 IoCs
pid pid_target Process procid_target 2560 2672 WerFault.exe 32 2464 2552 WerFault.exe 34 -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2660 2716 ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe 29 PID 2716 wrote to memory of 2660 2716 ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe 29 PID 2716 wrote to memory of 2660 2716 ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe 29 PID 2716 wrote to memory of 2660 2716 ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe 29 PID 2716 wrote to memory of 2660 2716 ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe 29 PID 2716 wrote to memory of 2660 2716 ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe 29 PID 2716 wrote to memory of 2660 2716 ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe 29 PID 2660 wrote to memory of 2764 2660 x5726644.exe 30 PID 2660 wrote to memory of 2764 2660 x5726644.exe 30 PID 2660 wrote to memory of 2764 2660 x5726644.exe 30 PID 2660 wrote to memory of 2764 2660 x5726644.exe 30 PID 2660 wrote to memory of 2764 2660 x5726644.exe 30 PID 2660 wrote to memory of 2764 2660 x5726644.exe 30 PID 2660 wrote to memory of 2764 2660 x5726644.exe 30 PID 2764 wrote to memory of 2536 2764 x8805806.exe 31 PID 2764 wrote to memory of 2536 2764 x8805806.exe 31 PID 2764 wrote to memory of 2536 2764 x8805806.exe 31 PID 2764 wrote to memory of 2536 2764 x8805806.exe 31 PID 2764 wrote to memory of 2536 2764 x8805806.exe 31 PID 2764 wrote to memory of 2536 2764 x8805806.exe 31 PID 2764 wrote to memory of 2536 2764 x8805806.exe 31 PID 2536 wrote to memory of 2672 2536 x0262204.exe 32 PID 2536 wrote to memory of 2672 2536 x0262204.exe 32 PID 2536 wrote to memory of 2672 2536 x0262204.exe 32 PID 2536 wrote to memory of 2672 2536 x0262204.exe 32 PID 2536 wrote to memory of 2672 2536 x0262204.exe 32 PID 2536 wrote to memory of 2672 2536 x0262204.exe 32 PID 2536 wrote to memory of 2672 2536 x0262204.exe 32 PID 2672 wrote to memory of 2532 2672 g3485536.exe 33 PID 2672 wrote to memory of 2532 2672 g3485536.exe 33 PID 2672 wrote to memory of 2532 2672 g3485536.exe 33 PID 2672 wrote to memory of 2532 2672 g3485536.exe 33 PID 2672 wrote to memory of 2532 2672 g3485536.exe 33 PID 2672 wrote to memory of 2532 2672 g3485536.exe 33 PID 2672 wrote to memory of 2532 2672 g3485536.exe 33 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2552 2672 g3485536.exe 34 PID 2672 wrote to memory of 2560 2672 g3485536.exe 35 PID 2672 wrote to memory of 2560 2672 g3485536.exe 35 PID 2672 wrote to memory of 2560 2672 g3485536.exe 35 PID 2672 wrote to memory of 2560 2672 g3485536.exe 35 PID 2672 wrote to memory of 2560 2672 g3485536.exe 35 PID 2672 wrote to memory of 2560 2672 g3485536.exe 35 PID 2672 wrote to memory of 2560 2672 g3485536.exe 35 PID 2552 wrote to memory of 2464 2552 AppLaunch.exe 36 PID 2552 wrote to memory of 2464 2552 AppLaunch.exe 36 PID 2552 wrote to memory of 2464 2552 AppLaunch.exe 36 PID 2552 wrote to memory of 2464 2552 AppLaunch.exe 36 PID 2552 wrote to memory of 2464 2552 AppLaunch.exe 36 PID 2552 wrote to memory of 2464 2552 AppLaunch.exe 36 PID 2552 wrote to memory of 2464 2552 AppLaunch.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe"C:\Users\Admin\AppData\Local\Temp\ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5726644.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5726644.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8805806.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8805806.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0262204.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0262204.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 2687⤵
- Program crash
PID:2464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:2560
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD54f966e80bf9e88ccf3410550fcd5b017
SHA113ff88b9dba2667a797203f8e9b29e094f83e9d3
SHA256a8dacdb2fddb376a8f77443657a873c2686f18468277a26e09838e252a660f54
SHA5120f7d812669d1e095e23861d03e5b4b99f21878eaf3c1d64595452585250fa14608527d7a390a3a02d7585a62f11f2441e048fe0483576363f8f41a3c1b59e480
-
Filesize
805KB
MD54f966e80bf9e88ccf3410550fcd5b017
SHA113ff88b9dba2667a797203f8e9b29e094f83e9d3
SHA256a8dacdb2fddb376a8f77443657a873c2686f18468277a26e09838e252a660f54
SHA5120f7d812669d1e095e23861d03e5b4b99f21878eaf3c1d64595452585250fa14608527d7a390a3a02d7585a62f11f2441e048fe0483576363f8f41a3c1b59e480
-
Filesize
545KB
MD55ce66d56944d9daeea265dadbf3a6356
SHA16b95a74950d2439c9037727760dd34165f1b229c
SHA2567ccb0348675be09971159dcef94515bd768f489d75614145e0b8639ac6111b3c
SHA512fc2bbd6c467f6276218e87ed58648c82e93eddce10877748f5ffca64ea59abfdd2e8d3d605fa4aa404ac3e9f291c013e500508826aaa00e7d1f1e45be2130dc1
-
Filesize
545KB
MD55ce66d56944d9daeea265dadbf3a6356
SHA16b95a74950d2439c9037727760dd34165f1b229c
SHA2567ccb0348675be09971159dcef94515bd768f489d75614145e0b8639ac6111b3c
SHA512fc2bbd6c467f6276218e87ed58648c82e93eddce10877748f5ffca64ea59abfdd2e8d3d605fa4aa404ac3e9f291c013e500508826aaa00e7d1f1e45be2130dc1
-
Filesize
379KB
MD518a4841763d98309229bb1052c667843
SHA1d1bfc798311c28591c1ab02cc945eae1c12767c6
SHA2566c9b66adbb9ab3a93d3b4fd29ec76762386be94ec6192d739cd093d3a1dc8381
SHA512b9db4a294cbd521ab37a17b621cc375dfbb74d85b7427835ba8536f570c5314417c486c3e59397c76007e46c7f3454166b1788e8d1f3b92df3b5ce173252946c
-
Filesize
379KB
MD518a4841763d98309229bb1052c667843
SHA1d1bfc798311c28591c1ab02cc945eae1c12767c6
SHA2566c9b66adbb9ab3a93d3b4fd29ec76762386be94ec6192d739cd093d3a1dc8381
SHA512b9db4a294cbd521ab37a17b621cc375dfbb74d85b7427835ba8536f570c5314417c486c3e59397c76007e46c7f3454166b1788e8d1f3b92df3b5ce173252946c
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d
-
Filesize
805KB
MD54f966e80bf9e88ccf3410550fcd5b017
SHA113ff88b9dba2667a797203f8e9b29e094f83e9d3
SHA256a8dacdb2fddb376a8f77443657a873c2686f18468277a26e09838e252a660f54
SHA5120f7d812669d1e095e23861d03e5b4b99f21878eaf3c1d64595452585250fa14608527d7a390a3a02d7585a62f11f2441e048fe0483576363f8f41a3c1b59e480
-
Filesize
805KB
MD54f966e80bf9e88ccf3410550fcd5b017
SHA113ff88b9dba2667a797203f8e9b29e094f83e9d3
SHA256a8dacdb2fddb376a8f77443657a873c2686f18468277a26e09838e252a660f54
SHA5120f7d812669d1e095e23861d03e5b4b99f21878eaf3c1d64595452585250fa14608527d7a390a3a02d7585a62f11f2441e048fe0483576363f8f41a3c1b59e480
-
Filesize
545KB
MD55ce66d56944d9daeea265dadbf3a6356
SHA16b95a74950d2439c9037727760dd34165f1b229c
SHA2567ccb0348675be09971159dcef94515bd768f489d75614145e0b8639ac6111b3c
SHA512fc2bbd6c467f6276218e87ed58648c82e93eddce10877748f5ffca64ea59abfdd2e8d3d605fa4aa404ac3e9f291c013e500508826aaa00e7d1f1e45be2130dc1
-
Filesize
545KB
MD55ce66d56944d9daeea265dadbf3a6356
SHA16b95a74950d2439c9037727760dd34165f1b229c
SHA2567ccb0348675be09971159dcef94515bd768f489d75614145e0b8639ac6111b3c
SHA512fc2bbd6c467f6276218e87ed58648c82e93eddce10877748f5ffca64ea59abfdd2e8d3d605fa4aa404ac3e9f291c013e500508826aaa00e7d1f1e45be2130dc1
-
Filesize
379KB
MD518a4841763d98309229bb1052c667843
SHA1d1bfc798311c28591c1ab02cc945eae1c12767c6
SHA2566c9b66adbb9ab3a93d3b4fd29ec76762386be94ec6192d739cd093d3a1dc8381
SHA512b9db4a294cbd521ab37a17b621cc375dfbb74d85b7427835ba8536f570c5314417c486c3e59397c76007e46c7f3454166b1788e8d1f3b92df3b5ce173252946c
-
Filesize
379KB
MD518a4841763d98309229bb1052c667843
SHA1d1bfc798311c28591c1ab02cc945eae1c12767c6
SHA2566c9b66adbb9ab3a93d3b4fd29ec76762386be94ec6192d739cd093d3a1dc8381
SHA512b9db4a294cbd521ab37a17b621cc375dfbb74d85b7427835ba8536f570c5314417c486c3e59397c76007e46c7f3454166b1788e8d1f3b92df3b5ce173252946c
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d
-
Filesize
350KB
MD53e8db4501f3f636424531085946f4952
SHA17702881a79fab2037489af2c9161c26788f9788c
SHA256920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8
SHA512ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d