Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:21

General

  • Target

    ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe

  • Size

    907KB

  • MD5

    1609538cc65c63edce6b5c220371e2b4

  • SHA1

    adb56a58e570cf51e48dafb38d11cb2803cd59fb

  • SHA256

    ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6

  • SHA512

    db7c54537311dc60d35331eaa692d26a24fd4ee770f1e5668d74d8e1ef90fa9c9440e5f85319af1194731ad3feff04a9f2564cc93578750c7e7f9bb387efd063

  • SSDEEP

    12288:lMr/y90+mD8zCT3r69wXHu3/Dke760amsfpc4HAGMwFCI3nWLNDlQFIGcUdxWeoK:Kyf6n3pu3/HcmGuhkCI3nTqOR6I

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe
    "C:\Users\Admin\AppData\Local\Temp\ba437a1e6e075cfd2f196bd8501c349ccc23b0400514b84b97bc3f786e0f57d6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5726644.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5726644.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8805806.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8805806.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0262204.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0262204.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2536
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2672
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2532
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2552
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 268
                  7⤵
                  • Program crash
                  PID:2464
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 280
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5726644.exe

      Filesize

      805KB

      MD5

      4f966e80bf9e88ccf3410550fcd5b017

      SHA1

      13ff88b9dba2667a797203f8e9b29e094f83e9d3

      SHA256

      a8dacdb2fddb376a8f77443657a873c2686f18468277a26e09838e252a660f54

      SHA512

      0f7d812669d1e095e23861d03e5b4b99f21878eaf3c1d64595452585250fa14608527d7a390a3a02d7585a62f11f2441e048fe0483576363f8f41a3c1b59e480

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5726644.exe

      Filesize

      805KB

      MD5

      4f966e80bf9e88ccf3410550fcd5b017

      SHA1

      13ff88b9dba2667a797203f8e9b29e094f83e9d3

      SHA256

      a8dacdb2fddb376a8f77443657a873c2686f18468277a26e09838e252a660f54

      SHA512

      0f7d812669d1e095e23861d03e5b4b99f21878eaf3c1d64595452585250fa14608527d7a390a3a02d7585a62f11f2441e048fe0483576363f8f41a3c1b59e480

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8805806.exe

      Filesize

      545KB

      MD5

      5ce66d56944d9daeea265dadbf3a6356

      SHA1

      6b95a74950d2439c9037727760dd34165f1b229c

      SHA256

      7ccb0348675be09971159dcef94515bd768f489d75614145e0b8639ac6111b3c

      SHA512

      fc2bbd6c467f6276218e87ed58648c82e93eddce10877748f5ffca64ea59abfdd2e8d3d605fa4aa404ac3e9f291c013e500508826aaa00e7d1f1e45be2130dc1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8805806.exe

      Filesize

      545KB

      MD5

      5ce66d56944d9daeea265dadbf3a6356

      SHA1

      6b95a74950d2439c9037727760dd34165f1b229c

      SHA256

      7ccb0348675be09971159dcef94515bd768f489d75614145e0b8639ac6111b3c

      SHA512

      fc2bbd6c467f6276218e87ed58648c82e93eddce10877748f5ffca64ea59abfdd2e8d3d605fa4aa404ac3e9f291c013e500508826aaa00e7d1f1e45be2130dc1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0262204.exe

      Filesize

      379KB

      MD5

      18a4841763d98309229bb1052c667843

      SHA1

      d1bfc798311c28591c1ab02cc945eae1c12767c6

      SHA256

      6c9b66adbb9ab3a93d3b4fd29ec76762386be94ec6192d739cd093d3a1dc8381

      SHA512

      b9db4a294cbd521ab37a17b621cc375dfbb74d85b7427835ba8536f570c5314417c486c3e59397c76007e46c7f3454166b1788e8d1f3b92df3b5ce173252946c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0262204.exe

      Filesize

      379KB

      MD5

      18a4841763d98309229bb1052c667843

      SHA1

      d1bfc798311c28591c1ab02cc945eae1c12767c6

      SHA256

      6c9b66adbb9ab3a93d3b4fd29ec76762386be94ec6192d739cd093d3a1dc8381

      SHA512

      b9db4a294cbd521ab37a17b621cc375dfbb74d85b7427835ba8536f570c5314417c486c3e59397c76007e46c7f3454166b1788e8d1f3b92df3b5ce173252946c

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5726644.exe

      Filesize

      805KB

      MD5

      4f966e80bf9e88ccf3410550fcd5b017

      SHA1

      13ff88b9dba2667a797203f8e9b29e094f83e9d3

      SHA256

      a8dacdb2fddb376a8f77443657a873c2686f18468277a26e09838e252a660f54

      SHA512

      0f7d812669d1e095e23861d03e5b4b99f21878eaf3c1d64595452585250fa14608527d7a390a3a02d7585a62f11f2441e048fe0483576363f8f41a3c1b59e480

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5726644.exe

      Filesize

      805KB

      MD5

      4f966e80bf9e88ccf3410550fcd5b017

      SHA1

      13ff88b9dba2667a797203f8e9b29e094f83e9d3

      SHA256

      a8dacdb2fddb376a8f77443657a873c2686f18468277a26e09838e252a660f54

      SHA512

      0f7d812669d1e095e23861d03e5b4b99f21878eaf3c1d64595452585250fa14608527d7a390a3a02d7585a62f11f2441e048fe0483576363f8f41a3c1b59e480

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x8805806.exe

      Filesize

      545KB

      MD5

      5ce66d56944d9daeea265dadbf3a6356

      SHA1

      6b95a74950d2439c9037727760dd34165f1b229c

      SHA256

      7ccb0348675be09971159dcef94515bd768f489d75614145e0b8639ac6111b3c

      SHA512

      fc2bbd6c467f6276218e87ed58648c82e93eddce10877748f5ffca64ea59abfdd2e8d3d605fa4aa404ac3e9f291c013e500508826aaa00e7d1f1e45be2130dc1

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x8805806.exe

      Filesize

      545KB

      MD5

      5ce66d56944d9daeea265dadbf3a6356

      SHA1

      6b95a74950d2439c9037727760dd34165f1b229c

      SHA256

      7ccb0348675be09971159dcef94515bd768f489d75614145e0b8639ac6111b3c

      SHA512

      fc2bbd6c467f6276218e87ed58648c82e93eddce10877748f5ffca64ea59abfdd2e8d3d605fa4aa404ac3e9f291c013e500508826aaa00e7d1f1e45be2130dc1

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0262204.exe

      Filesize

      379KB

      MD5

      18a4841763d98309229bb1052c667843

      SHA1

      d1bfc798311c28591c1ab02cc945eae1c12767c6

      SHA256

      6c9b66adbb9ab3a93d3b4fd29ec76762386be94ec6192d739cd093d3a1dc8381

      SHA512

      b9db4a294cbd521ab37a17b621cc375dfbb74d85b7427835ba8536f570c5314417c486c3e59397c76007e46c7f3454166b1788e8d1f3b92df3b5ce173252946c

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0262204.exe

      Filesize

      379KB

      MD5

      18a4841763d98309229bb1052c667843

      SHA1

      d1bfc798311c28591c1ab02cc945eae1c12767c6

      SHA256

      6c9b66adbb9ab3a93d3b4fd29ec76762386be94ec6192d739cd093d3a1dc8381

      SHA512

      b9db4a294cbd521ab37a17b621cc375dfbb74d85b7427835ba8536f570c5314417c486c3e59397c76007e46c7f3454166b1788e8d1f3b92df3b5ce173252946c

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3485536.exe

      Filesize

      350KB

      MD5

      3e8db4501f3f636424531085946f4952

      SHA1

      7702881a79fab2037489af2c9161c26788f9788c

      SHA256

      920a5251e900f50bf1054a458c7e12dc8d9216b2f4326c55532507cadb8a23f8

      SHA512

      ea5d1966167590722a16aaa9ce96808c140459cd569ca64f30b5a38ecba96556294cdbf33c0e90bd767d2ba738d9cc90177942a2b97d5c7c69a2ff30bd33868d

    • memory/2552-50-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2552-48-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2552-43-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2552-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2552-52-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2552-54-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2552-47-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2552-45-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2552-46-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2552-44-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB