Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
196s -
max time network
221s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 11:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe
-
Size
346KB
-
MD5
1505f2108aed0a2a2a82695d58b05893
-
SHA1
2e67e50580825df2da5398cbc7ba420653a35418
-
SHA256
5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb
-
SHA512
96d4639e9a302c4deb74c980a38b5e71bf5fac39de1c57b1d3b16e6b7e3176362bcabef6dacae25879afa8f924b7a9c09f66b5f235c6fe386fee52207314d603
-
SSDEEP
6144:poCBljS9PgGzqLHvw1t6mAOEzDiU2O7X9Blc018N9MsmeYYYYVx3viKC:poqS9PgGim+zZBNBl/8rMsmIxiKC
Malware Config
Extracted
Family
mystic
C2
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 5 IoCs
resource yara_rule behavioral2/memory/4552-0-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4552-1-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4552-2-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4552-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4552-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2812 set thread context of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 4904 2812 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90 PID 2812 wrote to memory of 4552 2812 5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe"C:\Users\Admin\AppData\Local\Temp\5a092ed66bf853f994369cc04f9eb75af6f83274a882c41698736202f4c424eb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 1442⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2812 -ip 28121⤵PID:3708