Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
18f4893f8dbb1717b4685c8646f90554.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
18f4893f8dbb1717b4685c8646f90554.exe
Resource
win10v2004-20230915-en
General
-
Target
18f4893f8dbb1717b4685c8646f90554.exe
-
Size
910KB
-
MD5
18f4893f8dbb1717b4685c8646f90554
-
SHA1
04b0da66addf77e2d011a3cfb8999011f10fd344
-
SHA256
7decb7675605f65b6adafa81ace426cffa10321bd4821225215a4ba499dce669
-
SHA512
91d92b342a98a1fa7ed86a892d908c12eb8e1fec79c1747831f2484c993f536dbe3429b103d1a8c4c0245f2ed99e582726e739c97cf181830906e2b7b82e3eb8
-
SSDEEP
12288:4MrFy90Gvb3A7jOpYwu8EJ2qh2RRwNen0hmkFFb1uj4UrYk0qY14qWuTD4zrqy0X:NyrzOOpYwu8EcYenuChcX1L1e6F
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2552-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-51-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-58-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2552-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2696 x3231893.exe 2588 x3633049.exe 1216 x1193534.exe 2508 g1784005.exe -
Loads dropped DLL 13 IoCs
pid Process 1736 18f4893f8dbb1717b4685c8646f90554.exe 2696 x3231893.exe 2696 x3231893.exe 2588 x3633049.exe 2588 x3633049.exe 1216 x1193534.exe 1216 x1193534.exe 1216 x1193534.exe 2508 g1784005.exe 656 WerFault.exe 656 WerFault.exe 656 WerFault.exe 656 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3231893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3633049.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1193534.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18f4893f8dbb1717b4685c8646f90554.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2508 set thread context of 2552 2508 g1784005.exe 35 -
Program crash 2 IoCs
pid pid_target Process procid_target 268 2552 WerFault.exe 35 656 2508 WerFault.exe 34 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2696 1736 18f4893f8dbb1717b4685c8646f90554.exe 30 PID 1736 wrote to memory of 2696 1736 18f4893f8dbb1717b4685c8646f90554.exe 30 PID 1736 wrote to memory of 2696 1736 18f4893f8dbb1717b4685c8646f90554.exe 30 PID 1736 wrote to memory of 2696 1736 18f4893f8dbb1717b4685c8646f90554.exe 30 PID 1736 wrote to memory of 2696 1736 18f4893f8dbb1717b4685c8646f90554.exe 30 PID 1736 wrote to memory of 2696 1736 18f4893f8dbb1717b4685c8646f90554.exe 30 PID 1736 wrote to memory of 2696 1736 18f4893f8dbb1717b4685c8646f90554.exe 30 PID 2696 wrote to memory of 2588 2696 x3231893.exe 31 PID 2696 wrote to memory of 2588 2696 x3231893.exe 31 PID 2696 wrote to memory of 2588 2696 x3231893.exe 31 PID 2696 wrote to memory of 2588 2696 x3231893.exe 31 PID 2696 wrote to memory of 2588 2696 x3231893.exe 31 PID 2696 wrote to memory of 2588 2696 x3231893.exe 31 PID 2696 wrote to memory of 2588 2696 x3231893.exe 31 PID 2588 wrote to memory of 1216 2588 x3633049.exe 32 PID 2588 wrote to memory of 1216 2588 x3633049.exe 32 PID 2588 wrote to memory of 1216 2588 x3633049.exe 32 PID 2588 wrote to memory of 1216 2588 x3633049.exe 32 PID 2588 wrote to memory of 1216 2588 x3633049.exe 32 PID 2588 wrote to memory of 1216 2588 x3633049.exe 32 PID 2588 wrote to memory of 1216 2588 x3633049.exe 32 PID 1216 wrote to memory of 2508 1216 x1193534.exe 34 PID 1216 wrote to memory of 2508 1216 x1193534.exe 34 PID 1216 wrote to memory of 2508 1216 x1193534.exe 34 PID 1216 wrote to memory of 2508 1216 x1193534.exe 34 PID 1216 wrote to memory of 2508 1216 x1193534.exe 34 PID 1216 wrote to memory of 2508 1216 x1193534.exe 34 PID 1216 wrote to memory of 2508 1216 x1193534.exe 34 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 2552 2508 g1784005.exe 35 PID 2508 wrote to memory of 656 2508 g1784005.exe 37 PID 2508 wrote to memory of 656 2508 g1784005.exe 37 PID 2508 wrote to memory of 656 2508 g1784005.exe 37 PID 2552 wrote to memory of 268 2552 AppLaunch.exe 36 PID 2508 wrote to memory of 656 2508 g1784005.exe 37 PID 2508 wrote to memory of 656 2508 g1784005.exe 37 PID 2552 wrote to memory of 268 2552 AppLaunch.exe 36 PID 2508 wrote to memory of 656 2508 g1784005.exe 37 PID 2552 wrote to memory of 268 2552 AppLaunch.exe 36 PID 2508 wrote to memory of 656 2508 g1784005.exe 37 PID 2552 wrote to memory of 268 2552 AppLaunch.exe 36 PID 2552 wrote to memory of 268 2552 AppLaunch.exe 36 PID 2552 wrote to memory of 268 2552 AppLaunch.exe 36 PID 2552 wrote to memory of 268 2552 AppLaunch.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\18f4893f8dbb1717b4685c8646f90554.exe"C:\Users\Admin\AppData\Local\Temp\18f4893f8dbb1717b4685c8646f90554.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3231893.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3231893.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3633049.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3633049.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1193534.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1193534.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1784005.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1784005.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 2687⤵
- Program crash
PID:268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:656
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
809KB
MD50cca24a85d4e1d433b65157e1638b1e0
SHA14d844bc59f4f50ab68ba44e6a85076b33f72494f
SHA256d1dffa4519071978a0147eb8621e8ff8ccd6ae68b94d4d49fb25506578f587f2
SHA512c0c8fcf672d2d7301b2d44081c1916d25499b2305e65529a508cd7cc79f88394cd3223a39db64666be1ab5b00fafca26bbab564013ded0d7ab5ea84b00650f7a
-
Filesize
809KB
MD50cca24a85d4e1d433b65157e1638b1e0
SHA14d844bc59f4f50ab68ba44e6a85076b33f72494f
SHA256d1dffa4519071978a0147eb8621e8ff8ccd6ae68b94d4d49fb25506578f587f2
SHA512c0c8fcf672d2d7301b2d44081c1916d25499b2305e65529a508cd7cc79f88394cd3223a39db64666be1ab5b00fafca26bbab564013ded0d7ab5ea84b00650f7a
-
Filesize
547KB
MD5c400732d7254fcee98f7e43c998c7a1e
SHA1c41148f05060ad18d566d39676fc6b7ebfff640a
SHA256e040ae2fca7e2ea9304b3c12a658039cf2e648cea86fbbdfad8bc9a213fda05d
SHA51217a9f2a27d7ad607f1d5d6571fd80f897ac4a5148ae7f815993c18621bc8e04013a7df6ff9a56d577560719bf4f8f9120cf984f6d8dbd27c06cf3d653bc6a9a4
-
Filesize
547KB
MD5c400732d7254fcee98f7e43c998c7a1e
SHA1c41148f05060ad18d566d39676fc6b7ebfff640a
SHA256e040ae2fca7e2ea9304b3c12a658039cf2e648cea86fbbdfad8bc9a213fda05d
SHA51217a9f2a27d7ad607f1d5d6571fd80f897ac4a5148ae7f815993c18621bc8e04013a7df6ff9a56d577560719bf4f8f9120cf984f6d8dbd27c06cf3d653bc6a9a4
-
Filesize
381KB
MD5285633b24c1bac35ef6930a810d73473
SHA10d153fa35e97625fe2f127d0ec1735f7efa5d429
SHA25615d060d87c203db2e0b3231300c4abf313d4731baca0fbe23d0b169dab1f5d90
SHA512fcf5f0271523436aa65211a0e1c372b949123300d54e8022e59a24f61cc816d127ce5b7fb15863a837bec1fafa7d6cd29a5d0600e6e8bd7c7fdb1430c3fbb6c2
-
Filesize
381KB
MD5285633b24c1bac35ef6930a810d73473
SHA10d153fa35e97625fe2f127d0ec1735f7efa5d429
SHA25615d060d87c203db2e0b3231300c4abf313d4731baca0fbe23d0b169dab1f5d90
SHA512fcf5f0271523436aa65211a0e1c372b949123300d54e8022e59a24f61cc816d127ce5b7fb15863a837bec1fafa7d6cd29a5d0600e6e8bd7c7fdb1430c3fbb6c2
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75
-
Filesize
809KB
MD50cca24a85d4e1d433b65157e1638b1e0
SHA14d844bc59f4f50ab68ba44e6a85076b33f72494f
SHA256d1dffa4519071978a0147eb8621e8ff8ccd6ae68b94d4d49fb25506578f587f2
SHA512c0c8fcf672d2d7301b2d44081c1916d25499b2305e65529a508cd7cc79f88394cd3223a39db64666be1ab5b00fafca26bbab564013ded0d7ab5ea84b00650f7a
-
Filesize
809KB
MD50cca24a85d4e1d433b65157e1638b1e0
SHA14d844bc59f4f50ab68ba44e6a85076b33f72494f
SHA256d1dffa4519071978a0147eb8621e8ff8ccd6ae68b94d4d49fb25506578f587f2
SHA512c0c8fcf672d2d7301b2d44081c1916d25499b2305e65529a508cd7cc79f88394cd3223a39db64666be1ab5b00fafca26bbab564013ded0d7ab5ea84b00650f7a
-
Filesize
547KB
MD5c400732d7254fcee98f7e43c998c7a1e
SHA1c41148f05060ad18d566d39676fc6b7ebfff640a
SHA256e040ae2fca7e2ea9304b3c12a658039cf2e648cea86fbbdfad8bc9a213fda05d
SHA51217a9f2a27d7ad607f1d5d6571fd80f897ac4a5148ae7f815993c18621bc8e04013a7df6ff9a56d577560719bf4f8f9120cf984f6d8dbd27c06cf3d653bc6a9a4
-
Filesize
547KB
MD5c400732d7254fcee98f7e43c998c7a1e
SHA1c41148f05060ad18d566d39676fc6b7ebfff640a
SHA256e040ae2fca7e2ea9304b3c12a658039cf2e648cea86fbbdfad8bc9a213fda05d
SHA51217a9f2a27d7ad607f1d5d6571fd80f897ac4a5148ae7f815993c18621bc8e04013a7df6ff9a56d577560719bf4f8f9120cf984f6d8dbd27c06cf3d653bc6a9a4
-
Filesize
381KB
MD5285633b24c1bac35ef6930a810d73473
SHA10d153fa35e97625fe2f127d0ec1735f7efa5d429
SHA25615d060d87c203db2e0b3231300c4abf313d4731baca0fbe23d0b169dab1f5d90
SHA512fcf5f0271523436aa65211a0e1c372b949123300d54e8022e59a24f61cc816d127ce5b7fb15863a837bec1fafa7d6cd29a5d0600e6e8bd7c7fdb1430c3fbb6c2
-
Filesize
381KB
MD5285633b24c1bac35ef6930a810d73473
SHA10d153fa35e97625fe2f127d0ec1735f7efa5d429
SHA25615d060d87c203db2e0b3231300c4abf313d4731baca0fbe23d0b169dab1f5d90
SHA512fcf5f0271523436aa65211a0e1c372b949123300d54e8022e59a24f61cc816d127ce5b7fb15863a837bec1fafa7d6cd29a5d0600e6e8bd7c7fdb1430c3fbb6c2
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75
-
Filesize
346KB
MD501dbf0ecf0b14d8b37049c1f0565cdaa
SHA125d73d8f5dafd39ad8d0ec80043185a664ea2f42
SHA2564ff0306568559b1bd6045e0a9dc9c765eba34fce2bfdd29a62c6c15ae8fc8a6b
SHA512471c498c8250e62b8b03a5ddeccf3c9d1a35dd6349aeab272226cdf46f820fe3d1cb5730e56b54a22f97549fe4a2104abf0f6d368ce5a9d95847463e539b0f75