Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 12:25

General

  • Target

    b72642f104bdbb23c275c4e8f2504fc6.exe

  • Size

    942KB

  • MD5

    b72642f104bdbb23c275c4e8f2504fc6

  • SHA1

    19eb6e9469e8bd99fefcf362009d91b49e16b543

  • SHA256

    c5d6bd9e558b4a0a61eb954ca7b0a28833221666fbc2bd299ce60f62bd62e29d

  • SHA512

    7f6bb1104fd17e131b10190ad5b9962a7a975886107338430e45be12eac4a30d594de1eba538d4722b600a8b7b0ce9e56fb472c2e952c951811c97979a063baa

  • SSDEEP

    12288:7Mr5y90C5q5YrS5wJHnwzzkgf3ZXV0lp6thwmam1adqcRDgX+vo/78lkyMVHHuhQ:eywMx5szkw0PFmEJVMVuhEK6w4tR

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b72642f104bdbb23c275c4e8f2504fc6.exe
    "C:\Users\Admin\AppData\Local\Temp\b72642f104bdbb23c275c4e8f2504fc6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2724
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 268
                7⤵
                • Program crash
                PID:2824
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exe

    Filesize

    840KB

    MD5

    164355782ac23c32eef196edf5ce121a

    SHA1

    a59c187df77b1c8f31e2ceb6dc3f07af301057e4

    SHA256

    e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4

    SHA512

    c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exe

    Filesize

    840KB

    MD5

    164355782ac23c32eef196edf5ce121a

    SHA1

    a59c187df77b1c8f31e2ceb6dc3f07af301057e4

    SHA256

    e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4

    SHA512

    c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exe

    Filesize

    562KB

    MD5

    e6b78815b15658197cea978d533b44c3

    SHA1

    93532d5b2f66cc6277947e507d72d1fc6da94382

    SHA256

    4b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870

    SHA512

    e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exe

    Filesize

    562KB

    MD5

    e6b78815b15658197cea978d533b44c3

    SHA1

    93532d5b2f66cc6277947e507d72d1fc6da94382

    SHA256

    4b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870

    SHA512

    e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exe

    Filesize

    396KB

    MD5

    4c87cbfe90a611e8ebcfeec5fd49599f

    SHA1

    815c8243d2b1e96bd9b9d2dea976921a78ef60f1

    SHA256

    7a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed

    SHA512

    03251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exe

    Filesize

    396KB

    MD5

    4c87cbfe90a611e8ebcfeec5fd49599f

    SHA1

    815c8243d2b1e96bd9b9d2dea976921a78ef60f1

    SHA256

    7a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed

    SHA512

    03251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exe

    Filesize

    840KB

    MD5

    164355782ac23c32eef196edf5ce121a

    SHA1

    a59c187df77b1c8f31e2ceb6dc3f07af301057e4

    SHA256

    e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4

    SHA512

    c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exe

    Filesize

    840KB

    MD5

    164355782ac23c32eef196edf5ce121a

    SHA1

    a59c187df77b1c8f31e2ceb6dc3f07af301057e4

    SHA256

    e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4

    SHA512

    c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exe

    Filesize

    562KB

    MD5

    e6b78815b15658197cea978d533b44c3

    SHA1

    93532d5b2f66cc6277947e507d72d1fc6da94382

    SHA256

    4b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870

    SHA512

    e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exe

    Filesize

    562KB

    MD5

    e6b78815b15658197cea978d533b44c3

    SHA1

    93532d5b2f66cc6277947e507d72d1fc6da94382

    SHA256

    4b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870

    SHA512

    e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exe

    Filesize

    396KB

    MD5

    4c87cbfe90a611e8ebcfeec5fd49599f

    SHA1

    815c8243d2b1e96bd9b9d2dea976921a78ef60f1

    SHA256

    7a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed

    SHA512

    03251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exe

    Filesize

    396KB

    MD5

    4c87cbfe90a611e8ebcfeec5fd49599f

    SHA1

    815c8243d2b1e96bd9b9d2dea976921a78ef60f1

    SHA256

    7a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed

    SHA512

    03251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe

    Filesize

    379KB

    MD5

    e6c7cafddc2d8fc42c46e7309f1930a0

    SHA1

    732c0edb05a6dbce5b837d4352b39eaad40e1659

    SHA256

    92a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6

    SHA512

    b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0

  • memory/2724-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2724-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2724-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2724-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2724-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2724-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2724-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2724-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2724-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2724-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB