Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
b72642f104bdbb23c275c4e8f2504fc6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b72642f104bdbb23c275c4e8f2504fc6.exe
Resource
win10v2004-20230915-en
General
-
Target
b72642f104bdbb23c275c4e8f2504fc6.exe
-
Size
942KB
-
MD5
b72642f104bdbb23c275c4e8f2504fc6
-
SHA1
19eb6e9469e8bd99fefcf362009d91b49e16b543
-
SHA256
c5d6bd9e558b4a0a61eb954ca7b0a28833221666fbc2bd299ce60f62bd62e29d
-
SHA512
7f6bb1104fd17e131b10190ad5b9962a7a975886107338430e45be12eac4a30d594de1eba538d4722b600a8b7b0ce9e56fb472c2e952c951811c97979a063baa
-
SSDEEP
12288:7Mr5y90C5q5YrS5wJHnwzzkgf3ZXV0lp6thwmam1adqcRDgX+vo/78lkyMVHHuhQ:eywMx5szkw0PFmEJVMVuhEK6w4tR
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2724-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2724-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2724-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2724-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2724-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2724-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2900 x2987309.exe 2588 x5283578.exe 2708 x0220654.exe 2636 g3837789.exe -
Loads dropped DLL 13 IoCs
pid Process 2976 b72642f104bdbb23c275c4e8f2504fc6.exe 2900 x2987309.exe 2900 x2987309.exe 2588 x5283578.exe 2588 x5283578.exe 2708 x0220654.exe 2708 x0220654.exe 2708 x0220654.exe 2636 g3837789.exe 2524 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b72642f104bdbb23c275c4e8f2504fc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2987309.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5283578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0220654.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2636 set thread context of 2724 2636 g3837789.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2524 2636 WerFault.exe 31 2824 2724 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2900 2976 b72642f104bdbb23c275c4e8f2504fc6.exe 28 PID 2976 wrote to memory of 2900 2976 b72642f104bdbb23c275c4e8f2504fc6.exe 28 PID 2976 wrote to memory of 2900 2976 b72642f104bdbb23c275c4e8f2504fc6.exe 28 PID 2976 wrote to memory of 2900 2976 b72642f104bdbb23c275c4e8f2504fc6.exe 28 PID 2976 wrote to memory of 2900 2976 b72642f104bdbb23c275c4e8f2504fc6.exe 28 PID 2976 wrote to memory of 2900 2976 b72642f104bdbb23c275c4e8f2504fc6.exe 28 PID 2976 wrote to memory of 2900 2976 b72642f104bdbb23c275c4e8f2504fc6.exe 28 PID 2900 wrote to memory of 2588 2900 x2987309.exe 29 PID 2900 wrote to memory of 2588 2900 x2987309.exe 29 PID 2900 wrote to memory of 2588 2900 x2987309.exe 29 PID 2900 wrote to memory of 2588 2900 x2987309.exe 29 PID 2900 wrote to memory of 2588 2900 x2987309.exe 29 PID 2900 wrote to memory of 2588 2900 x2987309.exe 29 PID 2900 wrote to memory of 2588 2900 x2987309.exe 29 PID 2588 wrote to memory of 2708 2588 x5283578.exe 30 PID 2588 wrote to memory of 2708 2588 x5283578.exe 30 PID 2588 wrote to memory of 2708 2588 x5283578.exe 30 PID 2588 wrote to memory of 2708 2588 x5283578.exe 30 PID 2588 wrote to memory of 2708 2588 x5283578.exe 30 PID 2588 wrote to memory of 2708 2588 x5283578.exe 30 PID 2588 wrote to memory of 2708 2588 x5283578.exe 30 PID 2708 wrote to memory of 2636 2708 x0220654.exe 31 PID 2708 wrote to memory of 2636 2708 x0220654.exe 31 PID 2708 wrote to memory of 2636 2708 x0220654.exe 31 PID 2708 wrote to memory of 2636 2708 x0220654.exe 31 PID 2708 wrote to memory of 2636 2708 x0220654.exe 31 PID 2708 wrote to memory of 2636 2708 x0220654.exe 31 PID 2708 wrote to memory of 2636 2708 x0220654.exe 31 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2636 wrote to memory of 2724 2636 g3837789.exe 32 PID 2724 wrote to memory of 2824 2724 AppLaunch.exe 34 PID 2724 wrote to memory of 2824 2724 AppLaunch.exe 34 PID 2724 wrote to memory of 2824 2724 AppLaunch.exe 34 PID 2724 wrote to memory of 2824 2724 AppLaunch.exe 34 PID 2724 wrote to memory of 2824 2724 AppLaunch.exe 34 PID 2724 wrote to memory of 2824 2724 AppLaunch.exe 34 PID 2724 wrote to memory of 2824 2724 AppLaunch.exe 34 PID 2636 wrote to memory of 2524 2636 g3837789.exe 33 PID 2636 wrote to memory of 2524 2636 g3837789.exe 33 PID 2636 wrote to memory of 2524 2636 g3837789.exe 33 PID 2636 wrote to memory of 2524 2636 g3837789.exe 33 PID 2636 wrote to memory of 2524 2636 g3837789.exe 33 PID 2636 wrote to memory of 2524 2636 g3837789.exe 33 PID 2636 wrote to memory of 2524 2636 g3837789.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b72642f104bdbb23c275c4e8f2504fc6.exe"C:\Users\Admin\AppData\Local\Temp\b72642f104bdbb23c275c4e8f2504fc6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 2687⤵
- Program crash
PID:2824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2524
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD5164355782ac23c32eef196edf5ce121a
SHA1a59c187df77b1c8f31e2ceb6dc3f07af301057e4
SHA256e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4
SHA512c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4
-
Filesize
840KB
MD5164355782ac23c32eef196edf5ce121a
SHA1a59c187df77b1c8f31e2ceb6dc3f07af301057e4
SHA256e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4
SHA512c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4
-
Filesize
562KB
MD5e6b78815b15658197cea978d533b44c3
SHA193532d5b2f66cc6277947e507d72d1fc6da94382
SHA2564b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870
SHA512e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47
-
Filesize
562KB
MD5e6b78815b15658197cea978d533b44c3
SHA193532d5b2f66cc6277947e507d72d1fc6da94382
SHA2564b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870
SHA512e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47
-
Filesize
396KB
MD54c87cbfe90a611e8ebcfeec5fd49599f
SHA1815c8243d2b1e96bd9b9d2dea976921a78ef60f1
SHA2567a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed
SHA51203251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0
-
Filesize
396KB
MD54c87cbfe90a611e8ebcfeec5fd49599f
SHA1815c8243d2b1e96bd9b9d2dea976921a78ef60f1
SHA2567a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed
SHA51203251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
840KB
MD5164355782ac23c32eef196edf5ce121a
SHA1a59c187df77b1c8f31e2ceb6dc3f07af301057e4
SHA256e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4
SHA512c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4
-
Filesize
840KB
MD5164355782ac23c32eef196edf5ce121a
SHA1a59c187df77b1c8f31e2ceb6dc3f07af301057e4
SHA256e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4
SHA512c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4
-
Filesize
562KB
MD5e6b78815b15658197cea978d533b44c3
SHA193532d5b2f66cc6277947e507d72d1fc6da94382
SHA2564b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870
SHA512e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47
-
Filesize
562KB
MD5e6b78815b15658197cea978d533b44c3
SHA193532d5b2f66cc6277947e507d72d1fc6da94382
SHA2564b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870
SHA512e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47
-
Filesize
396KB
MD54c87cbfe90a611e8ebcfeec5fd49599f
SHA1815c8243d2b1e96bd9b9d2dea976921a78ef60f1
SHA2567a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed
SHA51203251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0
-
Filesize
396KB
MD54c87cbfe90a611e8ebcfeec5fd49599f
SHA1815c8243d2b1e96bd9b9d2dea976921a78ef60f1
SHA2567a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed
SHA51203251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0