Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe
Resource
win10v2004-20230915-en
General
-
Target
e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe
-
Size
943KB
-
MD5
f8c9f189c9adeac0c51a6e9c0cc9cdea
-
SHA1
0638572d3888b679d1ac88988e41dbd3803a3c54
-
SHA256
e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3
-
SHA512
d3e8d86a8bf671584434acf877a643708e365eb2a2bcc46e66848129949437d1173acc7256b6bf36c9a49ae39dade893e09bc774ca4eb28eb6cecedc3e0b8673
-
SSDEEP
24576:8yCGjwTfuTosyfw8tEFvX8irbj1TAHAYE:rC4wTyosy1EtLL18HN
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 9 IoCs
resource yara_rule behavioral1/memory/2460-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2460-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2460-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2460-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2460-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2460-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2460-57-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2460-58-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2460-62-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2712 x8955268.exe 2900 x9164504.exe 2580 x9718197.exe 3000 g0482851.exe -
Loads dropped DLL 13 IoCs
pid Process 2076 e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe 2712 x8955268.exe 2712 x8955268.exe 2900 x9164504.exe 2900 x9164504.exe 2580 x9718197.exe 2580 x9718197.exe 2580 x9718197.exe 3000 g0482851.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8955268.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9164504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9718197.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3000 set thread context of 2460 3000 g0482851.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 2996 3000 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2712 2076 e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe 30 PID 2076 wrote to memory of 2712 2076 e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe 30 PID 2076 wrote to memory of 2712 2076 e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe 30 PID 2076 wrote to memory of 2712 2076 e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe 30 PID 2076 wrote to memory of 2712 2076 e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe 30 PID 2076 wrote to memory of 2712 2076 e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe 30 PID 2076 wrote to memory of 2712 2076 e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe 30 PID 2712 wrote to memory of 2900 2712 x8955268.exe 31 PID 2712 wrote to memory of 2900 2712 x8955268.exe 31 PID 2712 wrote to memory of 2900 2712 x8955268.exe 31 PID 2712 wrote to memory of 2900 2712 x8955268.exe 31 PID 2712 wrote to memory of 2900 2712 x8955268.exe 31 PID 2712 wrote to memory of 2900 2712 x8955268.exe 31 PID 2712 wrote to memory of 2900 2712 x8955268.exe 31 PID 2900 wrote to memory of 2580 2900 x9164504.exe 32 PID 2900 wrote to memory of 2580 2900 x9164504.exe 32 PID 2900 wrote to memory of 2580 2900 x9164504.exe 32 PID 2900 wrote to memory of 2580 2900 x9164504.exe 32 PID 2900 wrote to memory of 2580 2900 x9164504.exe 32 PID 2900 wrote to memory of 2580 2900 x9164504.exe 32 PID 2900 wrote to memory of 2580 2900 x9164504.exe 32 PID 2580 wrote to memory of 3000 2580 x9718197.exe 33 PID 2580 wrote to memory of 3000 2580 x9718197.exe 33 PID 2580 wrote to memory of 3000 2580 x9718197.exe 33 PID 2580 wrote to memory of 3000 2580 x9718197.exe 33 PID 2580 wrote to memory of 3000 2580 x9718197.exe 33 PID 2580 wrote to memory of 3000 2580 x9718197.exe 33 PID 2580 wrote to memory of 3000 2580 x9718197.exe 33 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2460 3000 g0482851.exe 34 PID 3000 wrote to memory of 2996 3000 g0482851.exe 35 PID 3000 wrote to memory of 2996 3000 g0482851.exe 35 PID 3000 wrote to memory of 2996 3000 g0482851.exe 35 PID 3000 wrote to memory of 2996 3000 g0482851.exe 35 PID 3000 wrote to memory of 2996 3000 g0482851.exe 35 PID 3000 wrote to memory of 2996 3000 g0482851.exe 35 PID 3000 wrote to memory of 2996 3000 g0482851.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe"C:\Users\Admin\AppData\Local\Temp\e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8955268.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8955268.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9164504.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9164504.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9718197.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9718197.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2996
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841KB
MD58d9f300a424d1fcf8e1279199dedbfd2
SHA1b5cb9f0d5dbe0299955c15f1021b295872b19d24
SHA2560e239991035dc9607729711575d10f6a25bfcefa8e3af2ffc0553a226909f4b1
SHA512c8003dbf1bee40dce762fdf1b25aec6eedf7deec21dc8f579de543c0f38e9b7b995d28616515340afff3a49b0f8243234723e6ac0191a2a9995b6d7268280901
-
Filesize
841KB
MD58d9f300a424d1fcf8e1279199dedbfd2
SHA1b5cb9f0d5dbe0299955c15f1021b295872b19d24
SHA2560e239991035dc9607729711575d10f6a25bfcefa8e3af2ffc0553a226909f4b1
SHA512c8003dbf1bee40dce762fdf1b25aec6eedf7deec21dc8f579de543c0f38e9b7b995d28616515340afff3a49b0f8243234723e6ac0191a2a9995b6d7268280901
-
Filesize
563KB
MD5a1aac906d1efc21d5461b08b0fa3f339
SHA18f8835c6c98c05feeb70d759e95130d19669d0e3
SHA256aadaddf72dc5ffff0668d37075bf4ab2774c485d23dd44dd0750cf7b0f27aff8
SHA5128cd4e2f24f42104ffacf8c85cc01922650a620d02f5e0dc13924c286ca202ab8b6be6093385da944185bf3d8b9cf1cb58b3203048ad405d20a56b0e525bd2e5d
-
Filesize
563KB
MD5a1aac906d1efc21d5461b08b0fa3f339
SHA18f8835c6c98c05feeb70d759e95130d19669d0e3
SHA256aadaddf72dc5ffff0668d37075bf4ab2774c485d23dd44dd0750cf7b0f27aff8
SHA5128cd4e2f24f42104ffacf8c85cc01922650a620d02f5e0dc13924c286ca202ab8b6be6093385da944185bf3d8b9cf1cb58b3203048ad405d20a56b0e525bd2e5d
-
Filesize
397KB
MD5b88ec0e3fb50cfd6ca8a9dffcb8c9906
SHA124b70ec0dc8f044f60881f8841bf0c027148c832
SHA25633e5f59c57d14ee10dd3364dc9188dc566524dcc7101f89eb818b927ec6c329c
SHA512aba314d93de9a7802dc18ae6329ecd73f8368ccac0de43483787776c984ea18cc1853871c5dd15dde26bdd4f293eeec79c14cb1af634fe6613c530b9db4a6ca8
-
Filesize
397KB
MD5b88ec0e3fb50cfd6ca8a9dffcb8c9906
SHA124b70ec0dc8f044f60881f8841bf0c027148c832
SHA25633e5f59c57d14ee10dd3364dc9188dc566524dcc7101f89eb818b927ec6c329c
SHA512aba314d93de9a7802dc18ae6329ecd73f8368ccac0de43483787776c984ea18cc1853871c5dd15dde26bdd4f293eeec79c14cb1af634fe6613c530b9db4a6ca8
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c
-
Filesize
841KB
MD58d9f300a424d1fcf8e1279199dedbfd2
SHA1b5cb9f0d5dbe0299955c15f1021b295872b19d24
SHA2560e239991035dc9607729711575d10f6a25bfcefa8e3af2ffc0553a226909f4b1
SHA512c8003dbf1bee40dce762fdf1b25aec6eedf7deec21dc8f579de543c0f38e9b7b995d28616515340afff3a49b0f8243234723e6ac0191a2a9995b6d7268280901
-
Filesize
841KB
MD58d9f300a424d1fcf8e1279199dedbfd2
SHA1b5cb9f0d5dbe0299955c15f1021b295872b19d24
SHA2560e239991035dc9607729711575d10f6a25bfcefa8e3af2ffc0553a226909f4b1
SHA512c8003dbf1bee40dce762fdf1b25aec6eedf7deec21dc8f579de543c0f38e9b7b995d28616515340afff3a49b0f8243234723e6ac0191a2a9995b6d7268280901
-
Filesize
563KB
MD5a1aac906d1efc21d5461b08b0fa3f339
SHA18f8835c6c98c05feeb70d759e95130d19669d0e3
SHA256aadaddf72dc5ffff0668d37075bf4ab2774c485d23dd44dd0750cf7b0f27aff8
SHA5128cd4e2f24f42104ffacf8c85cc01922650a620d02f5e0dc13924c286ca202ab8b6be6093385da944185bf3d8b9cf1cb58b3203048ad405d20a56b0e525bd2e5d
-
Filesize
563KB
MD5a1aac906d1efc21d5461b08b0fa3f339
SHA18f8835c6c98c05feeb70d759e95130d19669d0e3
SHA256aadaddf72dc5ffff0668d37075bf4ab2774c485d23dd44dd0750cf7b0f27aff8
SHA5128cd4e2f24f42104ffacf8c85cc01922650a620d02f5e0dc13924c286ca202ab8b6be6093385da944185bf3d8b9cf1cb58b3203048ad405d20a56b0e525bd2e5d
-
Filesize
397KB
MD5b88ec0e3fb50cfd6ca8a9dffcb8c9906
SHA124b70ec0dc8f044f60881f8841bf0c027148c832
SHA25633e5f59c57d14ee10dd3364dc9188dc566524dcc7101f89eb818b927ec6c329c
SHA512aba314d93de9a7802dc18ae6329ecd73f8368ccac0de43483787776c984ea18cc1853871c5dd15dde26bdd4f293eeec79c14cb1af634fe6613c530b9db4a6ca8
-
Filesize
397KB
MD5b88ec0e3fb50cfd6ca8a9dffcb8c9906
SHA124b70ec0dc8f044f60881f8841bf0c027148c832
SHA25633e5f59c57d14ee10dd3364dc9188dc566524dcc7101f89eb818b927ec6c329c
SHA512aba314d93de9a7802dc18ae6329ecd73f8368ccac0de43483787776c984ea18cc1853871c5dd15dde26bdd4f293eeec79c14cb1af634fe6613c530b9db4a6ca8
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c
-
Filesize
379KB
MD5e2c84222d2dae3ba62b5a4cb699a0976
SHA16fbc05125da0e193f04b5b6cba70251a0e1c3164
SHA2561037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3
SHA512645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c