Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 12:42

General

  • Target

    e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe

  • Size

    943KB

  • MD5

    f8c9f189c9adeac0c51a6e9c0cc9cdea

  • SHA1

    0638572d3888b679d1ac88988e41dbd3803a3c54

  • SHA256

    e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3

  • SHA512

    d3e8d86a8bf671584434acf877a643708e365eb2a2bcc46e66848129949437d1173acc7256b6bf36c9a49ae39dade893e09bc774ca4eb28eb6cecedc3e0b8673

  • SSDEEP

    24576:8yCGjwTfuTosyfw8tEFvX8irbj1TAHAYE:rC4wTyosy1EtLL18HN

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 9 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe
    "C:\Users\Admin\AppData\Local\Temp\e3acbca31ecca50cc50aabd49400d0db9ad75d8e8ed4559371859c9ecc1fa4e3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8955268.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8955268.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9164504.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9164504.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9718197.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9718197.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3000
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2460
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 272
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8955268.exe

      Filesize

      841KB

      MD5

      8d9f300a424d1fcf8e1279199dedbfd2

      SHA1

      b5cb9f0d5dbe0299955c15f1021b295872b19d24

      SHA256

      0e239991035dc9607729711575d10f6a25bfcefa8e3af2ffc0553a226909f4b1

      SHA512

      c8003dbf1bee40dce762fdf1b25aec6eedf7deec21dc8f579de543c0f38e9b7b995d28616515340afff3a49b0f8243234723e6ac0191a2a9995b6d7268280901

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8955268.exe

      Filesize

      841KB

      MD5

      8d9f300a424d1fcf8e1279199dedbfd2

      SHA1

      b5cb9f0d5dbe0299955c15f1021b295872b19d24

      SHA256

      0e239991035dc9607729711575d10f6a25bfcefa8e3af2ffc0553a226909f4b1

      SHA512

      c8003dbf1bee40dce762fdf1b25aec6eedf7deec21dc8f579de543c0f38e9b7b995d28616515340afff3a49b0f8243234723e6ac0191a2a9995b6d7268280901

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9164504.exe

      Filesize

      563KB

      MD5

      a1aac906d1efc21d5461b08b0fa3f339

      SHA1

      8f8835c6c98c05feeb70d759e95130d19669d0e3

      SHA256

      aadaddf72dc5ffff0668d37075bf4ab2774c485d23dd44dd0750cf7b0f27aff8

      SHA512

      8cd4e2f24f42104ffacf8c85cc01922650a620d02f5e0dc13924c286ca202ab8b6be6093385da944185bf3d8b9cf1cb58b3203048ad405d20a56b0e525bd2e5d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9164504.exe

      Filesize

      563KB

      MD5

      a1aac906d1efc21d5461b08b0fa3f339

      SHA1

      8f8835c6c98c05feeb70d759e95130d19669d0e3

      SHA256

      aadaddf72dc5ffff0668d37075bf4ab2774c485d23dd44dd0750cf7b0f27aff8

      SHA512

      8cd4e2f24f42104ffacf8c85cc01922650a620d02f5e0dc13924c286ca202ab8b6be6093385da944185bf3d8b9cf1cb58b3203048ad405d20a56b0e525bd2e5d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9718197.exe

      Filesize

      397KB

      MD5

      b88ec0e3fb50cfd6ca8a9dffcb8c9906

      SHA1

      24b70ec0dc8f044f60881f8841bf0c027148c832

      SHA256

      33e5f59c57d14ee10dd3364dc9188dc566524dcc7101f89eb818b927ec6c329c

      SHA512

      aba314d93de9a7802dc18ae6329ecd73f8368ccac0de43483787776c984ea18cc1853871c5dd15dde26bdd4f293eeec79c14cb1af634fe6613c530b9db4a6ca8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9718197.exe

      Filesize

      397KB

      MD5

      b88ec0e3fb50cfd6ca8a9dffcb8c9906

      SHA1

      24b70ec0dc8f044f60881f8841bf0c027148c832

      SHA256

      33e5f59c57d14ee10dd3364dc9188dc566524dcc7101f89eb818b927ec6c329c

      SHA512

      aba314d93de9a7802dc18ae6329ecd73f8368ccac0de43483787776c984ea18cc1853871c5dd15dde26bdd4f293eeec79c14cb1af634fe6613c530b9db4a6ca8

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8955268.exe

      Filesize

      841KB

      MD5

      8d9f300a424d1fcf8e1279199dedbfd2

      SHA1

      b5cb9f0d5dbe0299955c15f1021b295872b19d24

      SHA256

      0e239991035dc9607729711575d10f6a25bfcefa8e3af2ffc0553a226909f4b1

      SHA512

      c8003dbf1bee40dce762fdf1b25aec6eedf7deec21dc8f579de543c0f38e9b7b995d28616515340afff3a49b0f8243234723e6ac0191a2a9995b6d7268280901

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x8955268.exe

      Filesize

      841KB

      MD5

      8d9f300a424d1fcf8e1279199dedbfd2

      SHA1

      b5cb9f0d5dbe0299955c15f1021b295872b19d24

      SHA256

      0e239991035dc9607729711575d10f6a25bfcefa8e3af2ffc0553a226909f4b1

      SHA512

      c8003dbf1bee40dce762fdf1b25aec6eedf7deec21dc8f579de543c0f38e9b7b995d28616515340afff3a49b0f8243234723e6ac0191a2a9995b6d7268280901

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x9164504.exe

      Filesize

      563KB

      MD5

      a1aac906d1efc21d5461b08b0fa3f339

      SHA1

      8f8835c6c98c05feeb70d759e95130d19669d0e3

      SHA256

      aadaddf72dc5ffff0668d37075bf4ab2774c485d23dd44dd0750cf7b0f27aff8

      SHA512

      8cd4e2f24f42104ffacf8c85cc01922650a620d02f5e0dc13924c286ca202ab8b6be6093385da944185bf3d8b9cf1cb58b3203048ad405d20a56b0e525bd2e5d

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x9164504.exe

      Filesize

      563KB

      MD5

      a1aac906d1efc21d5461b08b0fa3f339

      SHA1

      8f8835c6c98c05feeb70d759e95130d19669d0e3

      SHA256

      aadaddf72dc5ffff0668d37075bf4ab2774c485d23dd44dd0750cf7b0f27aff8

      SHA512

      8cd4e2f24f42104ffacf8c85cc01922650a620d02f5e0dc13924c286ca202ab8b6be6093385da944185bf3d8b9cf1cb58b3203048ad405d20a56b0e525bd2e5d

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9718197.exe

      Filesize

      397KB

      MD5

      b88ec0e3fb50cfd6ca8a9dffcb8c9906

      SHA1

      24b70ec0dc8f044f60881f8841bf0c027148c832

      SHA256

      33e5f59c57d14ee10dd3364dc9188dc566524dcc7101f89eb818b927ec6c329c

      SHA512

      aba314d93de9a7802dc18ae6329ecd73f8368ccac0de43483787776c984ea18cc1853871c5dd15dde26bdd4f293eeec79c14cb1af634fe6613c530b9db4a6ca8

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9718197.exe

      Filesize

      397KB

      MD5

      b88ec0e3fb50cfd6ca8a9dffcb8c9906

      SHA1

      24b70ec0dc8f044f60881f8841bf0c027148c832

      SHA256

      33e5f59c57d14ee10dd3364dc9188dc566524dcc7101f89eb818b927ec6c329c

      SHA512

      aba314d93de9a7802dc18ae6329ecd73f8368ccac0de43483787776c984ea18cc1853871c5dd15dde26bdd4f293eeec79c14cb1af634fe6613c530b9db4a6ca8

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0482851.exe

      Filesize

      379KB

      MD5

      e2c84222d2dae3ba62b5a4cb699a0976

      SHA1

      6fbc05125da0e193f04b5b6cba70251a0e1c3164

      SHA256

      1037d8f032c6cf946a0aed9b87f7061475d4f3bdfb9c7830e6ff7227d46fddc3

      SHA512

      645550375a66d6ea6b85d073a3f25ca6149242e3bef8c01b9b89287570944609a49810bc794b1d2bd917df15614b73a1b7285e2b9d3e7533c0d6b827ce68935c

    • memory/2460-49-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-50-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-51-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2460-52-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-54-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-56-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-57-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-58-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-43-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-48-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-47-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-62-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2460-45-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB