Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 17:25

General

  • Target

    3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe

  • Size

    928KB

  • MD5

    aecfb0ac8ddfa8d08bfc6fb3de8d82cf

  • SHA1

    388d75f2dccb7ddd1ddac151efbb1de161cf61b6

  • SHA256

    3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819

  • SHA512

    a6b38820deca050742ce32bdb91d4f36a686513476f4b85e098e43a23596254b7998f06e5bd8dc7c69ce546889c46634b8c659ac62c77dd0c7a116a00b3df37a

  • SSDEEP

    24576:pyV2ELHT7A4JD1SW+qW3qhUxiannO9Jf:cVH3AGSWSAwGJ

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe
    "C:\Users\Admin\AppData\Local\Temp\3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280169.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280169.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5142417.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5142417.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4623423.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4623423.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2620
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2496
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2820
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 268
                    7⤵
                    • Program crash
                    PID:2928
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 288
                  6⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2748

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280169.exe

        Filesize

        826KB

        MD5

        c01e5ebc84110b2460078272c6904bf9

        SHA1

        c5b277a5ecf1dfc443f57da05bc8e195b62c36dd

        SHA256

        e4e94b867fc5fb6c82a319d3faa5ba95187287f62cae2ef4b0df6bdf3fbb449e

        SHA512

        181178ee9b0e99735a7261c4903d3f66384765af1e867c048a2feb4ca46efe114cb249ff3bd4b74d66511329f71ecf8162b90d64c08eebd31d1ef954adafdeb7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280169.exe

        Filesize

        826KB

        MD5

        c01e5ebc84110b2460078272c6904bf9

        SHA1

        c5b277a5ecf1dfc443f57da05bc8e195b62c36dd

        SHA256

        e4e94b867fc5fb6c82a319d3faa5ba95187287f62cae2ef4b0df6bdf3fbb449e

        SHA512

        181178ee9b0e99735a7261c4903d3f66384765af1e867c048a2feb4ca46efe114cb249ff3bd4b74d66511329f71ecf8162b90d64c08eebd31d1ef954adafdeb7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5142417.exe

        Filesize

        555KB

        MD5

        2fa89f2e4b0e14668ea12e73601c9a7a

        SHA1

        5700b19c0583678e267838f7f3a52018dca0b5aa

        SHA256

        9ac99e494441429a529bd823efb53d558f43334687d8a6863264bedb01ea9130

        SHA512

        57ea761177260f4d23385268e36afaab37b13bab3ab769ee6eda10d2f796e80bc1dd95de1dc0986012e6f7352f371097a2d9704e0c53e5976da976b01325c669

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5142417.exe

        Filesize

        555KB

        MD5

        2fa89f2e4b0e14668ea12e73601c9a7a

        SHA1

        5700b19c0583678e267838f7f3a52018dca0b5aa

        SHA256

        9ac99e494441429a529bd823efb53d558f43334687d8a6863264bedb01ea9130

        SHA512

        57ea761177260f4d23385268e36afaab37b13bab3ab769ee6eda10d2f796e80bc1dd95de1dc0986012e6f7352f371097a2d9704e0c53e5976da976b01325c669

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4623423.exe

        Filesize

        390KB

        MD5

        005bca875abba38e0dd3cd66bdb57356

        SHA1

        e927fe86c357fa038763b67658768372a28805c7

        SHA256

        33c8c70b6fd4d954a3b340d777c0ba83ba4584222cde1888576f4998db19817a

        SHA512

        8a1ec47045d183eec716d675332d95be0a3b890c1d36f466fdbecc3b92123d7e8a7ae5cb761d9a7009953d5e5f3c5cb85e4f99c16960e9db6b61f367510982d2

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4623423.exe

        Filesize

        390KB

        MD5

        005bca875abba38e0dd3cd66bdb57356

        SHA1

        e927fe86c357fa038763b67658768372a28805c7

        SHA256

        33c8c70b6fd4d954a3b340d777c0ba83ba4584222cde1888576f4998db19817a

        SHA512

        8a1ec47045d183eec716d675332d95be0a3b890c1d36f466fdbecc3b92123d7e8a7ae5cb761d9a7009953d5e5f3c5cb85e4f99c16960e9db6b61f367510982d2

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280169.exe

        Filesize

        826KB

        MD5

        c01e5ebc84110b2460078272c6904bf9

        SHA1

        c5b277a5ecf1dfc443f57da05bc8e195b62c36dd

        SHA256

        e4e94b867fc5fb6c82a319d3faa5ba95187287f62cae2ef4b0df6bdf3fbb449e

        SHA512

        181178ee9b0e99735a7261c4903d3f66384765af1e867c048a2feb4ca46efe114cb249ff3bd4b74d66511329f71ecf8162b90d64c08eebd31d1ef954adafdeb7

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280169.exe

        Filesize

        826KB

        MD5

        c01e5ebc84110b2460078272c6904bf9

        SHA1

        c5b277a5ecf1dfc443f57da05bc8e195b62c36dd

        SHA256

        e4e94b867fc5fb6c82a319d3faa5ba95187287f62cae2ef4b0df6bdf3fbb449e

        SHA512

        181178ee9b0e99735a7261c4903d3f66384765af1e867c048a2feb4ca46efe114cb249ff3bd4b74d66511329f71ecf8162b90d64c08eebd31d1ef954adafdeb7

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5142417.exe

        Filesize

        555KB

        MD5

        2fa89f2e4b0e14668ea12e73601c9a7a

        SHA1

        5700b19c0583678e267838f7f3a52018dca0b5aa

        SHA256

        9ac99e494441429a529bd823efb53d558f43334687d8a6863264bedb01ea9130

        SHA512

        57ea761177260f4d23385268e36afaab37b13bab3ab769ee6eda10d2f796e80bc1dd95de1dc0986012e6f7352f371097a2d9704e0c53e5976da976b01325c669

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5142417.exe

        Filesize

        555KB

        MD5

        2fa89f2e4b0e14668ea12e73601c9a7a

        SHA1

        5700b19c0583678e267838f7f3a52018dca0b5aa

        SHA256

        9ac99e494441429a529bd823efb53d558f43334687d8a6863264bedb01ea9130

        SHA512

        57ea761177260f4d23385268e36afaab37b13bab3ab769ee6eda10d2f796e80bc1dd95de1dc0986012e6f7352f371097a2d9704e0c53e5976da976b01325c669

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4623423.exe

        Filesize

        390KB

        MD5

        005bca875abba38e0dd3cd66bdb57356

        SHA1

        e927fe86c357fa038763b67658768372a28805c7

        SHA256

        33c8c70b6fd4d954a3b340d777c0ba83ba4584222cde1888576f4998db19817a

        SHA512

        8a1ec47045d183eec716d675332d95be0a3b890c1d36f466fdbecc3b92123d7e8a7ae5cb761d9a7009953d5e5f3c5cb85e4f99c16960e9db6b61f367510982d2

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4623423.exe

        Filesize

        390KB

        MD5

        005bca875abba38e0dd3cd66bdb57356

        SHA1

        e927fe86c357fa038763b67658768372a28805c7

        SHA256

        33c8c70b6fd4d954a3b340d777c0ba83ba4584222cde1888576f4998db19817a

        SHA512

        8a1ec47045d183eec716d675332d95be0a3b890c1d36f466fdbecc3b92123d7e8a7ae5cb761d9a7009953d5e5f3c5cb85e4f99c16960e9db6b61f367510982d2

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe

        Filesize

        364KB

        MD5

        c2b7cfee0f6b1a1ec59622651d8400d1

        SHA1

        5bbd79c6c7a9a2cc455597f68f045110991ff1c7

        SHA256

        dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a

        SHA512

        636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b

      • memory/2820-48-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2820-44-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2820-43-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2820-50-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2820-52-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2820-54-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2820-45-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2820-46-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/2820-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2820-47-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB