Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe
Resource
win10v2004-20230915-en
General
-
Target
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe
-
Size
928KB
-
MD5
aecfb0ac8ddfa8d08bfc6fb3de8d82cf
-
SHA1
388d75f2dccb7ddd1ddac151efbb1de161cf61b6
-
SHA256
3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819
-
SHA512
a6b38820deca050742ce32bdb91d4f36a686513476f4b85e098e43a23596254b7998f06e5bd8dc7c69ce546889c46634b8c659ac62c77dd0c7a116a00b3df37a
-
SSDEEP
24576:pyV2ELHT7A4JD1SW+qW3qhUxiannO9Jf:cVH3AGSWSAwGJ
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2820-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2820-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2820-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2820-50-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2820-52-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2820-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 944 x1280169.exe 764 x5142417.exe 2688 x4623423.exe 2596 g2611125.exe -
Loads dropped DLL 13 IoCs
pid Process 2572 3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe 944 x1280169.exe 944 x1280169.exe 764 x5142417.exe 764 x5142417.exe 2688 x4623423.exe 2688 x4623423.exe 2688 x4623423.exe 2596 g2611125.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5142417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4623423.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1280169.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2596 set thread context of 2820 2596 g2611125.exe 34 -
Program crash 2 IoCs
pid pid_target Process procid_target 2748 2596 WerFault.exe 31 2928 2820 WerFault.exe 34 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2572 wrote to memory of 944 2572 3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe 28 PID 2572 wrote to memory of 944 2572 3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe 28 PID 2572 wrote to memory of 944 2572 3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe 28 PID 2572 wrote to memory of 944 2572 3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe 28 PID 2572 wrote to memory of 944 2572 3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe 28 PID 2572 wrote to memory of 944 2572 3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe 28 PID 2572 wrote to memory of 944 2572 3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe 28 PID 944 wrote to memory of 764 944 x1280169.exe 29 PID 944 wrote to memory of 764 944 x1280169.exe 29 PID 944 wrote to memory of 764 944 x1280169.exe 29 PID 944 wrote to memory of 764 944 x1280169.exe 29 PID 944 wrote to memory of 764 944 x1280169.exe 29 PID 944 wrote to memory of 764 944 x1280169.exe 29 PID 944 wrote to memory of 764 944 x1280169.exe 29 PID 764 wrote to memory of 2688 764 x5142417.exe 30 PID 764 wrote to memory of 2688 764 x5142417.exe 30 PID 764 wrote to memory of 2688 764 x5142417.exe 30 PID 764 wrote to memory of 2688 764 x5142417.exe 30 PID 764 wrote to memory of 2688 764 x5142417.exe 30 PID 764 wrote to memory of 2688 764 x5142417.exe 30 PID 764 wrote to memory of 2688 764 x5142417.exe 30 PID 2688 wrote to memory of 2596 2688 x4623423.exe 31 PID 2688 wrote to memory of 2596 2688 x4623423.exe 31 PID 2688 wrote to memory of 2596 2688 x4623423.exe 31 PID 2688 wrote to memory of 2596 2688 x4623423.exe 31 PID 2688 wrote to memory of 2596 2688 x4623423.exe 31 PID 2688 wrote to memory of 2596 2688 x4623423.exe 31 PID 2688 wrote to memory of 2596 2688 x4623423.exe 31 PID 2596 wrote to memory of 2620 2596 g2611125.exe 32 PID 2596 wrote to memory of 2620 2596 g2611125.exe 32 PID 2596 wrote to memory of 2620 2596 g2611125.exe 32 PID 2596 wrote to memory of 2620 2596 g2611125.exe 32 PID 2596 wrote to memory of 2620 2596 g2611125.exe 32 PID 2596 wrote to memory of 2620 2596 g2611125.exe 32 PID 2596 wrote to memory of 2620 2596 g2611125.exe 32 PID 2596 wrote to memory of 2496 2596 g2611125.exe 33 PID 2596 wrote to memory of 2496 2596 g2611125.exe 33 PID 2596 wrote to memory of 2496 2596 g2611125.exe 33 PID 2596 wrote to memory of 2496 2596 g2611125.exe 33 PID 2596 wrote to memory of 2496 2596 g2611125.exe 33 PID 2596 wrote to memory of 2496 2596 g2611125.exe 33 PID 2596 wrote to memory of 2496 2596 g2611125.exe 33 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2596 wrote to memory of 2820 2596 g2611125.exe 34 PID 2820 wrote to memory of 2928 2820 AppLaunch.exe 36 PID 2820 wrote to memory of 2928 2820 AppLaunch.exe 36 PID 2820 wrote to memory of 2928 2820 AppLaunch.exe 36 PID 2820 wrote to memory of 2928 2820 AppLaunch.exe 36 PID 2820 wrote to memory of 2928 2820 AppLaunch.exe 36 PID 2820 wrote to memory of 2928 2820 AppLaunch.exe 36 PID 2820 wrote to memory of 2928 2820 AppLaunch.exe 36 PID 2596 wrote to memory of 2748 2596 g2611125.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe"C:\Users\Admin\AppData\Local\Temp\3b70b79d688fdb81d0a46581c15d1b7ac914f2bf6d5ed6482222a8822e4ca819.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280169.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1280169.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5142417.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5142417.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4623423.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4623423.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2611125.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2496
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 2687⤵
- Program crash
PID:2928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 2886⤵
- Loads dropped DLL
- Program crash
PID:2748
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD5c01e5ebc84110b2460078272c6904bf9
SHA1c5b277a5ecf1dfc443f57da05bc8e195b62c36dd
SHA256e4e94b867fc5fb6c82a319d3faa5ba95187287f62cae2ef4b0df6bdf3fbb449e
SHA512181178ee9b0e99735a7261c4903d3f66384765af1e867c048a2feb4ca46efe114cb249ff3bd4b74d66511329f71ecf8162b90d64c08eebd31d1ef954adafdeb7
-
Filesize
826KB
MD5c01e5ebc84110b2460078272c6904bf9
SHA1c5b277a5ecf1dfc443f57da05bc8e195b62c36dd
SHA256e4e94b867fc5fb6c82a319d3faa5ba95187287f62cae2ef4b0df6bdf3fbb449e
SHA512181178ee9b0e99735a7261c4903d3f66384765af1e867c048a2feb4ca46efe114cb249ff3bd4b74d66511329f71ecf8162b90d64c08eebd31d1ef954adafdeb7
-
Filesize
555KB
MD52fa89f2e4b0e14668ea12e73601c9a7a
SHA15700b19c0583678e267838f7f3a52018dca0b5aa
SHA2569ac99e494441429a529bd823efb53d558f43334687d8a6863264bedb01ea9130
SHA51257ea761177260f4d23385268e36afaab37b13bab3ab769ee6eda10d2f796e80bc1dd95de1dc0986012e6f7352f371097a2d9704e0c53e5976da976b01325c669
-
Filesize
555KB
MD52fa89f2e4b0e14668ea12e73601c9a7a
SHA15700b19c0583678e267838f7f3a52018dca0b5aa
SHA2569ac99e494441429a529bd823efb53d558f43334687d8a6863264bedb01ea9130
SHA51257ea761177260f4d23385268e36afaab37b13bab3ab769ee6eda10d2f796e80bc1dd95de1dc0986012e6f7352f371097a2d9704e0c53e5976da976b01325c669
-
Filesize
390KB
MD5005bca875abba38e0dd3cd66bdb57356
SHA1e927fe86c357fa038763b67658768372a28805c7
SHA25633c8c70b6fd4d954a3b340d777c0ba83ba4584222cde1888576f4998db19817a
SHA5128a1ec47045d183eec716d675332d95be0a3b890c1d36f466fdbecc3b92123d7e8a7ae5cb761d9a7009953d5e5f3c5cb85e4f99c16960e9db6b61f367510982d2
-
Filesize
390KB
MD5005bca875abba38e0dd3cd66bdb57356
SHA1e927fe86c357fa038763b67658768372a28805c7
SHA25633c8c70b6fd4d954a3b340d777c0ba83ba4584222cde1888576f4998db19817a
SHA5128a1ec47045d183eec716d675332d95be0a3b890c1d36f466fdbecc3b92123d7e8a7ae5cb761d9a7009953d5e5f3c5cb85e4f99c16960e9db6b61f367510982d2
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b
-
Filesize
826KB
MD5c01e5ebc84110b2460078272c6904bf9
SHA1c5b277a5ecf1dfc443f57da05bc8e195b62c36dd
SHA256e4e94b867fc5fb6c82a319d3faa5ba95187287f62cae2ef4b0df6bdf3fbb449e
SHA512181178ee9b0e99735a7261c4903d3f66384765af1e867c048a2feb4ca46efe114cb249ff3bd4b74d66511329f71ecf8162b90d64c08eebd31d1ef954adafdeb7
-
Filesize
826KB
MD5c01e5ebc84110b2460078272c6904bf9
SHA1c5b277a5ecf1dfc443f57da05bc8e195b62c36dd
SHA256e4e94b867fc5fb6c82a319d3faa5ba95187287f62cae2ef4b0df6bdf3fbb449e
SHA512181178ee9b0e99735a7261c4903d3f66384765af1e867c048a2feb4ca46efe114cb249ff3bd4b74d66511329f71ecf8162b90d64c08eebd31d1ef954adafdeb7
-
Filesize
555KB
MD52fa89f2e4b0e14668ea12e73601c9a7a
SHA15700b19c0583678e267838f7f3a52018dca0b5aa
SHA2569ac99e494441429a529bd823efb53d558f43334687d8a6863264bedb01ea9130
SHA51257ea761177260f4d23385268e36afaab37b13bab3ab769ee6eda10d2f796e80bc1dd95de1dc0986012e6f7352f371097a2d9704e0c53e5976da976b01325c669
-
Filesize
555KB
MD52fa89f2e4b0e14668ea12e73601c9a7a
SHA15700b19c0583678e267838f7f3a52018dca0b5aa
SHA2569ac99e494441429a529bd823efb53d558f43334687d8a6863264bedb01ea9130
SHA51257ea761177260f4d23385268e36afaab37b13bab3ab769ee6eda10d2f796e80bc1dd95de1dc0986012e6f7352f371097a2d9704e0c53e5976da976b01325c669
-
Filesize
390KB
MD5005bca875abba38e0dd3cd66bdb57356
SHA1e927fe86c357fa038763b67658768372a28805c7
SHA25633c8c70b6fd4d954a3b340d777c0ba83ba4584222cde1888576f4998db19817a
SHA5128a1ec47045d183eec716d675332d95be0a3b890c1d36f466fdbecc3b92123d7e8a7ae5cb761d9a7009953d5e5f3c5cb85e4f99c16960e9db6b61f367510982d2
-
Filesize
390KB
MD5005bca875abba38e0dd3cd66bdb57356
SHA1e927fe86c357fa038763b67658768372a28805c7
SHA25633c8c70b6fd4d954a3b340d777c0ba83ba4584222cde1888576f4998db19817a
SHA5128a1ec47045d183eec716d675332d95be0a3b890c1d36f466fdbecc3b92123d7e8a7ae5cb761d9a7009953d5e5f3c5cb85e4f99c16960e9db6b61f367510982d2
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b
-
Filesize
364KB
MD5c2b7cfee0f6b1a1ec59622651d8400d1
SHA15bbd79c6c7a9a2cc455597f68f045110991ff1c7
SHA256dd4b1dc4a9dc5f482947f035e307911b2d2a75ca5c9beb7022ded804011ba09a
SHA512636f25dec26ab5733f6655ed758212a654d3e8ed1da3af350d561d33781543f2d6e665eb0a4587f54a56a9d5b76a8c61c80edf86c4ff22df6d04c22fc1c2dc7b