Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe
Resource
win10v2004-20230915-en
General
-
Target
d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe
-
Size
934KB
-
MD5
b8819997a74132370ddd92cc57a26969
-
SHA1
23fd7702316f1c4a9a1e0b7a44a9fd96d21a911b
-
SHA256
d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62
-
SHA512
73160cc685a6165f2d7305006bae5b3dbd54499c94bbd09ea9d692466192e1dcb4daba868c05adbc761b08149a14d03f3e478a0f45a7ce498b879ac500e30c65
-
SSDEEP
24576:FyJlmmXDP1rkCO5HOBS6lJ4LhYz8W135OF9wU:gJZ4RHkLYw13U
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2640-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-51-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-54-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-56-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2640-58-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 2564 x1817901.exe 2076 x5832306.exe 2636 x7212747.exe 2632 g0378297.exe -
Loads dropped DLL 13 IoCs
pid Process 2200 d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe 2564 x1817901.exe 2564 x1817901.exe 2076 x5832306.exe 2076 x5832306.exe 2636 x7212747.exe 2636 x7212747.exe 2636 x7212747.exe 2632 g0378297.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1817901.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5832306.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7212747.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2632 set thread context of 2640 2632 g0378297.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2536 2632 WerFault.exe 31 2544 2640 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2564 2200 d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe 28 PID 2200 wrote to memory of 2564 2200 d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe 28 PID 2200 wrote to memory of 2564 2200 d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe 28 PID 2200 wrote to memory of 2564 2200 d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe 28 PID 2200 wrote to memory of 2564 2200 d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe 28 PID 2200 wrote to memory of 2564 2200 d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe 28 PID 2200 wrote to memory of 2564 2200 d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe 28 PID 2564 wrote to memory of 2076 2564 x1817901.exe 29 PID 2564 wrote to memory of 2076 2564 x1817901.exe 29 PID 2564 wrote to memory of 2076 2564 x1817901.exe 29 PID 2564 wrote to memory of 2076 2564 x1817901.exe 29 PID 2564 wrote to memory of 2076 2564 x1817901.exe 29 PID 2564 wrote to memory of 2076 2564 x1817901.exe 29 PID 2564 wrote to memory of 2076 2564 x1817901.exe 29 PID 2076 wrote to memory of 2636 2076 x5832306.exe 30 PID 2076 wrote to memory of 2636 2076 x5832306.exe 30 PID 2076 wrote to memory of 2636 2076 x5832306.exe 30 PID 2076 wrote to memory of 2636 2076 x5832306.exe 30 PID 2076 wrote to memory of 2636 2076 x5832306.exe 30 PID 2076 wrote to memory of 2636 2076 x5832306.exe 30 PID 2076 wrote to memory of 2636 2076 x5832306.exe 30 PID 2636 wrote to memory of 2632 2636 x7212747.exe 31 PID 2636 wrote to memory of 2632 2636 x7212747.exe 31 PID 2636 wrote to memory of 2632 2636 x7212747.exe 31 PID 2636 wrote to memory of 2632 2636 x7212747.exe 31 PID 2636 wrote to memory of 2632 2636 x7212747.exe 31 PID 2636 wrote to memory of 2632 2636 x7212747.exe 31 PID 2636 wrote to memory of 2632 2636 x7212747.exe 31 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2632 wrote to memory of 2640 2632 g0378297.exe 32 PID 2640 wrote to memory of 2544 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 2544 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 2544 2640 AppLaunch.exe 34 PID 2632 wrote to memory of 2536 2632 g0378297.exe 33 PID 2632 wrote to memory of 2536 2632 g0378297.exe 33 PID 2632 wrote to memory of 2536 2632 g0378297.exe 33 PID 2640 wrote to memory of 2544 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 2544 2640 AppLaunch.exe 34 PID 2640 wrote to memory of 2544 2640 AppLaunch.exe 34 PID 2632 wrote to memory of 2536 2632 g0378297.exe 33 PID 2640 wrote to memory of 2544 2640 AppLaunch.exe 34 PID 2632 wrote to memory of 2536 2632 g0378297.exe 33 PID 2632 wrote to memory of 2536 2632 g0378297.exe 33 PID 2632 wrote to memory of 2536 2632 g0378297.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe"C:\Users\Admin\AppData\Local\Temp\d64417efc2f9cdac087ed24241c32ea6e972024ee7a05b6c5f1a001fd3534e62.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1817901.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1817901.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5832306.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5832306.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7212747.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7212747.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0378297.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0378297.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 2687⤵
- Program crash
PID:2544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2536
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD5b0c11903c66b7d130df0dae7d0c889be
SHA1976907351b1c18da48f6603d621275d5a3adece3
SHA25627cb85bb0c8d8345da94dacbd79620c5500f39000c3229b6fbfcfc35017033a8
SHA512f90962d069cf2f86651a47d46543a47d469b4732bd31847ffe3c9062cef00b866dd2c0d1f1033efefbb4aa8ccac74f77ba6d64b83c94553ecfaeb5ffc28fa11c
-
Filesize
832KB
MD5b0c11903c66b7d130df0dae7d0c889be
SHA1976907351b1c18da48f6603d621275d5a3adece3
SHA25627cb85bb0c8d8345da94dacbd79620c5500f39000c3229b6fbfcfc35017033a8
SHA512f90962d069cf2f86651a47d46543a47d469b4732bd31847ffe3c9062cef00b866dd2c0d1f1033efefbb4aa8ccac74f77ba6d64b83c94553ecfaeb5ffc28fa11c
-
Filesize
558KB
MD5b361e1beec16554711673e6d6b28a749
SHA11d65846efed9d51ea4501b4d1da2c1ee28bfa9f3
SHA256addb0f463047182f035e6c04ff4c3ff293ad494179ba9529b7e500b96c76de86
SHA512c4b8ea6f465f4e79c2b125a0f4ba5e96ac363ec48717bf4d1bbdce6790b90818af2b6822c676926a90e485543f62795cd869d951a6de3822e75325e94a8c5f7d
-
Filesize
558KB
MD5b361e1beec16554711673e6d6b28a749
SHA11d65846efed9d51ea4501b4d1da2c1ee28bfa9f3
SHA256addb0f463047182f035e6c04ff4c3ff293ad494179ba9529b7e500b96c76de86
SHA512c4b8ea6f465f4e79c2b125a0f4ba5e96ac363ec48717bf4d1bbdce6790b90818af2b6822c676926a90e485543f62795cd869d951a6de3822e75325e94a8c5f7d
-
Filesize
393KB
MD52f751196debb85ecbe9d79411b95786b
SHA119ed964768986c92e4a74d41fefb8c7838e07a05
SHA256eefb0e83dc501bb4dd7c8ae97c51916c21ede210c2e9c7cae2f61d7b99d46160
SHA5122cddc840d48f579bffd837674ba7f8f7a95c0cad1199f0bed762a40a61cd99859a15c1ceb118b39436c9a6fe333fca29dbaa0ff51718d4f4b53808ee1f45402a
-
Filesize
393KB
MD52f751196debb85ecbe9d79411b95786b
SHA119ed964768986c92e4a74d41fefb8c7838e07a05
SHA256eefb0e83dc501bb4dd7c8ae97c51916c21ede210c2e9c7cae2f61d7b99d46160
SHA5122cddc840d48f579bffd837674ba7f8f7a95c0cad1199f0bed762a40a61cd99859a15c1ceb118b39436c9a6fe333fca29dbaa0ff51718d4f4b53808ee1f45402a
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83
-
Filesize
832KB
MD5b0c11903c66b7d130df0dae7d0c889be
SHA1976907351b1c18da48f6603d621275d5a3adece3
SHA25627cb85bb0c8d8345da94dacbd79620c5500f39000c3229b6fbfcfc35017033a8
SHA512f90962d069cf2f86651a47d46543a47d469b4732bd31847ffe3c9062cef00b866dd2c0d1f1033efefbb4aa8ccac74f77ba6d64b83c94553ecfaeb5ffc28fa11c
-
Filesize
832KB
MD5b0c11903c66b7d130df0dae7d0c889be
SHA1976907351b1c18da48f6603d621275d5a3adece3
SHA25627cb85bb0c8d8345da94dacbd79620c5500f39000c3229b6fbfcfc35017033a8
SHA512f90962d069cf2f86651a47d46543a47d469b4732bd31847ffe3c9062cef00b866dd2c0d1f1033efefbb4aa8ccac74f77ba6d64b83c94553ecfaeb5ffc28fa11c
-
Filesize
558KB
MD5b361e1beec16554711673e6d6b28a749
SHA11d65846efed9d51ea4501b4d1da2c1ee28bfa9f3
SHA256addb0f463047182f035e6c04ff4c3ff293ad494179ba9529b7e500b96c76de86
SHA512c4b8ea6f465f4e79c2b125a0f4ba5e96ac363ec48717bf4d1bbdce6790b90818af2b6822c676926a90e485543f62795cd869d951a6de3822e75325e94a8c5f7d
-
Filesize
558KB
MD5b361e1beec16554711673e6d6b28a749
SHA11d65846efed9d51ea4501b4d1da2c1ee28bfa9f3
SHA256addb0f463047182f035e6c04ff4c3ff293ad494179ba9529b7e500b96c76de86
SHA512c4b8ea6f465f4e79c2b125a0f4ba5e96ac363ec48717bf4d1bbdce6790b90818af2b6822c676926a90e485543f62795cd869d951a6de3822e75325e94a8c5f7d
-
Filesize
393KB
MD52f751196debb85ecbe9d79411b95786b
SHA119ed964768986c92e4a74d41fefb8c7838e07a05
SHA256eefb0e83dc501bb4dd7c8ae97c51916c21ede210c2e9c7cae2f61d7b99d46160
SHA5122cddc840d48f579bffd837674ba7f8f7a95c0cad1199f0bed762a40a61cd99859a15c1ceb118b39436c9a6fe333fca29dbaa0ff51718d4f4b53808ee1f45402a
-
Filesize
393KB
MD52f751196debb85ecbe9d79411b95786b
SHA119ed964768986c92e4a74d41fefb8c7838e07a05
SHA256eefb0e83dc501bb4dd7c8ae97c51916c21ede210c2e9c7cae2f61d7b99d46160
SHA5122cddc840d48f579bffd837674ba7f8f7a95c0cad1199f0bed762a40a61cd99859a15c1ceb118b39436c9a6fe333fca29dbaa0ff51718d4f4b53808ee1f45402a
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83
-
Filesize
380KB
MD5780f86cf94115548d1b764c64fcbabda
SHA1ce1046b4eddf351bcd4ba7aea794b0158d1c4716
SHA256e74d8be5f9af33c159a61233d294535870d3a84ca0bdc965221bdcecb3ba5237
SHA5128dadf947b610c50e1e727f272d47e0565efc3f35dd9b4e3b5d4acfb0db8753e293f64266f89375f680c49ff885b30c19bd29980b473da0eb86001437fe85af83