Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe
Resource
win10v2004-20230915-en
General
-
Target
f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe
-
Size
929KB
-
MD5
03dbc56ad4fbd0943eabc90b51e2a48d
-
SHA1
5e406541166bee80713c5d7d0841e8005ed66e5d
-
SHA256
f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8
-
SHA512
fc1fa11e8cf4d0b2536e471759b24dd6819e807d70d815bc9875fb82500526c6c24ac0284766e2c34b36737c945288d92d55f1d8d5d226efd8b542116f99974c
-
SSDEEP
12288:OMrBy90UaIcWyX00FW87GLJNE/jnLsyBZtiRTIq4XwcfG30/TG:TyRyX00FW87GNE/jbBZYI9gTWG
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2600-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-48-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-51-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-53-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2600-55-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Executes dropped EXE 4 IoCs
pid Process 1724 x7587181.exe 2576 x5183158.exe 2052 x4828013.exe 2744 g6153228.exe -
Loads dropped DLL 13 IoCs
pid Process 3012 f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe 1724 x7587181.exe 1724 x7587181.exe 2576 x5183158.exe 2576 x5183158.exe 2052 x4828013.exe 2052 x4828013.exe 2052 x4828013.exe 2744 g6153228.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe 2612 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5183158.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4828013.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7587181.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2744 set thread context of 2600 2744 g6153228.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2612 2744 WerFault.exe 31 2668 2600 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1724 3012 f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe 28 PID 3012 wrote to memory of 1724 3012 f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe 28 PID 3012 wrote to memory of 1724 3012 f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe 28 PID 3012 wrote to memory of 1724 3012 f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe 28 PID 3012 wrote to memory of 1724 3012 f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe 28 PID 3012 wrote to memory of 1724 3012 f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe 28 PID 3012 wrote to memory of 1724 3012 f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe 28 PID 1724 wrote to memory of 2576 1724 x7587181.exe 29 PID 1724 wrote to memory of 2576 1724 x7587181.exe 29 PID 1724 wrote to memory of 2576 1724 x7587181.exe 29 PID 1724 wrote to memory of 2576 1724 x7587181.exe 29 PID 1724 wrote to memory of 2576 1724 x7587181.exe 29 PID 1724 wrote to memory of 2576 1724 x7587181.exe 29 PID 1724 wrote to memory of 2576 1724 x7587181.exe 29 PID 2576 wrote to memory of 2052 2576 x5183158.exe 30 PID 2576 wrote to memory of 2052 2576 x5183158.exe 30 PID 2576 wrote to memory of 2052 2576 x5183158.exe 30 PID 2576 wrote to memory of 2052 2576 x5183158.exe 30 PID 2576 wrote to memory of 2052 2576 x5183158.exe 30 PID 2576 wrote to memory of 2052 2576 x5183158.exe 30 PID 2576 wrote to memory of 2052 2576 x5183158.exe 30 PID 2052 wrote to memory of 2744 2052 x4828013.exe 31 PID 2052 wrote to memory of 2744 2052 x4828013.exe 31 PID 2052 wrote to memory of 2744 2052 x4828013.exe 31 PID 2052 wrote to memory of 2744 2052 x4828013.exe 31 PID 2052 wrote to memory of 2744 2052 x4828013.exe 31 PID 2052 wrote to memory of 2744 2052 x4828013.exe 31 PID 2052 wrote to memory of 2744 2052 x4828013.exe 31 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2600 2744 g6153228.exe 32 PID 2744 wrote to memory of 2612 2744 g6153228.exe 33 PID 2744 wrote to memory of 2612 2744 g6153228.exe 33 PID 2744 wrote to memory of 2612 2744 g6153228.exe 33 PID 2744 wrote to memory of 2612 2744 g6153228.exe 33 PID 2744 wrote to memory of 2612 2744 g6153228.exe 33 PID 2744 wrote to memory of 2612 2744 g6153228.exe 33 PID 2744 wrote to memory of 2612 2744 g6153228.exe 33 PID 2600 wrote to memory of 2668 2600 AppLaunch.exe 34 PID 2600 wrote to memory of 2668 2600 AppLaunch.exe 34 PID 2600 wrote to memory of 2668 2600 AppLaunch.exe 34 PID 2600 wrote to memory of 2668 2600 AppLaunch.exe 34 PID 2600 wrote to memory of 2668 2600 AppLaunch.exe 34 PID 2600 wrote to memory of 2668 2600 AppLaunch.exe 34 PID 2600 wrote to memory of 2668 2600 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe"C:\Users\Admin\AppData\Local\Temp\f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7587181.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7587181.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5183158.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5183158.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4828013.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4828013.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 2687⤵
- Program crash
PID:2668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2612
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5dae480b1caa3a3ff1a9edb6f794b299d
SHA10c54421b97247fffdc4c4e7efb5dc2c74a839034
SHA256b99b77e4e147b23103b9aa81999e30a9f7c1150ef2c75cf10ea7cd61aa106e07
SHA512d28840ef1df604b549346c0d9d67d51f6489d6b1af565cd1050f0a53418bb5edfaf0cdc447eb3e47152c4c539775799df9fc7b7fd409a5319a29ab822dc5bcfb
-
Filesize
827KB
MD5dae480b1caa3a3ff1a9edb6f794b299d
SHA10c54421b97247fffdc4c4e7efb5dc2c74a839034
SHA256b99b77e4e147b23103b9aa81999e30a9f7c1150ef2c75cf10ea7cd61aa106e07
SHA512d28840ef1df604b549346c0d9d67d51f6489d6b1af565cd1050f0a53418bb5edfaf0cdc447eb3e47152c4c539775799df9fc7b7fd409a5319a29ab822dc5bcfb
-
Filesize
556KB
MD59a4137ac95a1fd86181a86bd90c01620
SHA1bf0b53061413fc24a7c3b048758e6bb53f44e748
SHA2567a47fcd18faa86262b60fd8106c8c423e4e74a0a0c9f7bb084a85ce68b5e653e
SHA5127a6c7060feb83e766dcfcf144ba4e81b13aa1c9683f0e8d4345f5c0c23fb02c25c9c6d2a19687805274a2a5e61381af6da53353d748217b30035a121456c6146
-
Filesize
556KB
MD59a4137ac95a1fd86181a86bd90c01620
SHA1bf0b53061413fc24a7c3b048758e6bb53f44e748
SHA2567a47fcd18faa86262b60fd8106c8c423e4e74a0a0c9f7bb084a85ce68b5e653e
SHA5127a6c7060feb83e766dcfcf144ba4e81b13aa1c9683f0e8d4345f5c0c23fb02c25c9c6d2a19687805274a2a5e61381af6da53353d748217b30035a121456c6146
-
Filesize
390KB
MD532b6def0ff9f7b53eff6d346493842ac
SHA1b8175a9d71e633362cf2bbfe75215307258c428c
SHA25611e9de0f073b56acb04eb1f8b22c3443cd2ea90281fd31dd664db89185e3f8f4
SHA5121211e32a07cec321f0e36573c373a6068b5f2826aefb86c51c5a2b0bbd616b0ad0dfaa20664a91caefc001cb814450f1b38c93af6aec965e4c6f98562fca6bea
-
Filesize
390KB
MD532b6def0ff9f7b53eff6d346493842ac
SHA1b8175a9d71e633362cf2bbfe75215307258c428c
SHA25611e9de0f073b56acb04eb1f8b22c3443cd2ea90281fd31dd664db89185e3f8f4
SHA5121211e32a07cec321f0e36573c373a6068b5f2826aefb86c51c5a2b0bbd616b0ad0dfaa20664a91caefc001cb814450f1b38c93af6aec965e4c6f98562fca6bea
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6
-
Filesize
827KB
MD5dae480b1caa3a3ff1a9edb6f794b299d
SHA10c54421b97247fffdc4c4e7efb5dc2c74a839034
SHA256b99b77e4e147b23103b9aa81999e30a9f7c1150ef2c75cf10ea7cd61aa106e07
SHA512d28840ef1df604b549346c0d9d67d51f6489d6b1af565cd1050f0a53418bb5edfaf0cdc447eb3e47152c4c539775799df9fc7b7fd409a5319a29ab822dc5bcfb
-
Filesize
827KB
MD5dae480b1caa3a3ff1a9edb6f794b299d
SHA10c54421b97247fffdc4c4e7efb5dc2c74a839034
SHA256b99b77e4e147b23103b9aa81999e30a9f7c1150ef2c75cf10ea7cd61aa106e07
SHA512d28840ef1df604b549346c0d9d67d51f6489d6b1af565cd1050f0a53418bb5edfaf0cdc447eb3e47152c4c539775799df9fc7b7fd409a5319a29ab822dc5bcfb
-
Filesize
556KB
MD59a4137ac95a1fd86181a86bd90c01620
SHA1bf0b53061413fc24a7c3b048758e6bb53f44e748
SHA2567a47fcd18faa86262b60fd8106c8c423e4e74a0a0c9f7bb084a85ce68b5e653e
SHA5127a6c7060feb83e766dcfcf144ba4e81b13aa1c9683f0e8d4345f5c0c23fb02c25c9c6d2a19687805274a2a5e61381af6da53353d748217b30035a121456c6146
-
Filesize
556KB
MD59a4137ac95a1fd86181a86bd90c01620
SHA1bf0b53061413fc24a7c3b048758e6bb53f44e748
SHA2567a47fcd18faa86262b60fd8106c8c423e4e74a0a0c9f7bb084a85ce68b5e653e
SHA5127a6c7060feb83e766dcfcf144ba4e81b13aa1c9683f0e8d4345f5c0c23fb02c25c9c6d2a19687805274a2a5e61381af6da53353d748217b30035a121456c6146
-
Filesize
390KB
MD532b6def0ff9f7b53eff6d346493842ac
SHA1b8175a9d71e633362cf2bbfe75215307258c428c
SHA25611e9de0f073b56acb04eb1f8b22c3443cd2ea90281fd31dd664db89185e3f8f4
SHA5121211e32a07cec321f0e36573c373a6068b5f2826aefb86c51c5a2b0bbd616b0ad0dfaa20664a91caefc001cb814450f1b38c93af6aec965e4c6f98562fca6bea
-
Filesize
390KB
MD532b6def0ff9f7b53eff6d346493842ac
SHA1b8175a9d71e633362cf2bbfe75215307258c428c
SHA25611e9de0f073b56acb04eb1f8b22c3443cd2ea90281fd31dd664db89185e3f8f4
SHA5121211e32a07cec321f0e36573c373a6068b5f2826aefb86c51c5a2b0bbd616b0ad0dfaa20664a91caefc001cb814450f1b38c93af6aec965e4c6f98562fca6bea
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6
-
Filesize
364KB
MD5c6c4f5d26866fb3cbe359509d4f69580
SHA161f83b97cd7220bb61dc12eb21e2bf60ebde313c
SHA25625a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020
SHA5124301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6