Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 19:51

General

  • Target

    f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe

  • Size

    929KB

  • MD5

    03dbc56ad4fbd0943eabc90b51e2a48d

  • SHA1

    5e406541166bee80713c5d7d0841e8005ed66e5d

  • SHA256

    f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8

  • SHA512

    fc1fa11e8cf4d0b2536e471759b24dd6819e807d70d815bc9875fb82500526c6c24ac0284766e2c34b36737c945288d92d55f1d8d5d226efd8b542116f99974c

  • SSDEEP

    12288:OMrBy90UaIcWyX00FW87GLJNE/jnLsyBZtiRTIq4XwcfG30/TG:TyRyX00FW87GNE/jbBZYI9gTWG

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe
    "C:\Users\Admin\AppData\Local\Temp\f01e91d3435f42fc3461ee3c83939a565810698f0d103f0c0a3f93e1e8efc9d8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7587181.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7587181.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5183158.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5183158.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4828013.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4828013.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2744
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2600
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 268
                7⤵
                • Program crash
                PID:2668
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7587181.exe

    Filesize

    827KB

    MD5

    dae480b1caa3a3ff1a9edb6f794b299d

    SHA1

    0c54421b97247fffdc4c4e7efb5dc2c74a839034

    SHA256

    b99b77e4e147b23103b9aa81999e30a9f7c1150ef2c75cf10ea7cd61aa106e07

    SHA512

    d28840ef1df604b549346c0d9d67d51f6489d6b1af565cd1050f0a53418bb5edfaf0cdc447eb3e47152c4c539775799df9fc7b7fd409a5319a29ab822dc5bcfb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7587181.exe

    Filesize

    827KB

    MD5

    dae480b1caa3a3ff1a9edb6f794b299d

    SHA1

    0c54421b97247fffdc4c4e7efb5dc2c74a839034

    SHA256

    b99b77e4e147b23103b9aa81999e30a9f7c1150ef2c75cf10ea7cd61aa106e07

    SHA512

    d28840ef1df604b549346c0d9d67d51f6489d6b1af565cd1050f0a53418bb5edfaf0cdc447eb3e47152c4c539775799df9fc7b7fd409a5319a29ab822dc5bcfb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5183158.exe

    Filesize

    556KB

    MD5

    9a4137ac95a1fd86181a86bd90c01620

    SHA1

    bf0b53061413fc24a7c3b048758e6bb53f44e748

    SHA256

    7a47fcd18faa86262b60fd8106c8c423e4e74a0a0c9f7bb084a85ce68b5e653e

    SHA512

    7a6c7060feb83e766dcfcf144ba4e81b13aa1c9683f0e8d4345f5c0c23fb02c25c9c6d2a19687805274a2a5e61381af6da53353d748217b30035a121456c6146

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5183158.exe

    Filesize

    556KB

    MD5

    9a4137ac95a1fd86181a86bd90c01620

    SHA1

    bf0b53061413fc24a7c3b048758e6bb53f44e748

    SHA256

    7a47fcd18faa86262b60fd8106c8c423e4e74a0a0c9f7bb084a85ce68b5e653e

    SHA512

    7a6c7060feb83e766dcfcf144ba4e81b13aa1c9683f0e8d4345f5c0c23fb02c25c9c6d2a19687805274a2a5e61381af6da53353d748217b30035a121456c6146

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4828013.exe

    Filesize

    390KB

    MD5

    32b6def0ff9f7b53eff6d346493842ac

    SHA1

    b8175a9d71e633362cf2bbfe75215307258c428c

    SHA256

    11e9de0f073b56acb04eb1f8b22c3443cd2ea90281fd31dd664db89185e3f8f4

    SHA512

    1211e32a07cec321f0e36573c373a6068b5f2826aefb86c51c5a2b0bbd616b0ad0dfaa20664a91caefc001cb814450f1b38c93af6aec965e4c6f98562fca6bea

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4828013.exe

    Filesize

    390KB

    MD5

    32b6def0ff9f7b53eff6d346493842ac

    SHA1

    b8175a9d71e633362cf2bbfe75215307258c428c

    SHA256

    11e9de0f073b56acb04eb1f8b22c3443cd2ea90281fd31dd664db89185e3f8f4

    SHA512

    1211e32a07cec321f0e36573c373a6068b5f2826aefb86c51c5a2b0bbd616b0ad0dfaa20664a91caefc001cb814450f1b38c93af6aec965e4c6f98562fca6bea

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7587181.exe

    Filesize

    827KB

    MD5

    dae480b1caa3a3ff1a9edb6f794b299d

    SHA1

    0c54421b97247fffdc4c4e7efb5dc2c74a839034

    SHA256

    b99b77e4e147b23103b9aa81999e30a9f7c1150ef2c75cf10ea7cd61aa106e07

    SHA512

    d28840ef1df604b549346c0d9d67d51f6489d6b1af565cd1050f0a53418bb5edfaf0cdc447eb3e47152c4c539775799df9fc7b7fd409a5319a29ab822dc5bcfb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7587181.exe

    Filesize

    827KB

    MD5

    dae480b1caa3a3ff1a9edb6f794b299d

    SHA1

    0c54421b97247fffdc4c4e7efb5dc2c74a839034

    SHA256

    b99b77e4e147b23103b9aa81999e30a9f7c1150ef2c75cf10ea7cd61aa106e07

    SHA512

    d28840ef1df604b549346c0d9d67d51f6489d6b1af565cd1050f0a53418bb5edfaf0cdc447eb3e47152c4c539775799df9fc7b7fd409a5319a29ab822dc5bcfb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5183158.exe

    Filesize

    556KB

    MD5

    9a4137ac95a1fd86181a86bd90c01620

    SHA1

    bf0b53061413fc24a7c3b048758e6bb53f44e748

    SHA256

    7a47fcd18faa86262b60fd8106c8c423e4e74a0a0c9f7bb084a85ce68b5e653e

    SHA512

    7a6c7060feb83e766dcfcf144ba4e81b13aa1c9683f0e8d4345f5c0c23fb02c25c9c6d2a19687805274a2a5e61381af6da53353d748217b30035a121456c6146

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5183158.exe

    Filesize

    556KB

    MD5

    9a4137ac95a1fd86181a86bd90c01620

    SHA1

    bf0b53061413fc24a7c3b048758e6bb53f44e748

    SHA256

    7a47fcd18faa86262b60fd8106c8c423e4e74a0a0c9f7bb084a85ce68b5e653e

    SHA512

    7a6c7060feb83e766dcfcf144ba4e81b13aa1c9683f0e8d4345f5c0c23fb02c25c9c6d2a19687805274a2a5e61381af6da53353d748217b30035a121456c6146

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4828013.exe

    Filesize

    390KB

    MD5

    32b6def0ff9f7b53eff6d346493842ac

    SHA1

    b8175a9d71e633362cf2bbfe75215307258c428c

    SHA256

    11e9de0f073b56acb04eb1f8b22c3443cd2ea90281fd31dd664db89185e3f8f4

    SHA512

    1211e32a07cec321f0e36573c373a6068b5f2826aefb86c51c5a2b0bbd616b0ad0dfaa20664a91caefc001cb814450f1b38c93af6aec965e4c6f98562fca6bea

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4828013.exe

    Filesize

    390KB

    MD5

    32b6def0ff9f7b53eff6d346493842ac

    SHA1

    b8175a9d71e633362cf2bbfe75215307258c428c

    SHA256

    11e9de0f073b56acb04eb1f8b22c3443cd2ea90281fd31dd664db89185e3f8f4

    SHA512

    1211e32a07cec321f0e36573c373a6068b5f2826aefb86c51c5a2b0bbd616b0ad0dfaa20664a91caefc001cb814450f1b38c93af6aec965e4c6f98562fca6bea

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g6153228.exe

    Filesize

    364KB

    MD5

    c6c4f5d26866fb3cbe359509d4f69580

    SHA1

    61f83b97cd7220bb61dc12eb21e2bf60ebde313c

    SHA256

    25a40b068d88bd1e185c31c147bb332e62813220dfb11ec86bdfafd4271a5020

    SHA512

    4301987277f6cf77de746d62b0bf7d39e2bf541f0368697823a51938aae252fdbca22cc485e2905b09ba1f20c98cbdf96249b986ab482aab461f2a2223b0c9d6

  • memory/2600-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2600-50-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2600-49-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2600-51-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2600-53-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2600-55-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2600-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2600-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2600-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2600-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB