Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    259s
  • max time network
    320s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:12

General

  • Target

    504330db8b7d670f9fcde9039b4b8ca398861fe619ec4899bf559fee64b9c38a.exe

  • Size

    935KB

  • MD5

    fb85d20af246d1e6bf47d67e4afb76ef

  • SHA1

    13ccbe50a6d809bd6577dd52002bf81669381698

  • SHA256

    504330db8b7d670f9fcde9039b4b8ca398861fe619ec4899bf559fee64b9c38a

  • SHA512

    447aef6d1da95545d5e1f7beaa7eb58a25f1785044550a51bafff7b8bbfec5ad2e0e05967df7e65a3b9bc423d157671108c194410b675581c94b9ebbcb84eef6

  • SSDEEP

    24576:Ky/iFJOciGa7eVozSNUvTYZyxFRXqjIje:RaFJOciGa117YUx7H

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\504330db8b7d670f9fcde9039b4b8ca398861fe619ec4899bf559fee64b9c38a.exe
    "C:\Users\Admin\AppData\Local\Temp\504330db8b7d670f9fcde9039b4b8ca398861fe619ec4899bf559fee64b9c38a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7561768.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7561768.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8473714.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8473714.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8328444.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8328444.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:840
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2988
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 268
                7⤵
                • Program crash
                PID:3032
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7561768.exe

    Filesize

    833KB

    MD5

    8e14775f90b1b818b54f6b7b93724d6f

    SHA1

    3c09d95756154f5a75a5935de74fbaeb43ba8e96

    SHA256

    e21abc56354b83192fea599820d0afdfeb66805a09c9dd38f52d8e3de2c07d12

    SHA512

    54573eb210ad4df66fa61cc9a2913f743bd651907f84dfa6bb5fca849c78c4343776ae59d708d35cadd9ebe9b3a40463337f868f6bd014c9be04e6353249f8d4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7561768.exe

    Filesize

    833KB

    MD5

    8e14775f90b1b818b54f6b7b93724d6f

    SHA1

    3c09d95756154f5a75a5935de74fbaeb43ba8e96

    SHA256

    e21abc56354b83192fea599820d0afdfeb66805a09c9dd38f52d8e3de2c07d12

    SHA512

    54573eb210ad4df66fa61cc9a2913f743bd651907f84dfa6bb5fca849c78c4343776ae59d708d35cadd9ebe9b3a40463337f868f6bd014c9be04e6353249f8d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8473714.exe

    Filesize

    559KB

    MD5

    163a736cf7fd28099ab2795a04eacd85

    SHA1

    f3077521b74818389af2528e02b82a9c7ff31c05

    SHA256

    0823a0d1160cb436ff191acd8e2a5126b4cdda8723bb7dd629b42f68da1d5604

    SHA512

    d985e8b5e8584bba8f6df8bd6de4875bd2ff40c6c1e80ceae3dd761d6c752c33b104d3db74f12762dbf13a6f3ea94f69ac4ee6c94fc3c1c484f8aab702d95c0d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8473714.exe

    Filesize

    559KB

    MD5

    163a736cf7fd28099ab2795a04eacd85

    SHA1

    f3077521b74818389af2528e02b82a9c7ff31c05

    SHA256

    0823a0d1160cb436ff191acd8e2a5126b4cdda8723bb7dd629b42f68da1d5604

    SHA512

    d985e8b5e8584bba8f6df8bd6de4875bd2ff40c6c1e80ceae3dd761d6c752c33b104d3db74f12762dbf13a6f3ea94f69ac4ee6c94fc3c1c484f8aab702d95c0d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8328444.exe

    Filesize

    393KB

    MD5

    f63753cc2f8d2ba07e98b85c3f27ae2b

    SHA1

    3c4c52412a360396d000bced3b1b751b14955fcf

    SHA256

    63fa570aba773b78b28d0a18a6f6c6dfc39cebde528710660fc7a547a694b744

    SHA512

    8a2f0cda3724228e19e65d7e0624fccf6165aa505311585c749d847b1fd2628706965097df52f18cf4c462f78d053de61b44236da1a404bb8a42a8c1e05f078d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8328444.exe

    Filesize

    393KB

    MD5

    f63753cc2f8d2ba07e98b85c3f27ae2b

    SHA1

    3c4c52412a360396d000bced3b1b751b14955fcf

    SHA256

    63fa570aba773b78b28d0a18a6f6c6dfc39cebde528710660fc7a547a694b744

    SHA512

    8a2f0cda3724228e19e65d7e0624fccf6165aa505311585c749d847b1fd2628706965097df52f18cf4c462f78d053de61b44236da1a404bb8a42a8c1e05f078d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7561768.exe

    Filesize

    833KB

    MD5

    8e14775f90b1b818b54f6b7b93724d6f

    SHA1

    3c09d95756154f5a75a5935de74fbaeb43ba8e96

    SHA256

    e21abc56354b83192fea599820d0afdfeb66805a09c9dd38f52d8e3de2c07d12

    SHA512

    54573eb210ad4df66fa61cc9a2913f743bd651907f84dfa6bb5fca849c78c4343776ae59d708d35cadd9ebe9b3a40463337f868f6bd014c9be04e6353249f8d4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7561768.exe

    Filesize

    833KB

    MD5

    8e14775f90b1b818b54f6b7b93724d6f

    SHA1

    3c09d95756154f5a75a5935de74fbaeb43ba8e96

    SHA256

    e21abc56354b83192fea599820d0afdfeb66805a09c9dd38f52d8e3de2c07d12

    SHA512

    54573eb210ad4df66fa61cc9a2913f743bd651907f84dfa6bb5fca849c78c4343776ae59d708d35cadd9ebe9b3a40463337f868f6bd014c9be04e6353249f8d4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x8473714.exe

    Filesize

    559KB

    MD5

    163a736cf7fd28099ab2795a04eacd85

    SHA1

    f3077521b74818389af2528e02b82a9c7ff31c05

    SHA256

    0823a0d1160cb436ff191acd8e2a5126b4cdda8723bb7dd629b42f68da1d5604

    SHA512

    d985e8b5e8584bba8f6df8bd6de4875bd2ff40c6c1e80ceae3dd761d6c752c33b104d3db74f12762dbf13a6f3ea94f69ac4ee6c94fc3c1c484f8aab702d95c0d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x8473714.exe

    Filesize

    559KB

    MD5

    163a736cf7fd28099ab2795a04eacd85

    SHA1

    f3077521b74818389af2528e02b82a9c7ff31c05

    SHA256

    0823a0d1160cb436ff191acd8e2a5126b4cdda8723bb7dd629b42f68da1d5604

    SHA512

    d985e8b5e8584bba8f6df8bd6de4875bd2ff40c6c1e80ceae3dd761d6c752c33b104d3db74f12762dbf13a6f3ea94f69ac4ee6c94fc3c1c484f8aab702d95c0d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8328444.exe

    Filesize

    393KB

    MD5

    f63753cc2f8d2ba07e98b85c3f27ae2b

    SHA1

    3c4c52412a360396d000bced3b1b751b14955fcf

    SHA256

    63fa570aba773b78b28d0a18a6f6c6dfc39cebde528710660fc7a547a694b744

    SHA512

    8a2f0cda3724228e19e65d7e0624fccf6165aa505311585c749d847b1fd2628706965097df52f18cf4c462f78d053de61b44236da1a404bb8a42a8c1e05f078d

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8328444.exe

    Filesize

    393KB

    MD5

    f63753cc2f8d2ba07e98b85c3f27ae2b

    SHA1

    3c4c52412a360396d000bced3b1b751b14955fcf

    SHA256

    63fa570aba773b78b28d0a18a6f6c6dfc39cebde528710660fc7a547a694b744

    SHA512

    8a2f0cda3724228e19e65d7e0624fccf6165aa505311585c749d847b1fd2628706965097df52f18cf4c462f78d053de61b44236da1a404bb8a42a8c1e05f078d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8348269.exe

    Filesize

    380KB

    MD5

    565aca6182e662024cb89fb79483b47f

    SHA1

    a9b6ac9716a951db54494559f5beb582c76bddbf

    SHA256

    4dbb7469c1836faccb505c3f28ee11e94bbebeaccc8e896cc69ebde4e0e29be5

    SHA512

    5a1c8045231380a07c5d9afd042933d59cbfdbdcfa1702a9c599b279c0ed2d3e69256074d3c36cfa0f8f7e1d27f020335704a8d1168c90ad8c6fd295ea4d23e2

  • memory/2988-48-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2988-45-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2988-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2988-50-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2988-52-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2988-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2988-47-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2988-46-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2988-44-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2988-43-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB