Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe
-
Size
380KB
-
MD5
deb00d5604b57d3ecc002ad933797d65
-
SHA1
93230e5c30043faf9cdee3be2eb08b183422a1d2
-
SHA256
cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125
-
SHA512
31e797905a56d165cac827bba508cc657a2bce875dc0ec75127a9f5337abd43795c79afc001772af7fd9c5a20043a770fdd1a8d8a2d928fcf1d386cb6824983a
-
SSDEEP
6144:IlPphHX110KwTVSf3pOCq5b6uAOY6dWlEzKKmVz/U/T9Yc5LLPM8WEB9m/Eqwm:IlPf3110dVaUcu2Bkfmh/IFjMfEB9m/1
Malware Config
Signatures
-
Detect Mystic stealer payload 6 IoCs
resource yara_rule behavioral1/memory/2776-3-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2776-4-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2776-5-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2776-7-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2776-9-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral1/memory/2776-11-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 -
Program crash 2 IoCs
pid pid_target Process procid_target 2964 1732 WerFault.exe 27 1972 2776 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2776 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 28 PID 1732 wrote to memory of 2964 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 29 PID 1732 wrote to memory of 2964 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 29 PID 1732 wrote to memory of 2964 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 29 PID 1732 wrote to memory of 2964 1732 cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe 29 PID 2776 wrote to memory of 1972 2776 AppLaunch.exe 30 PID 2776 wrote to memory of 1972 2776 AppLaunch.exe 30 PID 2776 wrote to memory of 1972 2776 AppLaunch.exe 30 PID 2776 wrote to memory of 1972 2776 AppLaunch.exe 30 PID 2776 wrote to memory of 1972 2776 AppLaunch.exe 30 PID 2776 wrote to memory of 1972 2776 AppLaunch.exe 30 PID 2776 wrote to memory of 1972 2776 AppLaunch.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe"C:\Users\Admin\AppData\Local\Temp\cf09a17558905d397e58c039164d0b799c4e58a31219e05750ea12e463a6a125.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 1963⤵
- Program crash
PID:1972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 522⤵
- Program crash
PID:2964
-