Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe
Resource
win10v2004-20230915-en
General
-
Target
e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe
-
Size
928KB
-
MD5
70cb75d4a40cb285ab95e00e8348acfc
-
SHA1
8572fa8891ea828493b6c230f04e88c91ccd72c0
-
SHA256
e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27
-
SHA512
5c0c36c74b64590ec68d1a3394933086668298e1c43594288349a35f278cf95d9973a1c435fd12164d2d2e3df5149354ef45f8db6980220efd26f3bd46dac4fc
-
SSDEEP
24576:Syp3NfPsrDhJrxA7n/L33PzUqXXhBTJs9WSHF8IqJS1q:5p9fP+dJrxo/LHPzVnDlz
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2204 x3209738.exe 2636 x7789539.exe 2588 x1422453.exe 2840 g4500786.exe -
Loads dropped DLL 13 IoCs
pid Process 2124 e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe 2204 x3209738.exe 2204 x3209738.exe 2636 x7789539.exe 2636 x7789539.exe 2588 x1422453.exe 2588 x1422453.exe 2588 x1422453.exe 2840 g4500786.exe 2160 WerFault.exe 2160 WerFault.exe 2160 WerFault.exe 2160 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3209738.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7789539.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1422453.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2840 set thread context of 2456 2840 g4500786.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2160 2840 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2204 2124 e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe 28 PID 2124 wrote to memory of 2204 2124 e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe 28 PID 2124 wrote to memory of 2204 2124 e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe 28 PID 2124 wrote to memory of 2204 2124 e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe 28 PID 2124 wrote to memory of 2204 2124 e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe 28 PID 2124 wrote to memory of 2204 2124 e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe 28 PID 2124 wrote to memory of 2204 2124 e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe 28 PID 2204 wrote to memory of 2636 2204 x3209738.exe 29 PID 2204 wrote to memory of 2636 2204 x3209738.exe 29 PID 2204 wrote to memory of 2636 2204 x3209738.exe 29 PID 2204 wrote to memory of 2636 2204 x3209738.exe 29 PID 2204 wrote to memory of 2636 2204 x3209738.exe 29 PID 2204 wrote to memory of 2636 2204 x3209738.exe 29 PID 2204 wrote to memory of 2636 2204 x3209738.exe 29 PID 2636 wrote to memory of 2588 2636 x7789539.exe 30 PID 2636 wrote to memory of 2588 2636 x7789539.exe 30 PID 2636 wrote to memory of 2588 2636 x7789539.exe 30 PID 2636 wrote to memory of 2588 2636 x7789539.exe 30 PID 2636 wrote to memory of 2588 2636 x7789539.exe 30 PID 2636 wrote to memory of 2588 2636 x7789539.exe 30 PID 2636 wrote to memory of 2588 2636 x7789539.exe 30 PID 2588 wrote to memory of 2840 2588 x1422453.exe 31 PID 2588 wrote to memory of 2840 2588 x1422453.exe 31 PID 2588 wrote to memory of 2840 2588 x1422453.exe 31 PID 2588 wrote to memory of 2840 2588 x1422453.exe 31 PID 2588 wrote to memory of 2840 2588 x1422453.exe 31 PID 2588 wrote to memory of 2840 2588 x1422453.exe 31 PID 2588 wrote to memory of 2840 2588 x1422453.exe 31 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2456 2840 g4500786.exe 32 PID 2840 wrote to memory of 2160 2840 g4500786.exe 33 PID 2840 wrote to memory of 2160 2840 g4500786.exe 33 PID 2840 wrote to memory of 2160 2840 g4500786.exe 33 PID 2840 wrote to memory of 2160 2840 g4500786.exe 33 PID 2840 wrote to memory of 2160 2840 g4500786.exe 33 PID 2840 wrote to memory of 2160 2840 g4500786.exe 33 PID 2840 wrote to memory of 2160 2840 g4500786.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe"C:\Users\Admin\AppData\Local\Temp\e284c7dce287a6e32d40d7df2352017d7893e150485ea35f3b9c715758779d27.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3209738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3209738.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7789539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7789539.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1422453.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1422453.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4500786.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4500786.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2160
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD5d26e7efa061c106fa1023ae9d161e332
SHA1ad7c08b368a0b08d55783b15d0599be336efdcb5
SHA2563ccaa6d24e06b2c0699550b931a4af4a384927bce48aca2f2271a0f43e5bbe7d
SHA5120bf0abc00c6a937947f56d8b34fdf477070cc9ae32ac3aa64398b16aae6897b391a10b998192a8793c5003adde82219f7508da820c0a487fa61632a268abf855
-
Filesize
826KB
MD5d26e7efa061c106fa1023ae9d161e332
SHA1ad7c08b368a0b08d55783b15d0599be336efdcb5
SHA2563ccaa6d24e06b2c0699550b931a4af4a384927bce48aca2f2271a0f43e5bbe7d
SHA5120bf0abc00c6a937947f56d8b34fdf477070cc9ae32ac3aa64398b16aae6897b391a10b998192a8793c5003adde82219f7508da820c0a487fa61632a268abf855
-
Filesize
566KB
MD598b1da815d8a78778cc7445270c85b2a
SHA10861446abbb238040836c606e3d976e85ef0dfd2
SHA2560ceb2bcbe5bc7d6430a89ecdbd2bb34e97bb50f0817d76fd9b6d6d00087a2858
SHA512f19b174db823d4dc56d7bfa2f0c650f167c3723b597b9ecd37f7970186bd5ac1fb5143cc6c69739879f891a2d7fc1515daaa323da0332846f3664e7ad9040fb3
-
Filesize
566KB
MD598b1da815d8a78778cc7445270c85b2a
SHA10861446abbb238040836c606e3d976e85ef0dfd2
SHA2560ceb2bcbe5bc7d6430a89ecdbd2bb34e97bb50f0817d76fd9b6d6d00087a2858
SHA512f19b174db823d4dc56d7bfa2f0c650f167c3723b597b9ecd37f7970186bd5ac1fb5143cc6c69739879f891a2d7fc1515daaa323da0332846f3664e7ad9040fb3
-
Filesize
389KB
MD54fb7e6bd25d3e1bd543b1e32c86f747c
SHA174452757ed0667e90b3487401dfa1c9020ae0ea0
SHA2567d6cd881cd110a441b5876bff5355712fb6fdb70e1a0f92aad2b72dd882cab7a
SHA512b60e239b169cd8578ab44094ff1d2cbfdceeeacb97631530e85580a952b4976cf913cb26f7ab536660336f9d892b42c1916119a15685df796c8291d80f95a2e4
-
Filesize
389KB
MD54fb7e6bd25d3e1bd543b1e32c86f747c
SHA174452757ed0667e90b3487401dfa1c9020ae0ea0
SHA2567d6cd881cd110a441b5876bff5355712fb6fdb70e1a0f92aad2b72dd882cab7a
SHA512b60e239b169cd8578ab44094ff1d2cbfdceeeacb97631530e85580a952b4976cf913cb26f7ab536660336f9d892b42c1916119a15685df796c8291d80f95a2e4
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1
-
Filesize
826KB
MD5d26e7efa061c106fa1023ae9d161e332
SHA1ad7c08b368a0b08d55783b15d0599be336efdcb5
SHA2563ccaa6d24e06b2c0699550b931a4af4a384927bce48aca2f2271a0f43e5bbe7d
SHA5120bf0abc00c6a937947f56d8b34fdf477070cc9ae32ac3aa64398b16aae6897b391a10b998192a8793c5003adde82219f7508da820c0a487fa61632a268abf855
-
Filesize
826KB
MD5d26e7efa061c106fa1023ae9d161e332
SHA1ad7c08b368a0b08d55783b15d0599be336efdcb5
SHA2563ccaa6d24e06b2c0699550b931a4af4a384927bce48aca2f2271a0f43e5bbe7d
SHA5120bf0abc00c6a937947f56d8b34fdf477070cc9ae32ac3aa64398b16aae6897b391a10b998192a8793c5003adde82219f7508da820c0a487fa61632a268abf855
-
Filesize
566KB
MD598b1da815d8a78778cc7445270c85b2a
SHA10861446abbb238040836c606e3d976e85ef0dfd2
SHA2560ceb2bcbe5bc7d6430a89ecdbd2bb34e97bb50f0817d76fd9b6d6d00087a2858
SHA512f19b174db823d4dc56d7bfa2f0c650f167c3723b597b9ecd37f7970186bd5ac1fb5143cc6c69739879f891a2d7fc1515daaa323da0332846f3664e7ad9040fb3
-
Filesize
566KB
MD598b1da815d8a78778cc7445270c85b2a
SHA10861446abbb238040836c606e3d976e85ef0dfd2
SHA2560ceb2bcbe5bc7d6430a89ecdbd2bb34e97bb50f0817d76fd9b6d6d00087a2858
SHA512f19b174db823d4dc56d7bfa2f0c650f167c3723b597b9ecd37f7970186bd5ac1fb5143cc6c69739879f891a2d7fc1515daaa323da0332846f3664e7ad9040fb3
-
Filesize
389KB
MD54fb7e6bd25d3e1bd543b1e32c86f747c
SHA174452757ed0667e90b3487401dfa1c9020ae0ea0
SHA2567d6cd881cd110a441b5876bff5355712fb6fdb70e1a0f92aad2b72dd882cab7a
SHA512b60e239b169cd8578ab44094ff1d2cbfdceeeacb97631530e85580a952b4976cf913cb26f7ab536660336f9d892b42c1916119a15685df796c8291d80f95a2e4
-
Filesize
389KB
MD54fb7e6bd25d3e1bd543b1e32c86f747c
SHA174452757ed0667e90b3487401dfa1c9020ae0ea0
SHA2567d6cd881cd110a441b5876bff5355712fb6fdb70e1a0f92aad2b72dd882cab7a
SHA512b60e239b169cd8578ab44094ff1d2cbfdceeeacb97631530e85580a952b4976cf913cb26f7ab536660336f9d892b42c1916119a15685df796c8291d80f95a2e4
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1
-
Filesize
364KB
MD5cc832662dd3714a9c2adeda81dc99d3c
SHA1c25c303e8aad37bfa8b0ad5a026c8245acb17516
SHA2564d4fa84d64d521ef5fcc3fc29674cb96107582feaac452f403957da7ac007483
SHA5120eea500618192ff3fdc2c23542e314c0c5a458ed0f3a7621cbbec076ed01006236b172d0b38629511650581f1662effe5153f1d13bd85fdb70791e327f4832b1