Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe
Resource
win10v2004-20230915-en
General
-
Target
19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe
-
Size
927KB
-
MD5
cbae5f9680f83a68960c45b2daa763d8
-
SHA1
428fc54e6d6c97f53fee2cbf052372f61e7fffcc
-
SHA256
19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5
-
SHA512
f6b98441c3f5b2c00e03e740cd679757ab061b2d2a1ea88c5efa81c3d5008e4b5a4a8b649dca0cd73a28ecc253d0d6b5f8852a88c508f7420e83c1a6d76d2026
-
SSDEEP
24576:eyrlSPZN3a/0FBdjbY06dqag4+jm9u5jT:trlWj/fCp
Malware Config
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2408 x7129916.exe 3068 x1871808.exe 1720 x4825320.exe 2644 g4568712.exe -
Loads dropped DLL 13 IoCs
pid Process 2988 19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe 2408 x7129916.exe 2408 x7129916.exe 3068 x1871808.exe 3068 x1871808.exe 1720 x4825320.exe 1720 x4825320.exe 1720 x4825320.exe 2644 g4568712.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7129916.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1871808.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4825320.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 2640 2644 g4568712.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2496 2644 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2408 2988 19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe 28 PID 2988 wrote to memory of 2408 2988 19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe 28 PID 2988 wrote to memory of 2408 2988 19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe 28 PID 2988 wrote to memory of 2408 2988 19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe 28 PID 2988 wrote to memory of 2408 2988 19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe 28 PID 2988 wrote to memory of 2408 2988 19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe 28 PID 2988 wrote to memory of 2408 2988 19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe 28 PID 2408 wrote to memory of 3068 2408 x7129916.exe 29 PID 2408 wrote to memory of 3068 2408 x7129916.exe 29 PID 2408 wrote to memory of 3068 2408 x7129916.exe 29 PID 2408 wrote to memory of 3068 2408 x7129916.exe 29 PID 2408 wrote to memory of 3068 2408 x7129916.exe 29 PID 2408 wrote to memory of 3068 2408 x7129916.exe 29 PID 2408 wrote to memory of 3068 2408 x7129916.exe 29 PID 3068 wrote to memory of 1720 3068 x1871808.exe 30 PID 3068 wrote to memory of 1720 3068 x1871808.exe 30 PID 3068 wrote to memory of 1720 3068 x1871808.exe 30 PID 3068 wrote to memory of 1720 3068 x1871808.exe 30 PID 3068 wrote to memory of 1720 3068 x1871808.exe 30 PID 3068 wrote to memory of 1720 3068 x1871808.exe 30 PID 3068 wrote to memory of 1720 3068 x1871808.exe 30 PID 1720 wrote to memory of 2644 1720 x4825320.exe 31 PID 1720 wrote to memory of 2644 1720 x4825320.exe 31 PID 1720 wrote to memory of 2644 1720 x4825320.exe 31 PID 1720 wrote to memory of 2644 1720 x4825320.exe 31 PID 1720 wrote to memory of 2644 1720 x4825320.exe 31 PID 1720 wrote to memory of 2644 1720 x4825320.exe 31 PID 1720 wrote to memory of 2644 1720 x4825320.exe 31 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2640 2644 g4568712.exe 32 PID 2644 wrote to memory of 2496 2644 g4568712.exe 33 PID 2644 wrote to memory of 2496 2644 g4568712.exe 33 PID 2644 wrote to memory of 2496 2644 g4568712.exe 33 PID 2644 wrote to memory of 2496 2644 g4568712.exe 33 PID 2644 wrote to memory of 2496 2644 g4568712.exe 33 PID 2644 wrote to memory of 2496 2644 g4568712.exe 33 PID 2644 wrote to memory of 2496 2644 g4568712.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe"C:\Users\Admin\AppData\Local\Temp\19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7129916.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7129916.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1871808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1871808.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4825320.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4825320.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2496
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD530b6a63464e5c3c721abfd7eb4412bb8
SHA145a11c3a7f3aa12282027ed8a147e0f96735c480
SHA25686d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4
SHA5122dafd947ceb398df19d7149cbc86688d72156693a3a02355b7aa34617de335a2dc2dd1f11b41bad5f66b0bbc99ac64503b3a250e494aa28f61fa4343d5c7dcdc
-
Filesize
826KB
MD530b6a63464e5c3c721abfd7eb4412bb8
SHA145a11c3a7f3aa12282027ed8a147e0f96735c480
SHA25686d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4
SHA5122dafd947ceb398df19d7149cbc86688d72156693a3a02355b7aa34617de335a2dc2dd1f11b41bad5f66b0bbc99ac64503b3a250e494aa28f61fa4343d5c7dcdc
-
Filesize
566KB
MD52655eb8bb6336e1a109d925bf49f99bf
SHA1e351f899a979849170a346ebf2245a5f1ad1f817
SHA25617117bb6a2c105d513d666994b3e4d6bccf7f5ba7f29d1f5cfb92040990e3030
SHA5122a054cd42b8859f074938db99c317e5e0529aafb0530eed0862426fc42936c85117e4dfbfc2d494e68442be954654cd2b763348ea67c7d21f4bc577e4f853c11
-
Filesize
566KB
MD52655eb8bb6336e1a109d925bf49f99bf
SHA1e351f899a979849170a346ebf2245a5f1ad1f817
SHA25617117bb6a2c105d513d666994b3e4d6bccf7f5ba7f29d1f5cfb92040990e3030
SHA5122a054cd42b8859f074938db99c317e5e0529aafb0530eed0862426fc42936c85117e4dfbfc2d494e68442be954654cd2b763348ea67c7d21f4bc577e4f853c11
-
Filesize
390KB
MD51b8927b5bcb9ece169dfff99e02ca11e
SHA12eaa33329ab949ac94b4689ef99b07b270d673bd
SHA256aa3f1499f10ea19b3a98ee86e30d5928c3503f1a545f69d5d7009e57cd58ae96
SHA51220606206beaf9b345aefebc7b72d5a6725e1b112ac753a478f1a53cdfb9628d4ce3c8ae2e6122a98dfc1466d2956d09dadd6a4f055b92482a1aa180b7ff82988
-
Filesize
390KB
MD51b8927b5bcb9ece169dfff99e02ca11e
SHA12eaa33329ab949ac94b4689ef99b07b270d673bd
SHA256aa3f1499f10ea19b3a98ee86e30d5928c3503f1a545f69d5d7009e57cd58ae96
SHA51220606206beaf9b345aefebc7b72d5a6725e1b112ac753a478f1a53cdfb9628d4ce3c8ae2e6122a98dfc1466d2956d09dadd6a4f055b92482a1aa180b7ff82988
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb
-
Filesize
826KB
MD530b6a63464e5c3c721abfd7eb4412bb8
SHA145a11c3a7f3aa12282027ed8a147e0f96735c480
SHA25686d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4
SHA5122dafd947ceb398df19d7149cbc86688d72156693a3a02355b7aa34617de335a2dc2dd1f11b41bad5f66b0bbc99ac64503b3a250e494aa28f61fa4343d5c7dcdc
-
Filesize
826KB
MD530b6a63464e5c3c721abfd7eb4412bb8
SHA145a11c3a7f3aa12282027ed8a147e0f96735c480
SHA25686d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4
SHA5122dafd947ceb398df19d7149cbc86688d72156693a3a02355b7aa34617de335a2dc2dd1f11b41bad5f66b0bbc99ac64503b3a250e494aa28f61fa4343d5c7dcdc
-
Filesize
566KB
MD52655eb8bb6336e1a109d925bf49f99bf
SHA1e351f899a979849170a346ebf2245a5f1ad1f817
SHA25617117bb6a2c105d513d666994b3e4d6bccf7f5ba7f29d1f5cfb92040990e3030
SHA5122a054cd42b8859f074938db99c317e5e0529aafb0530eed0862426fc42936c85117e4dfbfc2d494e68442be954654cd2b763348ea67c7d21f4bc577e4f853c11
-
Filesize
566KB
MD52655eb8bb6336e1a109d925bf49f99bf
SHA1e351f899a979849170a346ebf2245a5f1ad1f817
SHA25617117bb6a2c105d513d666994b3e4d6bccf7f5ba7f29d1f5cfb92040990e3030
SHA5122a054cd42b8859f074938db99c317e5e0529aafb0530eed0862426fc42936c85117e4dfbfc2d494e68442be954654cd2b763348ea67c7d21f4bc577e4f853c11
-
Filesize
390KB
MD51b8927b5bcb9ece169dfff99e02ca11e
SHA12eaa33329ab949ac94b4689ef99b07b270d673bd
SHA256aa3f1499f10ea19b3a98ee86e30d5928c3503f1a545f69d5d7009e57cd58ae96
SHA51220606206beaf9b345aefebc7b72d5a6725e1b112ac753a478f1a53cdfb9628d4ce3c8ae2e6122a98dfc1466d2956d09dadd6a4f055b92482a1aa180b7ff82988
-
Filesize
390KB
MD51b8927b5bcb9ece169dfff99e02ca11e
SHA12eaa33329ab949ac94b4689ef99b07b270d673bd
SHA256aa3f1499f10ea19b3a98ee86e30d5928c3503f1a545f69d5d7009e57cd58ae96
SHA51220606206beaf9b345aefebc7b72d5a6725e1b112ac753a478f1a53cdfb9628d4ce3c8ae2e6122a98dfc1466d2956d09dadd6a4f055b92482a1aa180b7ff82988
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb
-
Filesize
364KB
MD53fa43f5059ef361430a721571a192cc2
SHA1c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c
SHA256de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42
SHA512e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb