Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 01:34

General

  • Target

    19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe

  • Size

    927KB

  • MD5

    cbae5f9680f83a68960c45b2daa763d8

  • SHA1

    428fc54e6d6c97f53fee2cbf052372f61e7fffcc

  • SHA256

    19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5

  • SHA512

    f6b98441c3f5b2c00e03e740cd679757ab061b2d2a1ea88c5efa81c3d5008e4b5a4a8b649dca0cd73a28ecc253d0d6b5f8852a88c508f7420e83c1a6d76d2026

  • SSDEEP

    24576:eyrlSPZN3a/0FBdjbY06dqag4+jm9u5jT:trlWj/fCp

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe
    "C:\Users\Admin\AppData\Local\Temp\19e4e574510ebc70c450efc7c86fcceebbe586f73023a565e32b7780f75c15b5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7129916.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7129916.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1871808.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1871808.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4825320.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4825320.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2640
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 272
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2496

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7129916.exe

      Filesize

      826KB

      MD5

      30b6a63464e5c3c721abfd7eb4412bb8

      SHA1

      45a11c3a7f3aa12282027ed8a147e0f96735c480

      SHA256

      86d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4

      SHA512

      2dafd947ceb398df19d7149cbc86688d72156693a3a02355b7aa34617de335a2dc2dd1f11b41bad5f66b0bbc99ac64503b3a250e494aa28f61fa4343d5c7dcdc

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7129916.exe

      Filesize

      826KB

      MD5

      30b6a63464e5c3c721abfd7eb4412bb8

      SHA1

      45a11c3a7f3aa12282027ed8a147e0f96735c480

      SHA256

      86d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4

      SHA512

      2dafd947ceb398df19d7149cbc86688d72156693a3a02355b7aa34617de335a2dc2dd1f11b41bad5f66b0bbc99ac64503b3a250e494aa28f61fa4343d5c7dcdc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1871808.exe

      Filesize

      566KB

      MD5

      2655eb8bb6336e1a109d925bf49f99bf

      SHA1

      e351f899a979849170a346ebf2245a5f1ad1f817

      SHA256

      17117bb6a2c105d513d666994b3e4d6bccf7f5ba7f29d1f5cfb92040990e3030

      SHA512

      2a054cd42b8859f074938db99c317e5e0529aafb0530eed0862426fc42936c85117e4dfbfc2d494e68442be954654cd2b763348ea67c7d21f4bc577e4f853c11

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1871808.exe

      Filesize

      566KB

      MD5

      2655eb8bb6336e1a109d925bf49f99bf

      SHA1

      e351f899a979849170a346ebf2245a5f1ad1f817

      SHA256

      17117bb6a2c105d513d666994b3e4d6bccf7f5ba7f29d1f5cfb92040990e3030

      SHA512

      2a054cd42b8859f074938db99c317e5e0529aafb0530eed0862426fc42936c85117e4dfbfc2d494e68442be954654cd2b763348ea67c7d21f4bc577e4f853c11

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4825320.exe

      Filesize

      390KB

      MD5

      1b8927b5bcb9ece169dfff99e02ca11e

      SHA1

      2eaa33329ab949ac94b4689ef99b07b270d673bd

      SHA256

      aa3f1499f10ea19b3a98ee86e30d5928c3503f1a545f69d5d7009e57cd58ae96

      SHA512

      20606206beaf9b345aefebc7b72d5a6725e1b112ac753a478f1a53cdfb9628d4ce3c8ae2e6122a98dfc1466d2956d09dadd6a4f055b92482a1aa180b7ff82988

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4825320.exe

      Filesize

      390KB

      MD5

      1b8927b5bcb9ece169dfff99e02ca11e

      SHA1

      2eaa33329ab949ac94b4689ef99b07b270d673bd

      SHA256

      aa3f1499f10ea19b3a98ee86e30d5928c3503f1a545f69d5d7009e57cd58ae96

      SHA512

      20606206beaf9b345aefebc7b72d5a6725e1b112ac753a478f1a53cdfb9628d4ce3c8ae2e6122a98dfc1466d2956d09dadd6a4f055b92482a1aa180b7ff82988

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7129916.exe

      Filesize

      826KB

      MD5

      30b6a63464e5c3c721abfd7eb4412bb8

      SHA1

      45a11c3a7f3aa12282027ed8a147e0f96735c480

      SHA256

      86d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4

      SHA512

      2dafd947ceb398df19d7149cbc86688d72156693a3a02355b7aa34617de335a2dc2dd1f11b41bad5f66b0bbc99ac64503b3a250e494aa28f61fa4343d5c7dcdc

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7129916.exe

      Filesize

      826KB

      MD5

      30b6a63464e5c3c721abfd7eb4412bb8

      SHA1

      45a11c3a7f3aa12282027ed8a147e0f96735c480

      SHA256

      86d4877badbdcb1c02fdb785b5cb78ec9c4f17f7845781fd0b7513dbfb2bbff4

      SHA512

      2dafd947ceb398df19d7149cbc86688d72156693a3a02355b7aa34617de335a2dc2dd1f11b41bad5f66b0bbc99ac64503b3a250e494aa28f61fa4343d5c7dcdc

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x1871808.exe

      Filesize

      566KB

      MD5

      2655eb8bb6336e1a109d925bf49f99bf

      SHA1

      e351f899a979849170a346ebf2245a5f1ad1f817

      SHA256

      17117bb6a2c105d513d666994b3e4d6bccf7f5ba7f29d1f5cfb92040990e3030

      SHA512

      2a054cd42b8859f074938db99c317e5e0529aafb0530eed0862426fc42936c85117e4dfbfc2d494e68442be954654cd2b763348ea67c7d21f4bc577e4f853c11

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x1871808.exe

      Filesize

      566KB

      MD5

      2655eb8bb6336e1a109d925bf49f99bf

      SHA1

      e351f899a979849170a346ebf2245a5f1ad1f817

      SHA256

      17117bb6a2c105d513d666994b3e4d6bccf7f5ba7f29d1f5cfb92040990e3030

      SHA512

      2a054cd42b8859f074938db99c317e5e0529aafb0530eed0862426fc42936c85117e4dfbfc2d494e68442be954654cd2b763348ea67c7d21f4bc577e4f853c11

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4825320.exe

      Filesize

      390KB

      MD5

      1b8927b5bcb9ece169dfff99e02ca11e

      SHA1

      2eaa33329ab949ac94b4689ef99b07b270d673bd

      SHA256

      aa3f1499f10ea19b3a98ee86e30d5928c3503f1a545f69d5d7009e57cd58ae96

      SHA512

      20606206beaf9b345aefebc7b72d5a6725e1b112ac753a478f1a53cdfb9628d4ce3c8ae2e6122a98dfc1466d2956d09dadd6a4f055b92482a1aa180b7ff82988

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4825320.exe

      Filesize

      390KB

      MD5

      1b8927b5bcb9ece169dfff99e02ca11e

      SHA1

      2eaa33329ab949ac94b4689ef99b07b270d673bd

      SHA256

      aa3f1499f10ea19b3a98ee86e30d5928c3503f1a545f69d5d7009e57cd58ae96

      SHA512

      20606206beaf9b345aefebc7b72d5a6725e1b112ac753a478f1a53cdfb9628d4ce3c8ae2e6122a98dfc1466d2956d09dadd6a4f055b92482a1aa180b7ff82988

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g4568712.exe

      Filesize

      364KB

      MD5

      3fa43f5059ef361430a721571a192cc2

      SHA1

      c7b9e7abec5dea32cbfc650def0a8c2dd2b7ad1c

      SHA256

      de9b8fd598e75ec8a5a65c0af51bfcb15b36932e96fec11f13f72543e9f10b42

      SHA512

      e1ae0cb13d0bdb9132ef046d036d1870251cefdd3943b80d596fa855048bd16c6e99e84a3dca81ddf9d0ebc0ebfd95122d13e482ad631824f9d4027bcc317abb

    • memory/2640-51-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-53-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-55-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2640-56-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-58-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-60-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-61-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-43-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-49-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-47-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-45-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2640-66-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB