Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
30068388548...96.exe
windows10-2004-x64
1013243e4dd5...33.exe
windows10-2004-x64
10202040bebe...98.exe
windows10-2004-x64
103a1c464610...ff.exe
windows10-2004-x64
10556fc723a7...10.exe
windows10-2004-x64
75eb8ed45ba...01.exe
windows10-2004-x64
10663bf6b48c...37.exe
windows10-2004-x64
767dbedea2e...69.exe
windows10-2004-x64
107e4d47aad3...11.exe
windows10-2004-x64
10820ec15efb...db.exe
windows10-2004-x64
1088a5b8b09a...44.exe
windows10-2004-x64
109c0f7f6495...f7.exe
windows10-2004-x64
10bd0a957eae...c0.exe
windows7-x64
10bd0a957eae...c0.exe
windows10-2004-x64
10c8e229c276...39.exe
windows10-2004-x64
10ca2534058c...e4.exe
windows10-2004-x64
10d0c5f92763...68.exe
windows10-2004-x64
10d3f2262a94...31.exe
windows10-2004-x64
10d40527d1f8...ed.exe
windows10-2004-x64
10de4076a039...c9.exe
windows10-2004-x64
10f80bd79907...93.exe
windows10-2004-x64
10Analysis
-
max time kernel
129s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
0068388548827b89762c020630c0e79519dedb7b7ff6c4f1c625aca59fbf5996.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
13243e4dd58e70de2748aff5360c6262fe2a6de7562acb1334b8a8adbb876f33.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
202040bebe757e0adc39d99b3d7327e79e0354b43f2a6c6fe0d1c1362d3e4198.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
3a1c464610d6f381fd4237273e1990d1b05567b780bacaa50c4d2462441faeff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
556fc723a7eab0f91113f11d7171070d3875bbfca8f5e2397500b5ee832c0310.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
5eb8ed45ba47d4135feaee11bbc17194ba1e8dfa693a293e370a7725fcfcd401.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
663bf6b48c7a6589e9a0bbabacbb8b22b1556f79bd63892788caae034d162437.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
67dbedea2ea23fd4fe189651241dd1489f71cf6bb5803d660d3d7ecd91ff5669.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
7e4d47aad3f9ebbd9422d69a7b96b1808810801c43b385031da5bd1472cbd411.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
820ec15efb9f2f70d27557121fc2619065a095a0db4a83720d911fc56bc7eedb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
88a5b8b09ad1e32abc7fce3415b25a2aa7be90802b17e91d650f6961ee4e8744.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d0c5f927631e1bb113c5cb5f1178cddd83c9fa595df60b9ffc903fe23c0bcb68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d40527d1f87af48fe58a0377e98e5eafc8b6f2ba2f0023257f76d0c61f1096ed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
de4076a0397d9f3a10c9a7ec7c19d95dd219e5330592bc236b71f5cea26f87c9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe
Resource
win10v2004-20240508-en
General
-
Target
d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe
-
Size
628KB
-
MD5
6340ed1fce00bcbde6403d9959542a3a
-
SHA1
f3388f75be6c3ae8a42145035d0d9167752d0fb4
-
SHA256
d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31
-
SHA512
86198d3184b33172adb74875dd5159c90fe51a83604b58ed9d150dff96757abb1dd4f45fd7076cf91e04fc2cb25bf1534af754521a47e1fd64fc1cc278c17a7d
-
SSDEEP
12288:tMrQy90kQIiE3Zs19zg/ShSbDoHH/ECPK46mb:RyIIiamvzUGSbMH8IX6mb
Malware Config
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral18/memory/5000-30-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral18/memory/5000-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral18/memory/5000-27-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral18/memory/464-20-0x0000000002C30000-0x0000000002C50000-memory.dmp net_reactor behavioral18/memory/464-22-0x00000000052D0000-0x00000000052EE000-memory.dmp net_reactor -
Executes dropped EXE 4 IoCs
pid Process 752 Ir7Fp32.exe 3308 1Kk43lc3.exe 2008 2qh0304.exe 920 3wW07DC.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ir7Fp32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3308 set thread context of 464 3308 1Kk43lc3.exe 97 PID 2008 set thread context of 5000 2008 2qh0304.exe 104 PID 920 set thread context of 2708 920 3wW07DC.exe 109 -
Program crash 3 IoCs
pid pid_target Process procid_target 3352 3308 WerFault.exe 86 2128 2008 WerFault.exe 102 2776 920 WerFault.exe 107 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 464 AppLaunch.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2168 wrote to memory of 752 2168 d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe 85 PID 2168 wrote to memory of 752 2168 d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe 85 PID 2168 wrote to memory of 752 2168 d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe 85 PID 752 wrote to memory of 3308 752 Ir7Fp32.exe 86 PID 752 wrote to memory of 3308 752 Ir7Fp32.exe 86 PID 752 wrote to memory of 3308 752 Ir7Fp32.exe 86 PID 3308 wrote to memory of 464 3308 1Kk43lc3.exe 97 PID 3308 wrote to memory of 464 3308 1Kk43lc3.exe 97 PID 3308 wrote to memory of 464 3308 1Kk43lc3.exe 97 PID 3308 wrote to memory of 464 3308 1Kk43lc3.exe 97 PID 3308 wrote to memory of 464 3308 1Kk43lc3.exe 97 PID 3308 wrote to memory of 464 3308 1Kk43lc3.exe 97 PID 3308 wrote to memory of 464 3308 1Kk43lc3.exe 97 PID 3308 wrote to memory of 464 3308 1Kk43lc3.exe 97 PID 3308 wrote to memory of 464 3308 1Kk43lc3.exe 97 PID 752 wrote to memory of 2008 752 Ir7Fp32.exe 102 PID 752 wrote to memory of 2008 752 Ir7Fp32.exe 102 PID 752 wrote to memory of 2008 752 Ir7Fp32.exe 102 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2008 wrote to memory of 5000 2008 2qh0304.exe 104 PID 2168 wrote to memory of 920 2168 d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe 107 PID 2168 wrote to memory of 920 2168 d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe 107 PID 2168 wrote to memory of 920 2168 d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe 107 PID 920 wrote to memory of 2708 920 3wW07DC.exe 109 PID 920 wrote to memory of 2708 920 3wW07DC.exe 109 PID 920 wrote to memory of 2708 920 3wW07DC.exe 109 PID 920 wrote to memory of 2708 920 3wW07DC.exe 109 PID 920 wrote to memory of 2708 920 3wW07DC.exe 109 PID 920 wrote to memory of 2708 920 3wW07DC.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe"C:\Users\Admin\AppData\Local\Temp\d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ir7Fp32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ir7Fp32.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Kk43lc3.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Kk43lc3.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 5564⤵
- Program crash
PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2qh0304.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2qh0304.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 1524⤵
- Program crash
PID:2128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3wW07DC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3wW07DC.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Checks SCSI registry key(s)
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 1483⤵
- Program crash
PID:2776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3308 -ip 33081⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2008 -ip 20081⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 920 -ip 9201⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD52e2abe3c6a4b20808050d8571eb68672
SHA1821f83eec008da00652d83f3453475992053434e
SHA256fb8610ee8cb2f5f8768118786ad3440fb43a42e4a702fa5497f6f0fca2613b4a
SHA512ea02d8ed93a34453f68ec61c00c305f4148ef59be4bbaea815862d38d8869714edad1ad61c8945ca1ab807c4a80f177747d0fba6ad5089f91bdcd42e7be3e6e0
-
Filesize
444KB
MD5e7c020b364e7d0c94bf02eb907759afa
SHA1f22b1826edd65e10d19543154ef20223014959da
SHA25679b4336019b89d2c06ccaf936af57e5d94d86758a39ebea0d9e6abd857a24f91
SHA512c8989337afd18dc17d9533eebe810c0650e97c39d1a057642fc78fd7934ef082e12570b8c0fec52e4435be221671eca6baa3c50a04f05abff43b2ba0abfea82c
-
Filesize
306KB
MD5cffbf89be9b8ebbba9a11ea60f0be22e
SHA186269fe003ca2411781daf149ea2d8b91503c663
SHA256824399351186817a2c12df4e401bcae384ce66add003c01e4a3a8e25e48b7b62
SHA5123690bdca96918ae9ed0baa7d564d0edbdc83ec996c126ff3fb88a160046b14b1de22043fc39e8bdb25f6d96f5cc866ebf58afe30506ba502dfa83a8a5ae4a273
-
Filesize
295KB
MD512036ab86b223897ef2855b2529cd36e
SHA1c07528b08964c6ef50001fa4546c0a6536ba2c5b
SHA2566fe508924f6064a34f0b10965fd868eced8b1ec47f5497f94eb6cfcdd75e4ece
SHA5121f5027e150edca3f869fba4692ea6eee9d3cf2119481c54f2912b1fbea6dd05c110fd15bdb9e392c3f5c39f4e2fa49775002c9a9c40b905da63dca57aa1618f4