Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 19:18
Behavioral task
behavioral1
Sample
8ff1de8c63d0371effcb63acefc36146.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ff1de8c63d0371effcb63acefc36146.exe
Resource
win10v2004-20231215-en
General
-
Target
8ff1de8c63d0371effcb63acefc36146.exe
-
Size
399KB
-
MD5
8ff1de8c63d0371effcb63acefc36146
-
SHA1
488cc3faf9d479d27bba20464781e24301a850fd
-
SHA256
cf54c3be9d27fb9863049cca6ef546f56e671c82f71c3e1e43c231fe3bb34065
-
SHA512
af94f9b9144f617b06f03af39d045346f3b45d6b39c2906d5e96647f5d3fcf5fea7f79c2b36d44501d80edef384229235de40f15f5428bcd717cb68c51968cc9
-
SSDEEP
12288:NPRkqdnxXhyJbwymTZbeGxlyibmB0HXYniWb:LHXhyJMbbeGCi6B03Yn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1344 Pmyria.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/files/0x002e000000016289-11.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Pmyria.exe 8ff1de8c63d0371effcb63acefc36146.exe File opened for modification C:\Windows\Pmyria.exe 8ff1de8c63d0371effcb63acefc36146.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Pmyria.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Pmyria.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 8ff1de8c63d0371effcb63acefc36146.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 8ff1de8c63d0371effcb63acefc36146.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main Pmyria.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe 1344 Pmyria.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2220 8ff1de8c63d0371effcb63acefc36146.exe 1344 Pmyria.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1344 2220 8ff1de8c63d0371effcb63acefc36146.exe 28 PID 2220 wrote to memory of 1344 2220 8ff1de8c63d0371effcb63acefc36146.exe 28 PID 2220 wrote to memory of 1344 2220 8ff1de8c63d0371effcb63acefc36146.exe 28 PID 2220 wrote to memory of 1344 2220 8ff1de8c63d0371effcb63acefc36146.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ff1de8c63d0371effcb63acefc36146.exe"C:\Users\Admin\AppData\Local\Temp\8ff1de8c63d0371effcb63acefc36146.exe"1⤵
- Drops file in Windows directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\Pmyria.exeC:\Windows\Pmyria.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD58ff1de8c63d0371effcb63acefc36146
SHA1488cc3faf9d479d27bba20464781e24301a850fd
SHA256cf54c3be9d27fb9863049cca6ef546f56e671c82f71c3e1e43c231fe3bb34065
SHA512af94f9b9144f617b06f03af39d045346f3b45d6b39c2906d5e96647f5d3fcf5fea7f79c2b36d44501d80edef384229235de40f15f5428bcd717cb68c51968cc9
-
Filesize
344B
MD533fa12a6645f5d7dfbb560191d023c67
SHA1a3cf3a84a57a46b14521ddd6c880bbf1148909d4
SHA256aec9d3760a89e8e16005e6ac1e8e38876772fab6251ffb71ff1b05b8ccd7a20a
SHA512bd7bec8b00785a3cbf1727a43c80fdecc2560aebd584da8734b5d57e801a1c3e8d46f131bb6b69088efe5e2bce5d398a14cbd96c710b78b8d1863463af5dea23