Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1PhishMaile...er.zip
windows7-x64
1PhishMaile...er.zip
windows10-2004-x64
1PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...ian.py
windows7-x64
3PhishMaile...ian.py
windows10-2004-x64
3PhishMaile...ian.py
windows7-x64
3PhishMaile...ian.py
windows10-2004-x64
3PhishMaile...ish.py
windows7-x64
3PhishMaile...ish.py
windows10-2004-x64
3PhishMaile...elp.py
windows7-x64
3PhishMaile...elp.py
windows10-2004-x64
3PhishMaile...ain.py
windows7-x64
3PhishMaile...ain.py
windows10-2004-x64
3PhishMaile...37.pyc
windows7-x64
3PhishMaile...37.pyc
windows10-2004-x64
3PhishMaile...37.pyc
windows7-x64
3PhishMaile...37.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...37.pyc
windows7-x64
3PhishMaile...37.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...37.pyc
windows7-x64
3PhishMaile...37.pyc
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
PhishMailer-master.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PhishMailer-master.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
PhishMailer-master/Core/Languages/__pycache__/italian.cpython-39.pyc
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
PhishMailer-master/Core/Languages/__pycache__/italian.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
PhishMailer-master/Core/Languages/__pycache__/russian.cpython-39.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
PhishMailer-master/Core/Languages/__pycache__/russian.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
PhishMailer-master/Core/Languages/__pycache__/spanish.cpython-39.pyc
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
PhishMailer-master/Core/Languages/__pycache__/spanish.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
PhishMailer-master/Core/Languages/italian.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
PhishMailer-master/Core/Languages/italian.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
PhishMailer-master/Core/Languages/russian.py
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
PhishMailer-master/Core/Languages/russian.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
PhishMailer-master/Core/Languages/spanish.py
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
PhishMailer-master/Core/Languages/spanish.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
PhishMailer-master/Core/Mailer/MailHelp.py
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
PhishMailer-master/Core/Mailer/MailHelp.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
PhishMailer-master/Core/Mailer/MailerMain.py
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
PhishMailer-master/Core/Mailer/MailerMain.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
PhishMailer-master/Core/Mailer/__pycache__/Internet_Check.cpython-37.pyc
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
PhishMailer-master/Core/Mailer/__pycache__/Internet_Check.cpython-37.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailHelp.cpython-37.pyc
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailHelp.cpython-37.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailHelp.cpython-39.pyc
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailHelp.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailerMain.cpython-39.pyc
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailerMain.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
PhishMailer-master/Core/Mailer/__pycache__/accountsaver.cpython-37.pyc
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
PhishMailer-master/Core/Mailer/__pycache__/accountsaver.cpython-37.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
PhishMailer-master/Core/Mailer/__pycache__/accountsaver.cpython-39.pyc
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
PhishMailer-master/Core/Mailer/__pycache__/accountsaver.cpython-39.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
PhishMailer-master/Core/Mailer/__pycache__/color.cpython-37.pyc
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
PhishMailer-master/Core/Mailer/__pycache__/color.cpython-37.pyc
Resource
win10v2004-20240426-en
General
-
Target
PhishMailer-master/Core/Mailer/MailHelp.py
-
Size
1KB
-
MD5
271f7d27ecea1d02809d7a735e92a058
-
SHA1
5fba38993212f775df7c981edbd2874ed6ec4f91
-
SHA256
e9ac1fe39e7606e69e4564e00af9595b4eb320473cf710afbb38eaf4c99639cc
-
SHA512
538931a95854009048cce5783567f54f5b178afe71398cb030c7ad25bdb37c99148be38d6175465d0489de0492da9de678566a91cddcc9b23626389b2020e9e2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 AcroRd32.exe 2552 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2680 2860 cmd.exe 29 PID 2860 wrote to memory of 2680 2860 cmd.exe 29 PID 2860 wrote to memory of 2680 2860 cmd.exe 29 PID 2680 wrote to memory of 2552 2680 rundll32.exe 30 PID 2680 wrote to memory of 2552 2680 rundll32.exe 30 PID 2680 wrote to memory of 2552 2680 rundll32.exe 30 PID 2680 wrote to memory of 2552 2680 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PhishMailer-master\Core\Mailer\MailHelp.py1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\PhishMailer-master\Core\Mailer\MailHelp.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PhishMailer-master\Core\Mailer\MailHelp.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56b965804add89741ec1d4ce6b8814097
SHA12eff5944c7e19d5944aec2f127e2c55bf9fcf1dc
SHA2566c84587bcd4e4ff33b19a4202edb682f0cb4bf7ac2ce50d6146637b88074ba9c
SHA512140ba0321a8ffac854c870eccf68bb30670bc17c0f62cfaeafbf996b826d85914471bb707ea26c16929e62379f5e99c9181d41a1c345ef7b6a0d525462a2ec1a