Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1PhishMaile...er.zip
windows7-x64
1PhishMaile...er.zip
windows10-2004-x64
1PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...ian.py
windows7-x64
3PhishMaile...ian.py
windows10-2004-x64
3PhishMaile...ian.py
windows7-x64
3PhishMaile...ian.py
windows10-2004-x64
3PhishMaile...ish.py
windows7-x64
3PhishMaile...ish.py
windows10-2004-x64
3PhishMaile...elp.py
windows7-x64
3PhishMaile...elp.py
windows10-2004-x64
3PhishMaile...ain.py
windows7-x64
3PhishMaile...ain.py
windows10-2004-x64
3PhishMaile...37.pyc
windows7-x64
3PhishMaile...37.pyc
windows10-2004-x64
3PhishMaile...37.pyc
windows7-x64
3PhishMaile...37.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...37.pyc
windows7-x64
3PhishMaile...37.pyc
windows10-2004-x64
3PhishMaile...39.pyc
windows7-x64
3PhishMaile...39.pyc
windows10-2004-x64
3PhishMaile...37.pyc
windows7-x64
3PhishMaile...37.pyc
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
PhishMailer-master.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PhishMailer-master.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
PhishMailer-master/Core/Languages/__pycache__/italian.cpython-39.pyc
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
PhishMailer-master/Core/Languages/__pycache__/italian.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
PhishMailer-master/Core/Languages/__pycache__/russian.cpython-39.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
PhishMailer-master/Core/Languages/__pycache__/russian.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
PhishMailer-master/Core/Languages/__pycache__/spanish.cpython-39.pyc
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
PhishMailer-master/Core/Languages/__pycache__/spanish.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
PhishMailer-master/Core/Languages/italian.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
PhishMailer-master/Core/Languages/italian.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
PhishMailer-master/Core/Languages/russian.py
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
PhishMailer-master/Core/Languages/russian.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
PhishMailer-master/Core/Languages/spanish.py
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
PhishMailer-master/Core/Languages/spanish.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
PhishMailer-master/Core/Mailer/MailHelp.py
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
PhishMailer-master/Core/Mailer/MailHelp.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
PhishMailer-master/Core/Mailer/MailerMain.py
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
PhishMailer-master/Core/Mailer/MailerMain.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
PhishMailer-master/Core/Mailer/__pycache__/Internet_Check.cpython-37.pyc
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
PhishMailer-master/Core/Mailer/__pycache__/Internet_Check.cpython-37.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailHelp.cpython-37.pyc
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailHelp.cpython-37.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailHelp.cpython-39.pyc
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailHelp.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailerMain.cpython-39.pyc
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
PhishMailer-master/Core/Mailer/__pycache__/MailerMain.cpython-39.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
PhishMailer-master/Core/Mailer/__pycache__/accountsaver.cpython-37.pyc
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
PhishMailer-master/Core/Mailer/__pycache__/accountsaver.cpython-37.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
PhishMailer-master/Core/Mailer/__pycache__/accountsaver.cpython-39.pyc
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
PhishMailer-master/Core/Mailer/__pycache__/accountsaver.cpython-39.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
PhishMailer-master/Core/Mailer/__pycache__/color.cpython-37.pyc
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
PhishMailer-master/Core/Mailer/__pycache__/color.cpython-37.pyc
Resource
win10v2004-20240426-en
General
-
Target
PhishMailer-master/Core/Languages/__pycache__/russian.cpython-39.pyc
-
Size
44KB
-
MD5
da9d7774dfd66a794f08b2563ee1b18f
-
SHA1
0047db9acffd95fe1fada24659402a84aa17a042
-
SHA256
88838e7b59478cedfbfcf50328f5022fc93bc729e22c29510d4574739f8eb042
-
SHA512
01ef410827812466be89b853653cbed6051c10e8a1e22ebe0679390ddb7db661b951029b69ea1d3ade1f1b663e2c78f32a73f8a3bdd91e464d2308765208bc05
-
SSDEEP
768:hcmo+7YetRvpph+cEdJ82fFTo1jXoKYre8M7rReGs:hcmoiYetRvpph+c8J82tMjce8M71ls
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4640 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PhishMailer-master\Core\Languages\__pycache__\russian.cpython-39.pyc1⤵
- Modifies registry class
PID:3508
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4640