Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
AhMyth_Win64.exe
Resource
win10v2004-20240709-en
General
-
Target
AhMyth_Win64.exe
-
Size
54.8MB
-
MD5
5a2e207f206b6a8567a04c7500254ce4
-
SHA1
0cf550d7275dce19c3ce20d77d0d49128624863d
-
SHA256
d058c9315fc0f28741570907ab4e13f8c368e4012a459976560adacf4e4c2b68
-
SHA512
ba925c12ea239ab90a42d0bc2a313818945f0b61233733cea68da4500c313f5514b784cdd996e98590379117f811fee8803d945ca1039ce5ffc941bfdb0a662f
-
SSDEEP
786432:SCPHEBZ+uqZLC2VYegaPk/60foYstnmPpMRcDCjIq3CO5sBKW0xIngly/hIKfeZy:ZkB6Y5ac/FAYVRDEp5nW7glQeoVvJ6y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3412 AhMyth.exe 4080 AhMyth.exe 2296 AhMyth.exe -
Loads dropped DLL 15 IoCs
pid Process 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3412 AhMyth.exe 3412 AhMyth.exe 4080 AhMyth.exe 4080 AhMyth.exe 2296 AhMyth.exe 2296 AhMyth.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C AhMyth.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 AhMyth.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 AhMyth.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe 3504 AhMyth_Win64.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 3504 AhMyth_Win64.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3412 AhMyth.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3504 wrote to memory of 3412 3504 AhMyth_Win64.exe 87 PID 3504 wrote to memory of 3412 3504 AhMyth_Win64.exe 87 PID 3412 wrote to memory of 4080 3412 AhMyth.exe 89 PID 3412 wrote to memory of 4080 3412 AhMyth.exe 89 PID 3412 wrote to memory of 2296 3412 AhMyth.exe 90 PID 3412 wrote to memory of 2296 3412 AhMyth.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\AhMyth_Win64.exe"C:\Users\Admin\AppData\Local\Temp\AhMyth_Win64.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Programs\AhMyth\AhMyth.exe"C:\Users\Admin\AppData\Local\Programs\AhMyth\AhMyth.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Programs\AhMyth\AhMyth.exe"C:\Users\Admin\AppData\Local\Programs\AhMyth\AhMyth.exe" --type=renderer --no-sandbox --primordial-pipe-token=B2D04EEC297B7C82818FB19B5C28EFAE --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Programs\AhMyth\resources\app.asar" --node-integration=true --hidden-page --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --service-request-channel-token=B2D04EEC297B7C82818FB19B5C28EFAE --renderer-client-id=3 --mojo-platform-channel-handle=1920 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4080
-
-
C:\Users\Admin\AppData\Local\Programs\AhMyth\AhMyth.exe"C:\Users\Admin\AppData\Local\Programs\AhMyth\AhMyth.exe" --type=renderer --no-sandbox --primordial-pipe-token=0D0D4EE3D61F394478BE1B6EFECC975F --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Programs\AhMyth\resources\app.asar" --node-integration=true --hidden-page --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --service-request-channel-token=0D0D4EE3D61F394478BE1B6EFECC975F --renderer-client-id=5 --mojo-platform-channel-handle=1952 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD561cebc61b4d0f7e29564b340311e5478
SHA1c374d753d938281ab2f3d9f7fd454d8542832dc4
SHA2561c4f11111f9c40f0a85a4854fa3fa7e112deb27b6aaad1388eb9e1427d550692
SHA5120dd56cde910ee3ad1a3833ed82e753b67df638bdcd9da3135bc97a9bb8d170bc19fd772d07588883a2f881203bb3e752660edaed00f5df433376a8be28b3cb85
-
Filesize
15B
MD57c321056f805aabd5a503821fa1994cd
SHA19c690875c9189c66c93ebd4c0971739653bccd19
SHA256261e6aad3ad0a5f608b5694919ee39026c4c3eb4256540068f7c1aa46be9315a
SHA5128a5f4b3726e4513251475ac470f86f0daa0d5ae42bb750019ce96ed871cb04a7391cea2cef79e67c585e3a982041575e60d0f79b3a5bb9ad09be53362787f090
-
Filesize
9.6MB
MD588876a5c274ffcc61bb037f7b6831313
SHA1d36bb2541bb1ec302537be9dd3454e5def2400ce
SHA256e20a142f2bb0f9016d5e9b948d37ae49f4d8a2c8b4059ac162ea12d2cc4a62c1
SHA5124fc8e473e6bf57ff6fe19f1c25f2e22ed049dbbccca88867ecd1110fd45e3e74c3bc5cb7f052f891de600fec13a1eb0d2c4b48f008d6e5d7102a21096698dcc9
-
Filesize
2.0MB
MD5caed9da78248005149b7c8d96bd1b978
SHA1199109bfbc23183a954f83105d9285e2901a9a70
SHA256fb6f30a5aa7cee76db426cf590114850c7d2a78532c6725217d53132a3ba187c
SHA512b112a3664b5e187b00e739deff640ec2ac85df012365fdb9749595e5b1ac47d87e751713c3c277e3084e35b66b525124dee6da10d05cb50353b03a35d5102e78
-
Filesize
9.7MB
MD51b0ec60f1caf5ecc5e2a16c83ba0fcb8
SHA11b8b6c882ce33a1911581ef2108e42b66abb57b1
SHA2566747c6682cb478bb187c6ef856e0e79bcdc746c9c3d865aafd6182e62ca3f2ce
SHA5129319782859c5edb791b86d6b3447650564ce9295f69a41dd87c4f327f2c9fb0e06af6e10d31168078093a9f9f264d9bd15e67427be3257fd4ddb61594018f772
-
Filesize
3KB
MD5fbe284f5286fe3514f9999a90d9f5564
SHA15b7c9b7b0f3a346d4a8ba124969f3f77a28563c8
SHA2568223ed3f3a0feb0a7586074cf224ffd18073a065c20cd093503d83730d61f621
SHA5126a2f961904d8dc15964a2bd5e4d6259882907631e1ebec895dd2487a515f14ca2f09fcab531881a9f0aa132f18e4ea895089c2bf5ed1677d7db9121c40f719e8
-
Filesize
334KB
MD5a58db728b50e6b82cbdcaa0db61d36b1
SHA17cd76526cb29a0ff5350a2b52d48d1886360458b
SHA256ba2f2ac6ae9bc67399728f25772a0eb3e840695395cc747adf4b2f8b5d6d9a46
SHA5120db9afbdada44364521d89bab6055458125f4f3c8c1b09048eafa4055a194231ccffd82fcdada9360ab2b19f472b893330ebfcb027391e7a0c2b1100fc51e673
-
Filesize
18.3MB
MD53f20cfa72a2b41b7a5449d0612e7a51b
SHA1bdcc951461c29f51a657c4b5eee567075c35f97a
SHA25653bbaa82858a6cc6a66653f52611b47201262f9254d40a28ea89a0684db4d2e6
SHA512512afa4cc9ba806964c9838714027d3624942c6e68b652789d47d862d683533d2264d1178da8f839957a2d898ad5545edd7e5fde040cd747013d383d1d117597
-
Filesize
140KB
MD5e194a32fdf0a700f19e7dedda5bd4759
SHA1c54ac90bbebea55e4e5645675728c3ce0871a703
SHA2567a42228190983ac5cf572ad417cd4a49a1b555e305648f01794068ca15e0e293
SHA51206c76427a40ffb275c1fa62326cbefb2fac8ce0d39f4fee366104a741922fb199805cf5b895dcf19cfce795fe9210550147e9e5cc6bf8d4251a5332fe1a17bbf
-
Filesize
235KB
MD599c19a372fadc2668bf7951e0294d55b
SHA1b97d66ed279eba1ea9444af4cf67c1760d5bdd10
SHA25667d9f54267f1d3a3cc2869828ed058187e243d7237c485514cb42bbafffae0ae
SHA5126f605d2385cc549f13120fe3338f5dae8ead9908f5755d2d69285975b50c100450010de8dd9a2ce8800d8501540e4fefca586ed0cf5c97dcd4469fc3e1b736ba
-
Filesize
968KB
MD52d9095bfc02a5caf339e75cf4feaf6ef
SHA1d4b0e3223d1b0e4f2cbcfcfb566cc9cea0e3cc39
SHA2562ea53cfea3ccd5abb07390c929c81d61cd3d5a729bffef7a97b8a77971b3c139
SHA512c2443ed4eeff20ca46e312eb3d3504c32cba955d54330e264b2cda7dcc08247fa36d65f36809499b98e6ff0a09a6ed278c93f1352178e534f1d825e6a297d0e0
-
Filesize
84KB
MD55b91f95024c65be211f327cc0fd4872e
SHA1b0dec01d34dc3740f2418a25f5d65293ffaaadcc
SHA256fb905c955734bdbd4d03aaa82abb4700fca6e1a6fe27bdc38e9517a93f5dfc9e
SHA51269a30180acc1cd91e3d9b5e82dad94b687f6300a401e4c642f52820ba633580fa0bea0f66d2e47cd3711ea83b0ba5a61d268122e99d00b51bcfc197bd2119721
-
Filesize
58KB
MD5db782a8c1e295cdb8a96ea5ea81fb1e6
SHA1b5a4ad7188b2683602524d67289e93c0cefa05f2
SHA2562a3f8249ac91463757ef824c03857011caa012304efe8777231a209034ada858
SHA5122cee0ca87dd5f98c711cc480ff9ab94d009e5cb503adf2e61fd708d25c9cf37f8f22df30c46e89949a800fd49fd2b0a98a726ef9ac9a760beff67d77f3a58f22
-
Filesize
9KB
MD517309e33b596ba3a5693b4d3e85cf8d7
SHA17d361836cf53df42021c7f2b148aec9458818c01
SHA256996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
SHA5121abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
Filesize
11KB
MD517ed1c86bd67e78ade4712be48a7d2bd
SHA11cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA5120cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
391KB
MD5c6a070b3e68b292bb0efc9b26e85e9cc
SHA15a922b96eda6595a68fd0a9051236162ff2e2ada
SHA25666ac8bd1f273a73e17a3f31d6add739d3cb0330a6417faeda11a9cae00b62d8b
SHA5128eff8fc16f5bb574bd9483e3b217b67a8986e31497368c06fdaa3a1e93a40aee94a5b31729d01905157b0ae1e556a402f43cd29a4d30a0587e1ec334458a44e8