Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/12/2022, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe
Resource
win10v2004-20220812-en
General
-
Target
213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe
-
Size
5.0MB
-
MD5
7787ed9096e4d80b8d439ed383258e91
-
SHA1
8520ec29cb0cf073d79a26c90f136b5086362688
-
SHA256
213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d
-
SHA512
574dcaddaac500979d17f23869a325055dca46e5026f8c43a3a1554b2a57b38c89ee0866c3c8696e9ffae6c66814872adc5e84d435065180155ac2f5ece193a5
-
SSDEEP
98304:xMlGHqOo4d4ijKnoutA/odEOeRYl32ddVvSQZJPictyPR51nK03z3:xMgHDred2o32ddQQZJKcuRLnLj
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 1 IoCs
resource yara_rule behavioral1/memory/4400-139-0x0000000003140000-0x000000000315D000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4400 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe 4400 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe 4400 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe 4400 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe 4400 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4400 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe 4400 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4400 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe Token: SeCreatePagefilePrivilege 4400 213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe"C:\Users\Admin\AppData\Local\Temp\213f7b86b450a9b06ea1c4eff69318ad60e7549a452520c5014576508100c30d.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400