Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2023, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
369KB
-
MD5
c901cbc0e7e675c98d6ccc17e453d99f
-
SHA1
76f1958a6fe532b472f60361bff3b0f8bda2c86f
-
SHA256
d5d5b80a12be4845f2c4d23cdf01b6a690ceddcb8bb923df7d59bf5cd2057a6f
-
SHA512
3da5b084aafa0f700ada7a4675499032e9fa60557f8de3c01fc7983eda405d3d906bc581ffc4993e47b37663ca7932240d25b3e1fb45b8ed9471e9bce54566c2
-
SSDEEP
6144:WMRGQL7XoNR9ZsekVOt/hihbxQLy+qKKwTAVYxQkINPNNrlwKwpxBm94QjV6ptCa:WMRGQvXuRHsqZhihbxgaKPixDrleGT
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
resource yara_rule behavioral2/memory/4212-137-0x0000000002270000-0x000000000228D000-memory.dmp family_rhadamanthys behavioral2/memory/4212-145-0x0000000002270000-0x000000000228D000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 872 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 872 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3436 4212 WerFault.exe 78 1292 872 WerFault.exe 79 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 872 rundll32.exe 872 rundll32.exe 872 rundll32.exe 872 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4212 wrote to memory of 872 4212 tmp.exe 79 PID 4212 wrote to memory of 872 4212 tmp.exe 79 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\system32\rundll32.exe"C:\Users\Admin\AppData\Roaming\nsis_unse56799a.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8FfqJwBHGwBYPwB3AFb6IQBSPwBGADQAeP4tAllIg+wo6AT|AgAASIPEKMP|zMzMTIlEJBj|SIlUJBBIiUz7JAhdAUiLRCQwb0iJBCSBAThIbwC|CEjHRCQQLQHrfQ6BARBIg8ABjwHdEIEBQEg5lgBzJf6fA4sMJEgDyEhfi8FIi0yrAVR7AP8D0UiLyooJiPcI68FmBWVIiwT7JWDz8DPJSItQ|xhIO9F0NkiD|8IgSIsCSDvC|3QqZoN4SBh1|xpMi0BQZkGD7zhrdAcREUt1CP4REHgQLnQFSIu|AOvVSItI|QDB|moAQFNVVldBVL9BVUFWQVddAWb|gTlNWk2L+Ez|i|JIi9kPhfz+8|BMY0k8QYE8|wlQRQAAD4XqvvPwQYuECYjz8IX|wEiNPAEPhNbeahGDvAmMLQEPhP3H8|BEi2cgRIv|XxyLdyREi0||GEwD4UwD2Uj|A|EzyUWFyQ|7hKTz8E2LxEGL|xBFM9JIA9OK|wKEwHQdQcHK7w0PvsD6AAFEA|3QvxF17EGB+qr||A18dA6DwQH|SYPABEE7yXP|aevGi8EPtwz|TkWLLItMA+vvdFgz7aoQdFFB+4sUwQDTM8mKAn9Mi8LrD8HJyBF7A8jlEAFBigDVEP|tM8Az9kE7DPm24BCmAIPGAYP4|why7usKSIvL|0H|1UmJBPeD|cXkEMQEO28Ycv2vZgFBX0FeQV2|QVxfXl1bMxdI74HsYAFkAIvp6P9m|v||SIXAD1uEmHUgTI2vAYsrEN|IM||om30gjV||BEyNRUYz0ovfy|9UJGiAIEyLr+APhGt1IEWoEDP3wIvTkSBIiXwk9SCmIHCAIEiL8A|zhEt1IKYgUEiNVv8IRI1HQEiNjP0khRFIi9jofP2ufiCNVkjeIBDiIcz28|DoZ+8gRIsGjdNXCEEgpiBYyiGJhGskgIcS3vPwiw7aII9YiYwkcREHMJEg6O0x7yCLnC0yTItdvzpIg|tsSIogMP9MiWQkOEyLpO4aMkyJXIQBhCTctocRhpKNEY1HSzCM+yTw8|BJi9To6e38BTCKnHgySI2E|ngyQYDzIY1PbPdEMBikAoPpAXX384G8eDIhUmV4v3VNi4Qk9CIxlPsk+DUBwkg72HL|OIP6bHYzRI17SUD6AJRBuACYAHqmIEDKIvh0GUS2ML7AMUmNVCRskSBJ34PobOhrgjBIi|3OpiB4SIX|dBLPi1VCTI4wGzFIjf9MJED|10iBxAB0IWEkLQgtAQ==2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:872 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 872 -s 5323⤵
- Program crash
PID:1292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 6962⤵
- Program crash
PID:3436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4212 -ip 42121⤵PID:4616
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 872 -ip 8721⤵PID:4804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5832890fded186835970d1d3302590138
SHA15385703e9dcde43e60928b2e9c941b7232468a6a
SHA256438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576
SHA5125cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1
-
Filesize
49KB
MD5832890fded186835970d1d3302590138
SHA15385703e9dcde43e60928b2e9c941b7232468a6a
SHA256438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576
SHA5125cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1