Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
a526b69375a52ad3b9d8b12468259ee4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a526b69375a52ad3b9d8b12468259ee4.exe
Resource
win10v2004-20230220-en
General
-
Target
a526b69375a52ad3b9d8b12468259ee4.exe
-
Size
91KB
-
MD5
a526b69375a52ad3b9d8b12468259ee4
-
SHA1
17b1065d9f8fa646e401312899c9547f5aa088d8
-
SHA256
f17b2ecce5a84b6c0a34cd138bfd975d36d6ec1e365cfbef79b463a97ad375e8
-
SHA512
f066fdc73f13201653c998343d2471525e6078ef585a00b8544f7035cfc89d91959a7a58ef298f7d608928995af41b20d5a3b4c191fe5e3382a956d066fd3b10
-
SSDEEP
1536:yN1KMYorUNWvwZhcZ/OoU33vx+W9RXMivgSeeCBwiQLakuE8JJs:yN1KXlkE33h1weCqiQGkurbs
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral2/memory/3528-204-0x0000000000C00000-0x0000000000C1C000-memory.dmp family_rhadamanthys behavioral2/memory/3528-205-0x0000000000C00000-0x0000000000C1C000-memory.dmp family_rhadamanthys behavioral2/memory/3528-207-0x0000000000C00000-0x0000000000C1C000-memory.dmp family_rhadamanthys behavioral2/memory/3528-214-0x0000000000C00000-0x0000000000C1C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Xnqviekgsgihdfuxa.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Erfpfntlyvpk.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation a526b69375a52ad3b9d8b12468259ee4.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Xnqviekgsgihdfuxa.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Zkovgzbykojvhyinxxacayvydqjmtxd.exe -
Executes dropped EXE 4 IoCs
pid Process 2108 Xnqviekgsgihdfuxa.exe 4664 Zkovgzbykojvhyinxxacayvydqjmtxd.exe 3836 Xnqviekgsgihdfuxa.exe 3512 Erfpfntlyvpk.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4648 set thread context of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2028 powershell.exe 2028 powershell.exe 4376 powershell.exe 4376 powershell.exe 3528 a526b69375a52ad3b9d8b12468259ee4.exe 3528 a526b69375a52ad3b9d8b12468259ee4.exe 4696 dllhost.exe 4696 dllhost.exe 4696 dllhost.exe 4696 dllhost.exe 1700 powershell.exe 1700 powershell.exe 1940 powershell.exe 1940 powershell.exe 3092 powershell.exe 3092 powershell.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4648 a526b69375a52ad3b9d8b12468259ee4.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 2108 Xnqviekgsgihdfuxa.exe Token: SeDebugPrivilege 4376 powershell.exe Token: SeDebugPrivilege 4664 Zkovgzbykojvhyinxxacayvydqjmtxd.exe Token: SeDebugPrivilege 1700 powershell.exe Token: SeDebugPrivilege 3836 Xnqviekgsgihdfuxa.exe Token: SeDebugPrivilege 1940 powershell.exe Token: SeDebugPrivilege 3512 Erfpfntlyvpk.exe Token: SeDebugPrivilege 3092 powershell.exe Token: SeDebugPrivilege 4664 Zkovgzbykojvhyinxxacayvydqjmtxd.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4648 wrote to memory of 2028 4648 a526b69375a52ad3b9d8b12468259ee4.exe 86 PID 4648 wrote to memory of 2028 4648 a526b69375a52ad3b9d8b12468259ee4.exe 86 PID 4648 wrote to memory of 2028 4648 a526b69375a52ad3b9d8b12468259ee4.exe 86 PID 4648 wrote to memory of 2108 4648 a526b69375a52ad3b9d8b12468259ee4.exe 98 PID 4648 wrote to memory of 2108 4648 a526b69375a52ad3b9d8b12468259ee4.exe 98 PID 4648 wrote to memory of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 PID 4648 wrote to memory of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 PID 4648 wrote to memory of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 PID 4648 wrote to memory of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 PID 4648 wrote to memory of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 PID 4648 wrote to memory of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 PID 4648 wrote to memory of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 PID 4648 wrote to memory of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 PID 4648 wrote to memory of 3528 4648 a526b69375a52ad3b9d8b12468259ee4.exe 97 PID 2108 wrote to memory of 4376 2108 Xnqviekgsgihdfuxa.exe 99 PID 2108 wrote to memory of 4376 2108 Xnqviekgsgihdfuxa.exe 99 PID 3528 wrote to memory of 4696 3528 a526b69375a52ad3b9d8b12468259ee4.exe 107 PID 3528 wrote to memory of 4696 3528 a526b69375a52ad3b9d8b12468259ee4.exe 107 PID 3528 wrote to memory of 4696 3528 a526b69375a52ad3b9d8b12468259ee4.exe 107 PID 3528 wrote to memory of 4696 3528 a526b69375a52ad3b9d8b12468259ee4.exe 107 PID 2108 wrote to memory of 4664 2108 Xnqviekgsgihdfuxa.exe 108 PID 2108 wrote to memory of 4664 2108 Xnqviekgsgihdfuxa.exe 108 PID 4664 wrote to memory of 1700 4664 Zkovgzbykojvhyinxxacayvydqjmtxd.exe 109 PID 4664 wrote to memory of 1700 4664 Zkovgzbykojvhyinxxacayvydqjmtxd.exe 109 PID 3836 wrote to memory of 1940 3836 Xnqviekgsgihdfuxa.exe 113 PID 3836 wrote to memory of 1940 3836 Xnqviekgsgihdfuxa.exe 113 PID 4664 wrote to memory of 3512 4664 Zkovgzbykojvhyinxxacayvydqjmtxd.exe 115 PID 4664 wrote to memory of 3512 4664 Zkovgzbykojvhyinxxacayvydqjmtxd.exe 115 PID 3512 wrote to memory of 3092 3512 Erfpfntlyvpk.exe 116 PID 3512 wrote to memory of 3092 3512 Erfpfntlyvpk.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a526b69375a52ad3b9d8b12468259ee4.exe"C:\Users\Admin\AppData\Local\Temp\a526b69375a52ad3b9d8b12468259ee4.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\a526b69375a52ad3b9d8b12468259ee4.exeC:\Users\Admin\AppData\Local\Temp\a526b69375a52ad3b9d8b12468259ee4.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:4696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Xnqviekgsgihdfuxa.exe"C:\Users\Admin\AppData\Local\Temp\Xnqviekgsgihdfuxa.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\Zkovgzbykojvhyinxxacayvydqjmtxd.exe"C:\Users\Admin\AppData\Local\Temp\Zkovgzbykojvhyinxxacayvydqjmtxd.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\Erfpfntlyvpk.exe"C:\Users\Admin\AppData\Local\Temp\Erfpfntlyvpk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Xnqviekgsgihdfuxa.exeC:\Users\Admin\AppData\Roaming\Xnqviekgsgihdfuxa.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
53KB
MD5687ff3bb8a8b15736d686119a681097c
SHA118f43aa14e56d4fb158a8804f79fc3c604903991
SHA25651fd45579a0bee4beabbf7aa825ccc646f907dfdf27b2fc1791fa47dc90d5aa2
SHA512047b21b92e74c93f264e2547900decd295f3089b22165372c4060b76bb813ffa6f2af924974936e25a2db551ea1eec722329ae78e1fff08f6f104d041090094a
-
Filesize
1KB
MD5fc28168b916bf9744961653d503e1164
SHA171deadab13b81a414582f931e9af010152463644
SHA256a2a78e9fb30fe365d454ca6bbbf950355049c978262fdf0e80cd683622cf00e9
SHA51208d828e18ccb2892f12dcbbaf5a5ffcafb4e2e768536fc46b3d2fce788c52b2f61058e1ef0a47e648e2308f4f1aeb8799bef9472726d2800fa9b775f401e08c9
-
Filesize
16KB
MD5b8b64ea350f50bf9d65ab5190319cfcd
SHA1e3fb869568446b1ebfd6fc8dd524d76a81609b7a
SHA256cf0344e59e00dae5fb65c3c7bef0bca9421a5c53fad88d2e285861e0e4d044ea
SHA512782e1cc84b899268d48e85807166566ca61dd692b9b18b965a7d61f0d6db1f1b4e9ec73c2da6291ed6276c789cb41bdb4b7b74191c4de58e96847814e908a4eb
-
Filesize
1KB
MD5bb1c33a1a3bbff8ced39d26308f77211
SHA1c59c693e72c74c349b245b33b907dfb4e4ba4c3a
SHA2568685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90
SHA5122d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3
-
Filesize
91KB
MD56b45949a3d6b5bc2706bc326f9f6bfda
SHA17c09d5194aa83e7f9a08a5d35f0b247cc09f5079
SHA2569fd40323c1fb22cd4576b92ee36f3490ff82f9153c395a8a0049dbea0f61076f
SHA512c903cb997ee27e7a9a70fca098c16e21f3aa552d4657f5795293df960af33c0d26765d9262b3e5a8f7522245705e48dffe9da062467d855075ba697831e72295
-
Filesize
91KB
MD56b45949a3d6b5bc2706bc326f9f6bfda
SHA17c09d5194aa83e7f9a08a5d35f0b247cc09f5079
SHA2569fd40323c1fb22cd4576b92ee36f3490ff82f9153c395a8a0049dbea0f61076f
SHA512c903cb997ee27e7a9a70fca098c16e21f3aa552d4657f5795293df960af33c0d26765d9262b3e5a8f7522245705e48dffe9da062467d855075ba697831e72295
-
Filesize
91KB
MD56b45949a3d6b5bc2706bc326f9f6bfda
SHA17c09d5194aa83e7f9a08a5d35f0b247cc09f5079
SHA2569fd40323c1fb22cd4576b92ee36f3490ff82f9153c395a8a0049dbea0f61076f
SHA512c903cb997ee27e7a9a70fca098c16e21f3aa552d4657f5795293df960af33c0d26765d9262b3e5a8f7522245705e48dffe9da062467d855075ba697831e72295
-
Filesize
91KB
MD53bdc3ee40df9428f89f34e28b5fbb352
SHA1534a88d4c2e114558958215d899f2fb97e9c741e
SHA256937ac1d8778031b957ec0439ad880e13fad11eeac627c9bf9e4ac6ab05eff79c
SHA51276fca8c9fbea1f9d923b50a2e767c753d4dd0312d1870e7e5d162a10aa5ca42e48d71c5dbcc4ee241b17e90947a47aec27eb5034c154505bc60ff93805e94f2b
-
Filesize
91KB
MD53bdc3ee40df9428f89f34e28b5fbb352
SHA1534a88d4c2e114558958215d899f2fb97e9c741e
SHA256937ac1d8778031b957ec0439ad880e13fad11eeac627c9bf9e4ac6ab05eff79c
SHA51276fca8c9fbea1f9d923b50a2e767c753d4dd0312d1870e7e5d162a10aa5ca42e48d71c5dbcc4ee241b17e90947a47aec27eb5034c154505bc60ff93805e94f2b
-
Filesize
91KB
MD53bdc3ee40df9428f89f34e28b5fbb352
SHA1534a88d4c2e114558958215d899f2fb97e9c741e
SHA256937ac1d8778031b957ec0439ad880e13fad11eeac627c9bf9e4ac6ab05eff79c
SHA51276fca8c9fbea1f9d923b50a2e767c753d4dd0312d1870e7e5d162a10aa5ca42e48d71c5dbcc4ee241b17e90947a47aec27eb5034c154505bc60ff93805e94f2b
-
Filesize
91KB
MD5e9d3c8ca3868873c7949b4e0d80fb4ac
SHA1cea508524fd0cb1ce5a5fad81e670da238078638
SHA256316241f1f9a3d55222e2a74ef8f968a0074b2b2e5def504feb1757a5d1e925b7
SHA51253d277198b6bca13a130c620ffb0c671a21b62b85da6cb37a623554f2bc0a639b437665c18e4eece478b113547f03b53ca377df0dfb21726b68388985e990de1
-
Filesize
91KB
MD5e9d3c8ca3868873c7949b4e0d80fb4ac
SHA1cea508524fd0cb1ce5a5fad81e670da238078638
SHA256316241f1f9a3d55222e2a74ef8f968a0074b2b2e5def504feb1757a5d1e925b7
SHA51253d277198b6bca13a130c620ffb0c671a21b62b85da6cb37a623554f2bc0a639b437665c18e4eece478b113547f03b53ca377df0dfb21726b68388985e990de1
-
Filesize
91KB
MD5e9d3c8ca3868873c7949b4e0d80fb4ac
SHA1cea508524fd0cb1ce5a5fad81e670da238078638
SHA256316241f1f9a3d55222e2a74ef8f968a0074b2b2e5def504feb1757a5d1e925b7
SHA51253d277198b6bca13a130c620ffb0c671a21b62b85da6cb37a623554f2bc0a639b437665c18e4eece478b113547f03b53ca377df0dfb21726b68388985e990de1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
91KB
MD53bdc3ee40df9428f89f34e28b5fbb352
SHA1534a88d4c2e114558958215d899f2fb97e9c741e
SHA256937ac1d8778031b957ec0439ad880e13fad11eeac627c9bf9e4ac6ab05eff79c
SHA51276fca8c9fbea1f9d923b50a2e767c753d4dd0312d1870e7e5d162a10aa5ca42e48d71c5dbcc4ee241b17e90947a47aec27eb5034c154505bc60ff93805e94f2b
-
Filesize
91KB
MD53bdc3ee40df9428f89f34e28b5fbb352
SHA1534a88d4c2e114558958215d899f2fb97e9c741e
SHA256937ac1d8778031b957ec0439ad880e13fad11eeac627c9bf9e4ac6ab05eff79c
SHA51276fca8c9fbea1f9d923b50a2e767c753d4dd0312d1870e7e5d162a10aa5ca42e48d71c5dbcc4ee241b17e90947a47aec27eb5034c154505bc60ff93805e94f2b