Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    79s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2023, 12:20

General

  • Target

    645784b871d6a9eaefe9305a9b4a8fd6f8eb838740f58f737887608d2e84a9fc.exe

  • Size

    270KB

  • MD5

    0f9694cdd6f6f21f5909880c955c2b74

  • SHA1

    d0a899e646be9991f5c9188af7a07956bacc4509

  • SHA256

    645784b871d6a9eaefe9305a9b4a8fd6f8eb838740f58f737887608d2e84a9fc

  • SHA512

    ccbc59ad7c4af074ba04ea57d422ab943d1fa3401116faa610268bc8223e0da899e7e4898cef4948bee9a0ea0e1933baa1bcc2333e54b84ef33537da4dcb2e60

  • SSDEEP

    6144:AqFIGhW+J6zoNaaOVJj9uMM5+6RUfQso:JiGT+oExksjfQs

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\645784b871d6a9eaefe9305a9b4a8fd6f8eb838740f58f737887608d2e84a9fc.exe
    "C:\Users\Admin\AppData\Local\Temp\645784b871d6a9eaefe9305a9b4a8fd6f8eb838740f58f737887608d2e84a9fc.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Windows\system32\dllhost.exe
      "C:\Windows\system32\dllhost.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • outlook_office_path
      • outlook_win_path
      PID:2160
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 708
      2⤵
      • Program crash
      PID:3408
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1484 -ip 1484
    1⤵
      PID:2680

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1484-149-0x0000000000400000-0x00000000004C3000-memory.dmp

      Filesize

      780KB

    • memory/1484-150-0x00000000020F0000-0x000000000210C000-memory.dmp

      Filesize

      112KB

    • memory/1484-138-0x00000000020F0000-0x000000000210C000-memory.dmp

      Filesize

      112KB

    • memory/1484-140-0x00000000020F0000-0x000000000210C000-memory.dmp

      Filesize

      112KB

    • memory/1484-141-0x0000000002120000-0x000000000213A000-memory.dmp

      Filesize

      104KB

    • memory/1484-142-0x00000000023A0000-0x00000000033A0000-memory.dmp

      Filesize

      16.0MB

    • memory/1484-143-0x00000000020F0000-0x000000000210C000-memory.dmp

      Filesize

      112KB

    • memory/1484-134-0x00000000020C0000-0x00000000020EE000-memory.dmp

      Filesize

      184KB

    • memory/1484-135-0x0000000000400000-0x00000000004C3000-memory.dmp

      Filesize

      780KB

    • memory/1484-145-0x0000000002250000-0x0000000002252000-memory.dmp

      Filesize

      8KB

    • memory/2160-147-0x00007FF4D3D40000-0x00007FF4D3E3A000-memory.dmp

      Filesize

      1000KB

    • memory/2160-148-0x00007FF4D3D40000-0x00007FF4D3E3A000-memory.dmp

      Filesize

      1000KB

    • memory/2160-144-0x000001438D650000-0x000001438D651000-memory.dmp

      Filesize

      4KB

    • memory/2160-146-0x000001438D960000-0x000001438D967000-memory.dmp

      Filesize

      28KB

    • memory/2160-151-0x00007FF4D3D40000-0x00007FF4D3E3A000-memory.dmp

      Filesize

      1000KB

    • memory/2160-152-0x00007FF4D3D40000-0x00007FF4D3E3A000-memory.dmp

      Filesize

      1000KB

    • memory/2160-153-0x00007FF4D3D40000-0x00007FF4D3E3A000-memory.dmp

      Filesize

      1000KB

    • memory/2160-154-0x00007FF4D3D40000-0x00007FF4D3E3A000-memory.dmp

      Filesize

      1000KB