Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2023, 09:39
Behavioral task
behavioral1
Sample
ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe
Resource
win10v2004-20230220-en
General
-
Target
ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe
-
Size
77KB
-
MD5
3560792f6c31f4a356405ab3823e73db
-
SHA1
e18e31539269df2c0fc338858a752084a94d53f2
-
SHA256
ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6
-
SHA512
36f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e
-
SSDEEP
1536:gd3Mz8GTuBVLcC9Vv2oK+52KdqlfFdIueeeeeeeeWeeeee:9wGcVLHDv/xTqlfF
Malware Config
Extracted
phorphiex
http://185.215.113.66/
0x77BC9dDbaf423139eC0C7F699B676c72Ab34fcc7
TCX5ybBsuZE2BZk6GJMqZaCjBEjiuX1zPP
1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6
qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL
LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX
rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH
ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH
t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn
bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd
bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg
bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE
Signatures
-
Detect rhadamanthys stealer shellcode 3 IoCs
resource yara_rule behavioral2/memory/1192-179-0x0000000002F70000-0x0000000002F8C000-memory.dmp family_rhadamanthys behavioral2/memory/1192-181-0x0000000002F70000-0x0000000002F8C000-memory.dmp family_rhadamanthys behavioral2/memory/1192-185-0x0000000002F70000-0x0000000002F8C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysdrvefda.exe -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 4176 sysdrvefda.exe 2492 288066304.exe 3100 1601330493.exe 248 2517521501.exe 4400 Windows Security Upgrade Service.exe 3424 970512562.exe 1192 3995335287.exe 2240 Windows Security Upgrade Service.exe 1528 Windows Security Upgrade Service.exe 3596 1177811381.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysdrvefda.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysdrvefda.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysdrvefda.exe" ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1192 3995335287.exe 1192 3995335287.exe 1192 3995335287.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sysdrvefda.exe ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe File opened for modification C:\Windows\sysdrvefda.exe ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3995335287.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3995335287.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 3995335287.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID 3995335287.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3995335287.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1192 3995335287.exe Token: SeCreatePagefilePrivilege 1192 3995335287.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4176 1344 ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe 81 PID 1344 wrote to memory of 4176 1344 ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe 81 PID 1344 wrote to memory of 4176 1344 ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe 81 PID 4176 wrote to memory of 2492 4176 sysdrvefda.exe 84 PID 4176 wrote to memory of 2492 4176 sysdrvefda.exe 84 PID 4176 wrote to memory of 2492 4176 sysdrvefda.exe 84 PID 4176 wrote to memory of 3100 4176 sysdrvefda.exe 85 PID 4176 wrote to memory of 3100 4176 sysdrvefda.exe 85 PID 4176 wrote to memory of 3100 4176 sysdrvefda.exe 85 PID 4176 wrote to memory of 248 4176 sysdrvefda.exe 86 PID 4176 wrote to memory of 248 4176 sysdrvefda.exe 86 PID 4176 wrote to memory of 248 4176 sysdrvefda.exe 86 PID 248 wrote to memory of 4400 248 2517521501.exe 89 PID 248 wrote to memory of 4400 248 2517521501.exe 89 PID 248 wrote to memory of 4400 248 2517521501.exe 89 PID 4176 wrote to memory of 3424 4176 sysdrvefda.exe 91 PID 4176 wrote to memory of 3424 4176 sysdrvefda.exe 91 PID 4176 wrote to memory of 3424 4176 sysdrvefda.exe 91 PID 3424 wrote to memory of 1192 3424 970512562.exe 95 PID 3424 wrote to memory of 1192 3424 970512562.exe 95 PID 3424 wrote to memory of 1192 3424 970512562.exe 95 PID 248 wrote to memory of 2240 248 2517521501.exe 96 PID 248 wrote to memory of 2240 248 2517521501.exe 96 PID 248 wrote to memory of 2240 248 2517521501.exe 96 PID 248 wrote to memory of 1528 248 2517521501.exe 97 PID 248 wrote to memory of 1528 248 2517521501.exe 97 PID 248 wrote to memory of 1528 248 2517521501.exe 97 PID 3100 wrote to memory of 3596 3100 1601330493.exe 99 PID 3100 wrote to memory of 3596 3100 1601330493.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe"C:\Users\Admin\AppData\Local\Temp\ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\sysdrvefda.exeC:\Windows\sysdrvefda.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\288066304.exeC:\Users\Admin\AppData\Local\Temp\288066304.exe3⤵
- Executes dropped EXE
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\1601330493.exeC:\Users\Admin\AppData\Local\Temp\1601330493.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\1177811381.exeC:\Users\Admin\AppData\Local\Temp\1177811381.exe4⤵
- Executes dropped EXE
PID:3596
-
-
-
C:\Users\Admin\AppData\Local\Temp\2517521501.exeC:\Users\Admin\AppData\Local\Temp\2517521501.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"4⤵
- Executes dropped EXE
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"4⤵
- Executes dropped EXE
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"4⤵
- Executes dropped EXE
PID:1528
-
-
-
C:\Users\Admin\AppData\Local\Temp\970512562.exeC:\Users\Admin\AppData\Local\Temp\970512562.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\3995335287.exeC:\Users\Admin\AppData\Local\Temp\3995335287.exe4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD57b0633ae007d5d202c33d505d580d4b7
SHA13fcc4bd2af14b385104c27d8a192c938295bba3e
SHA25684984b4ae961524fa29008d142c78b6a859b451bdd21cedc04cc25caf4256116
SHA512e1038eeaa16cc1a8c514870d2f3892c7a68f083fe7f9751906e75d93c079a51190f61e153c145302ec0c3c761de5b5e1803a7338041665d4584214a11048647f
-
Filesize
6KB
MD503ee7b245daeebbf2ccaa1690a9fc8fc
SHA1561710d7f8c05ff5c2a3a384be5de6e023e41ac4
SHA2566bc23b9878978a2f3c507acfdad0b2244a8bda5143359613db039cb21d9c1228
SHA512f64163899218b24ee1dd59748e024e0106d83dbea3e31c0f05b1efb8558a47c232dbbcd1463a121c63e2dff2743887925238d8bf6eab0b9ee0292386918e8e55
-
Filesize
6KB
MD503ee7b245daeebbf2ccaa1690a9fc8fc
SHA1561710d7f8c05ff5c2a3a384be5de6e023e41ac4
SHA2566bc23b9878978a2f3c507acfdad0b2244a8bda5143359613db039cb21d9c1228
SHA512f64163899218b24ee1dd59748e024e0106d83dbea3e31c0f05b1efb8558a47c232dbbcd1463a121c63e2dff2743887925238d8bf6eab0b9ee0292386918e8e55
-
Filesize
7KB
MD574492fec4944600b61dd6afe85a49eb5
SHA11d39770b2e0fd716d189981b6c3e777716662466
SHA256eb9961dacff3234c35fd1edb241ecabd488cb12211be587982fd292b463a222e
SHA51282a1679aca44e9ecf03aadd56b3792e363495606e42181a26f626ebce7ca16096081e05ef31b62e752ebaf15b56c27273ee0a5bc518ea2126d4abeeb12d61215
-
Filesize
7KB
MD574492fec4944600b61dd6afe85a49eb5
SHA11d39770b2e0fd716d189981b6c3e777716662466
SHA256eb9961dacff3234c35fd1edb241ecabd488cb12211be587982fd292b463a222e
SHA51282a1679aca44e9ecf03aadd56b3792e363495606e42181a26f626ebce7ca16096081e05ef31b62e752ebaf15b56c27273ee0a5bc518ea2126d4abeeb12d61215
-
Filesize
77KB
MD53560792f6c31f4a356405ab3823e73db
SHA1e18e31539269df2c0fc338858a752084a94d53f2
SHA256ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6
SHA51236f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e
-
Filesize
77KB
MD53560792f6c31f4a356405ab3823e73db
SHA1e18e31539269df2c0fc338858a752084a94d53f2
SHA256ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6
SHA51236f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e
-
Filesize
77KB
MD53560792f6c31f4a356405ab3823e73db
SHA1e18e31539269df2c0fc338858a752084a94d53f2
SHA256ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6
SHA51236f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e
-
Filesize
179KB
MD5e179b14f26972c159c58519496978a07
SHA1dcf842645127686af3c13f21fa5ea4a760c87c61
SHA256f9d387135a7a4e49eb96fc29d3da8f412d870417bf684b5e8ae91c4a1fbcc6d5
SHA5126cc943e64605a8c182a8d54a2804214e72a1cc128d7a275aee4c4d7e9f0c8731d3813e165876f8370ed67ec498825f46bfe5c3831152862de154e6709d93dba1
-
Filesize
179KB
MD5e179b14f26972c159c58519496978a07
SHA1dcf842645127686af3c13f21fa5ea4a760c87c61
SHA256f9d387135a7a4e49eb96fc29d3da8f412d870417bf684b5e8ae91c4a1fbcc6d5
SHA5126cc943e64605a8c182a8d54a2804214e72a1cc128d7a275aee4c4d7e9f0c8731d3813e165876f8370ed67ec498825f46bfe5c3831152862de154e6709d93dba1
-
Filesize
6KB
MD57f8e65baa2a26c58977fb7a85850f2b0
SHA1f2e9b5015ad648f6690efc7b847e1e8398163069
SHA256048b155a427d2563df87eb1b34b5a7ea3158253bff073cd2107642332ce6e7fe
SHA5123b7151d8f8d8402aa1be064ea3519786a8b7ca0a159dcbbc58f144e23c4d3d88f5d9136fb9f0cc0b47e6c4fa464b13ea2282c0de5f04802a7b5643a21bb70d01
-
Filesize
6KB
MD57f8e65baa2a26c58977fb7a85850f2b0
SHA1f2e9b5015ad648f6690efc7b847e1e8398163069
SHA256048b155a427d2563df87eb1b34b5a7ea3158253bff073cd2107642332ce6e7fe
SHA5123b7151d8f8d8402aa1be064ea3519786a8b7ca0a159dcbbc58f144e23c4d3d88f5d9136fb9f0cc0b47e6c4fa464b13ea2282c0de5f04802a7b5643a21bb70d01
-
Filesize
16KB
MD522f2666659ba947c9974fb70ffba0efa
SHA11a8ce0516638a9b64129f5de3a5169aea958495d
SHA25690e109884750afed408867ab5d697d56b53620027d91a466a338a90f53ebbe02
SHA51267f9333b9a70fe3d0ca6d7bf019e3a661fd43b74fc1d25dd393bc2bb8d799d2b699ea7d1fddeda7971a0b7fcbd8ae6b7b1b2c70526770a2362a7d4482e55a6c3
-
Filesize
16KB
MD522f2666659ba947c9974fb70ffba0efa
SHA11a8ce0516638a9b64129f5de3a5169aea958495d
SHA25690e109884750afed408867ab5d697d56b53620027d91a466a338a90f53ebbe02
SHA51267f9333b9a70fe3d0ca6d7bf019e3a661fd43b74fc1d25dd393bc2bb8d799d2b699ea7d1fddeda7971a0b7fcbd8ae6b7b1b2c70526770a2362a7d4482e55a6c3
-
Filesize
16KB
MD522f2666659ba947c9974fb70ffba0efa
SHA11a8ce0516638a9b64129f5de3a5169aea958495d
SHA25690e109884750afed408867ab5d697d56b53620027d91a466a338a90f53ebbe02
SHA51267f9333b9a70fe3d0ca6d7bf019e3a661fd43b74fc1d25dd393bc2bb8d799d2b699ea7d1fddeda7971a0b7fcbd8ae6b7b1b2c70526770a2362a7d4482e55a6c3
-
Filesize
16KB
MD522f2666659ba947c9974fb70ffba0efa
SHA11a8ce0516638a9b64129f5de3a5169aea958495d
SHA25690e109884750afed408867ab5d697d56b53620027d91a466a338a90f53ebbe02
SHA51267f9333b9a70fe3d0ca6d7bf019e3a661fd43b74fc1d25dd393bc2bb8d799d2b699ea7d1fddeda7971a0b7fcbd8ae6b7b1b2c70526770a2362a7d4482e55a6c3
-
Filesize
77KB
MD53560792f6c31f4a356405ab3823e73db
SHA1e18e31539269df2c0fc338858a752084a94d53f2
SHA256ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6
SHA51236f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e
-
Filesize
77KB
MD53560792f6c31f4a356405ab3823e73db
SHA1e18e31539269df2c0fc338858a752084a94d53f2
SHA256ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6
SHA51236f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e