Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2023, 09:39

General

  • Target

    ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe

  • Size

    77KB

  • MD5

    3560792f6c31f4a356405ab3823e73db

  • SHA1

    e18e31539269df2c0fc338858a752084a94d53f2

  • SHA256

    ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6

  • SHA512

    36f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e

  • SSDEEP

    1536:gd3Mz8GTuBVLcC9Vv2oK+52KdqlfFdIueeeeeeeeWeeeee:9wGcVLHDv/xTqlfF

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

Wallets

0x77BC9dDbaf423139eC0C7F699B676c72Ab34fcc7

TCX5ybBsuZE2BZk6GJMqZaCjBEjiuX1zPP

1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6

qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut

XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL

LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX

rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH

ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ

48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg

3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC

3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3

D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH

t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn

bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd

bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg

bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut

GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE

Signatures

  • Detect rhadamanthys stealer shellcode 3 IoCs
  • Phorphiex

    Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Windows security bypass 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe
    "C:\Users\Admin\AppData\Local\Temp\ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\sysdrvefda.exe
      C:\Windows\sysdrvefda.exe
      2⤵
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • Suspicious use of WriteProcessMemory
      PID:4176
      • C:\Users\Admin\AppData\Local\Temp\288066304.exe
        C:\Users\Admin\AppData\Local\Temp\288066304.exe
        3⤵
        • Executes dropped EXE
        PID:2492
      • C:\Users\Admin\AppData\Local\Temp\1601330493.exe
        C:\Users\Admin\AppData\Local\Temp\1601330493.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3100
        • C:\Users\Admin\AppData\Local\Temp\1177811381.exe
          C:\Users\Admin\AppData\Local\Temp\1177811381.exe
          4⤵
          • Executes dropped EXE
          PID:3596
      • C:\Users\Admin\AppData\Local\Temp\2517521501.exe
        C:\Users\Admin\AppData\Local\Temp\2517521501.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:248
        • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe
          "C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"
          4⤵
          • Executes dropped EXE
          PID:4400
        • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe
          "C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"
          4⤵
          • Executes dropped EXE
          PID:2240
        • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe
          "C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe"
          4⤵
          • Executes dropped EXE
          PID:1528
      • C:\Users\Admin\AppData\Local\Temp\970512562.exe
        C:\Users\Admin\AppData\Local\Temp\970512562.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3424
        • C:\Users\Admin\AppData\Local\Temp\3995335287.exe
          C:\Users\Admin\AppData\Local\Temp\3995335287.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:1192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1177811381.exe

    Filesize

    2.0MB

    MD5

    7b0633ae007d5d202c33d505d580d4b7

    SHA1

    3fcc4bd2af14b385104c27d8a192c938295bba3e

    SHA256

    84984b4ae961524fa29008d142c78b6a859b451bdd21cedc04cc25caf4256116

    SHA512

    e1038eeaa16cc1a8c514870d2f3892c7a68f083fe7f9751906e75d93c079a51190f61e153c145302ec0c3c761de5b5e1803a7338041665d4584214a11048647f

  • C:\Users\Admin\AppData\Local\Temp\1601330493.exe

    Filesize

    6KB

    MD5

    03ee7b245daeebbf2ccaa1690a9fc8fc

    SHA1

    561710d7f8c05ff5c2a3a384be5de6e023e41ac4

    SHA256

    6bc23b9878978a2f3c507acfdad0b2244a8bda5143359613db039cb21d9c1228

    SHA512

    f64163899218b24ee1dd59748e024e0106d83dbea3e31c0f05b1efb8558a47c232dbbcd1463a121c63e2dff2743887925238d8bf6eab0b9ee0292386918e8e55

  • C:\Users\Admin\AppData\Local\Temp\1601330493.exe

    Filesize

    6KB

    MD5

    03ee7b245daeebbf2ccaa1690a9fc8fc

    SHA1

    561710d7f8c05ff5c2a3a384be5de6e023e41ac4

    SHA256

    6bc23b9878978a2f3c507acfdad0b2244a8bda5143359613db039cb21d9c1228

    SHA512

    f64163899218b24ee1dd59748e024e0106d83dbea3e31c0f05b1efb8558a47c232dbbcd1463a121c63e2dff2743887925238d8bf6eab0b9ee0292386918e8e55

  • C:\Users\Admin\AppData\Local\Temp\2517521501.exe

    Filesize

    7KB

    MD5

    74492fec4944600b61dd6afe85a49eb5

    SHA1

    1d39770b2e0fd716d189981b6c3e777716662466

    SHA256

    eb9961dacff3234c35fd1edb241ecabd488cb12211be587982fd292b463a222e

    SHA512

    82a1679aca44e9ecf03aadd56b3792e363495606e42181a26f626ebce7ca16096081e05ef31b62e752ebaf15b56c27273ee0a5bc518ea2126d4abeeb12d61215

  • C:\Users\Admin\AppData\Local\Temp\2517521501.exe

    Filesize

    7KB

    MD5

    74492fec4944600b61dd6afe85a49eb5

    SHA1

    1d39770b2e0fd716d189981b6c3e777716662466

    SHA256

    eb9961dacff3234c35fd1edb241ecabd488cb12211be587982fd292b463a222e

    SHA512

    82a1679aca44e9ecf03aadd56b3792e363495606e42181a26f626ebce7ca16096081e05ef31b62e752ebaf15b56c27273ee0a5bc518ea2126d4abeeb12d61215

  • C:\Users\Admin\AppData\Local\Temp\288066304.exe

    Filesize

    77KB

    MD5

    3560792f6c31f4a356405ab3823e73db

    SHA1

    e18e31539269df2c0fc338858a752084a94d53f2

    SHA256

    ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6

    SHA512

    36f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e

  • C:\Users\Admin\AppData\Local\Temp\288066304.exe

    Filesize

    77KB

    MD5

    3560792f6c31f4a356405ab3823e73db

    SHA1

    e18e31539269df2c0fc338858a752084a94d53f2

    SHA256

    ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6

    SHA512

    36f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e

  • C:\Users\Admin\AppData\Local\Temp\288066304.exe

    Filesize

    77KB

    MD5

    3560792f6c31f4a356405ab3823e73db

    SHA1

    e18e31539269df2c0fc338858a752084a94d53f2

    SHA256

    ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6

    SHA512

    36f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e

  • C:\Users\Admin\AppData\Local\Temp\3995335287.exe

    Filesize

    179KB

    MD5

    e179b14f26972c159c58519496978a07

    SHA1

    dcf842645127686af3c13f21fa5ea4a760c87c61

    SHA256

    f9d387135a7a4e49eb96fc29d3da8f412d870417bf684b5e8ae91c4a1fbcc6d5

    SHA512

    6cc943e64605a8c182a8d54a2804214e72a1cc128d7a275aee4c4d7e9f0c8731d3813e165876f8370ed67ec498825f46bfe5c3831152862de154e6709d93dba1

  • C:\Users\Admin\AppData\Local\Temp\3995335287.exe

    Filesize

    179KB

    MD5

    e179b14f26972c159c58519496978a07

    SHA1

    dcf842645127686af3c13f21fa5ea4a760c87c61

    SHA256

    f9d387135a7a4e49eb96fc29d3da8f412d870417bf684b5e8ae91c4a1fbcc6d5

    SHA512

    6cc943e64605a8c182a8d54a2804214e72a1cc128d7a275aee4c4d7e9f0c8731d3813e165876f8370ed67ec498825f46bfe5c3831152862de154e6709d93dba1

  • C:\Users\Admin\AppData\Local\Temp\970512562.exe

    Filesize

    6KB

    MD5

    7f8e65baa2a26c58977fb7a85850f2b0

    SHA1

    f2e9b5015ad648f6690efc7b847e1e8398163069

    SHA256

    048b155a427d2563df87eb1b34b5a7ea3158253bff073cd2107642332ce6e7fe

    SHA512

    3b7151d8f8d8402aa1be064ea3519786a8b7ca0a159dcbbc58f144e23c4d3d88f5d9136fb9f0cc0b47e6c4fa464b13ea2282c0de5f04802a7b5643a21bb70d01

  • C:\Users\Admin\AppData\Local\Temp\970512562.exe

    Filesize

    6KB

    MD5

    7f8e65baa2a26c58977fb7a85850f2b0

    SHA1

    f2e9b5015ad648f6690efc7b847e1e8398163069

    SHA256

    048b155a427d2563df87eb1b34b5a7ea3158253bff073cd2107642332ce6e7fe

    SHA512

    3b7151d8f8d8402aa1be064ea3519786a8b7ca0a159dcbbc58f144e23c4d3d88f5d9136fb9f0cc0b47e6c4fa464b13ea2282c0de5f04802a7b5643a21bb70d01

  • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe

    Filesize

    16KB

    MD5

    22f2666659ba947c9974fb70ffba0efa

    SHA1

    1a8ce0516638a9b64129f5de3a5169aea958495d

    SHA256

    90e109884750afed408867ab5d697d56b53620027d91a466a338a90f53ebbe02

    SHA512

    67f9333b9a70fe3d0ca6d7bf019e3a661fd43b74fc1d25dd393bc2bb8d799d2b699ea7d1fddeda7971a0b7fcbd8ae6b7b1b2c70526770a2362a7d4482e55a6c3

  • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe

    Filesize

    16KB

    MD5

    22f2666659ba947c9974fb70ffba0efa

    SHA1

    1a8ce0516638a9b64129f5de3a5169aea958495d

    SHA256

    90e109884750afed408867ab5d697d56b53620027d91a466a338a90f53ebbe02

    SHA512

    67f9333b9a70fe3d0ca6d7bf019e3a661fd43b74fc1d25dd393bc2bb8d799d2b699ea7d1fddeda7971a0b7fcbd8ae6b7b1b2c70526770a2362a7d4482e55a6c3

  • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe

    Filesize

    16KB

    MD5

    22f2666659ba947c9974fb70ffba0efa

    SHA1

    1a8ce0516638a9b64129f5de3a5169aea958495d

    SHA256

    90e109884750afed408867ab5d697d56b53620027d91a466a338a90f53ebbe02

    SHA512

    67f9333b9a70fe3d0ca6d7bf019e3a661fd43b74fc1d25dd393bc2bb8d799d2b699ea7d1fddeda7971a0b7fcbd8ae6b7b1b2c70526770a2362a7d4482e55a6c3

  • C:\Users\Admin\AppData\Local\Temp\Windows Security Upgrade Service.exe

    Filesize

    16KB

    MD5

    22f2666659ba947c9974fb70ffba0efa

    SHA1

    1a8ce0516638a9b64129f5de3a5169aea958495d

    SHA256

    90e109884750afed408867ab5d697d56b53620027d91a466a338a90f53ebbe02

    SHA512

    67f9333b9a70fe3d0ca6d7bf019e3a661fd43b74fc1d25dd393bc2bb8d799d2b699ea7d1fddeda7971a0b7fcbd8ae6b7b1b2c70526770a2362a7d4482e55a6c3

  • C:\Windows\sysdrvefda.exe

    Filesize

    77KB

    MD5

    3560792f6c31f4a356405ab3823e73db

    SHA1

    e18e31539269df2c0fc338858a752084a94d53f2

    SHA256

    ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6

    SHA512

    36f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e

  • C:\Windows\sysdrvefda.exe

    Filesize

    77KB

    MD5

    3560792f6c31f4a356405ab3823e73db

    SHA1

    e18e31539269df2c0fc338858a752084a94d53f2

    SHA256

    ce87790b45cd1822a71e4d81733ec535a8aa5c42ec48f3593b14c5049ab635e6

    SHA512

    36f65fd5e1cec6ef5bfb22d74fd40712c4bae346d2c6aa45d86253715fdecb7c071ac056afa59432f93361083c58750968b7126e23c2a888facb625456135b9e

  • memory/1192-179-0x0000000002F70000-0x0000000002F8C000-memory.dmp

    Filesize

    112KB

  • memory/1192-181-0x0000000002F70000-0x0000000002F8C000-memory.dmp

    Filesize

    112KB

  • memory/1192-182-0x0000000002FA0000-0x0000000002FBA000-memory.dmp

    Filesize

    104KB

  • memory/1192-183-0x0000000003120000-0x0000000004120000-memory.dmp

    Filesize

    16.0MB

  • memory/1192-185-0x0000000002F70000-0x0000000002F8C000-memory.dmp

    Filesize

    112KB