Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe
Resource
win10v2004-20230221-en
6 signatures
150 seconds
General
-
Target
8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe
-
Size
321KB
-
MD5
784f70d97ad1d6ac85d6da3d8b6e16e7
-
SHA1
5a79928b6d32e1453d80fe6e659149c51c69210f
-
SHA256
8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170
-
SHA512
18d391e3e745d2868263bf8585a0e20f9cc8593011548cb3c698f1d223390f9d6d8bc5cb0af8496d88b4d887544c5095f39490521f3f8fa0ccbe09f2af2413c6
-
SSDEEP
6144:AvzUG7LoIuguebyz4BeUVLxrXgZCHHOY48rkl1oZ:AvIG7sIuguem48+EEOYr
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/2564-138-0x00000000007C0000-0x00000000007DC000-memory.dmp family_rhadamanthys behavioral1/memory/2564-140-0x00000000007C0000-0x00000000007DC000-memory.dmp family_rhadamanthys behavioral1/memory/2564-143-0x00000000007C0000-0x00000000007DC000-memory.dmp family_rhadamanthys behavioral1/memory/2564-145-0x00000000007C0000-0x00000000007DC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2564 8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe 2564 8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe 2564 8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 856 2564 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe 2564 8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2564 wrote to memory of 3760 2564 8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe 93 PID 2564 wrote to memory of 3760 2564 8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe"C:\Users\Admin\AppData\Local\Temp\8d150f2f91160ea3e346dd9e9899806f9bfeeca4ce15a55bdd7a8122e37e8170.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"2⤵PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 7202⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2564 -ip 25641⤵PID:3280