Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2023, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe
Resource
win10v2004-20230703-en
General
-
Target
634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe
-
Size
522KB
-
MD5
3b5d0aef51de61ffb2ae53eeaa34766c
-
SHA1
dda5f974b42d9ee4018f639a14de08a604ebf47e
-
SHA256
634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331
-
SHA512
eef0e031d14bb4726053905d30f9a1662d80e1a655e6621f3e30ea5b9aeb25993dce77ceb348c85604a330da4e76a3213cef8b077e93c73d691ec9dd469de414
-
SSDEEP
6144:jLjyoI3G4Xy/tD+/FSnTe3JaNJQ+30oKCYjLIAiEd4fM7KdD7O2AT:jvm3PysN5yQu8CY3Iwd4V71Q
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/5096-138-0x00000000027A0000-0x0000000002BA0000-memory.dmp family_rhadamanthys behavioral1/memory/5096-139-0x00000000027A0000-0x0000000002BA0000-memory.dmp family_rhadamanthys behavioral1/memory/5096-140-0x00000000027A0000-0x0000000002BA0000-memory.dmp family_rhadamanthys behavioral1/memory/5096-141-0x00000000027A0000-0x0000000002BA0000-memory.dmp family_rhadamanthys behavioral1/memory/5096-152-0x00000000027A0000-0x0000000002BA0000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5096 created 3168 5096 634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe 57 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5096 634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe 5096 634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe 5096 634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe 5096 634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5096 wrote to memory of 2012 5096 634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe 98 PID 5096 wrote to memory of 2012 5096 634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe 98 PID 5096 wrote to memory of 2012 5096 634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe 98 PID 5096 wrote to memory of 2012 5096 634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe"C:\Users\Admin\AppData\Local\Temp\634c0528fb0188f00a639d22f3b5c2d97a799f832d90edf402cb752ce7308331.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5096
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵PID:2012
-