Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
submitted
22/02/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240221-en
General
-
Target
file.exe
-
Size
7.0MB
-
MD5
c8db2f9f25b602a5767c4ef64e91edf5
-
SHA1
e3cd3c6fb74566ec4bfd60d3b60caec663e4b70d
-
SHA256
9d3e7d4692c6af50fd2a5f53aadff9af93494ec76523ecb5d8d58c0bb7239f0d
-
SHA512
0a559392dd1bfa42e79332e96b4bc9f67a56ff1783e6437b92dbce79c4b9bdd0244004c2ab9f4260726640eb76ec1dcd86b5374f07e7aadb5d0d0248e1ac3faa
-
SSDEEP
98304:k9EcV/SME07imZBM0cqXyQTbsC27fD4J09hoPbrzk56M:k9xVSMHjM04vCoM075QM
Malware Config
Extracted
rhadamanthys
https://94.156.8.76:4283/f4c10475f694ccdacf6c7/c7obtbv3.jwqfn
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2728 created 2444 2728 MsBuild.exe 58 -
Loads dropped DLL 1 IoCs
pid Process 1060 file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1060 set thread context of 2728 1060 file.exe 88 -
Program crash 2 IoCs
pid pid_target Process procid_target 1152 2728 WerFault.exe 88 1888 2728 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2728 MsBuild.exe 2728 MsBuild.exe 2272 dialer.exe 2272 dialer.exe 2272 dialer.exe 2272 dialer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 1060 wrote to memory of 2728 1060 file.exe 88 PID 2728 wrote to memory of 2272 2728 MsBuild.exe 90 PID 2728 wrote to memory of 2272 2728 MsBuild.exe 90 PID 2728 wrote to memory of 2272 2728 MsBuild.exe 90 PID 2728 wrote to memory of 2272 2728 MsBuild.exe 90 PID 2728 wrote to memory of 2272 2728 MsBuild.exe 90
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2444
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 4443⤵
- Program crash
PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 4563⤵
- Program crash
PID:1888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2728 -ip 27281⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2728 -ip 27281⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719