Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
rha.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
rha.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
data.bin
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
data.bin
Resource
win10v2004-20240319-en
Behavioral task
behavioral5
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
file.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
g2m.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
g2m.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
run.bat
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
run.bat
Resource
win10v2004-20240226-en
General
-
Target
run.bat
-
Size
70B
-
MD5
922d706a6ff52cd5f8ff57287aec9907
-
SHA1
c2093b630f1180bc8b48c71957655182f6a56053
-
SHA256
12ecd3179026dc979012895d1ba547cdd48b6940d34eb5cca266ef943c990efd
-
SHA512
eca850162e741141a2a7e62a028cfb3c9ec45baecbdf9a0560fbc82a3aed2ef9fccd108aa8b167002fd1727e0170cdfc29a3d5d4bb574690cdeefa6b2b3e6fb3
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4432 created 2500 4432 file.exe 43 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4432 file.exe 4432 file.exe 4600 dialer.exe 4600 dialer.exe 4600 dialer.exe 4600 dialer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4432 2724 cmd.exe 86 PID 2724 wrote to memory of 4432 2724 cmd.exe 86 PID 2724 wrote to memory of 4432 2724 cmd.exe 86 PID 4432 wrote to memory of 4600 4432 file.exe 90 PID 4432 wrote to memory of 4600 4432 file.exe 90 PID 4432 wrote to memory of 4600 4432 file.exe 90 PID 4432 wrote to memory of 4600 4432 file.exe 90 PID 4432 wrote to memory of 4600 4432 file.exe 90
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2500
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\run.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\file.exe"file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4432
-