Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    27s
  • max time network
    34s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/07/2024, 02:11

General

  • Target

    Software_Setup.exe

  • Size

    63.9MB

  • MD5

    9ff7e52416b7d3ca8b7e035d4b15f60d

  • SHA1

    ecf06e8679da62922f3d52d2b9e756ba311e4203

  • SHA256

    ec4cd02feeae2e57341cb7ff396fac7d635c914775357b95a0ae3bb73ced8703

  • SHA512

    974b9d2d21ffc0d780fb5bb531db3f4edf979e032e2b0fa9048310885fa7cac06fc138b4aa5a9d6bb19a7fc7676c72e98a9ba9c60b35428a699774b34af474af

  • SSDEEP

    1572864:jDkFLa2/bDkFLa2/bDkFLa2/bDkFLa2/bDkFLa2/z:j6/6/6/6/6f

Score
10/10

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
    1⤵
      PID:2968
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:900
    • C:\Users\Admin\AppData\Local\Temp\Software_Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Software_Setup.exe"
      1⤵
      • Suspicious use of SetThreadContext
      PID:4376
      • C:\Windows\winhlp32.exe
        "C:\Windows\winhlp32.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        PID:4932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 524
          3⤵
          • Program crash
          PID:4624
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 516
          3⤵
          • Program crash
          PID:3996
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb2c1f9758,0x7ffb2c1f9768,0x7ffb2c1f9778
        2⤵
          PID:3320
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=2012,i,16113490365008881130,18248475048483174149,131072 /prefetch:2
          2⤵
            PID:3276
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=2012,i,16113490365008881130,18248475048483174149,131072 /prefetch:8
            2⤵
              PID:4948
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1876 --field-trial-handle=2012,i,16113490365008881130,18248475048483174149,131072 /prefetch:8
              2⤵
                PID:300
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=2012,i,16113490365008881130,18248475048483174149,131072 /prefetch:1
                2⤵
                  PID:3880
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=2012,i,16113490365008881130,18248475048483174149,131072 /prefetch:1
                  2⤵
                    PID:2252
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4368 --field-trial-handle=2012,i,16113490365008881130,18248475048483174149,131072 /prefetch:1
                    2⤵
                      PID:5008
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4952 --field-trial-handle=2012,i,16113490365008881130,18248475048483174149,131072 /prefetch:8
                      2⤵
                        PID:2688
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=2012,i,16113490365008881130,18248475048483174149,131072 /prefetch:8
                        2⤵
                          PID:336
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1652 --field-trial-handle=2012,i,16113490365008881130,18248475048483174149,131072 /prefetch:8
                          2⤵
                            PID:1084
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level
                            2⤵
                              PID:4580
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x24c,0x250,0x254,0x234,0x258,0x7ff67a487688,0x7ff67a487698,0x7ff67a4876a8
                                3⤵
                                  PID:4244
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level
                                2⤵
                                  PID:492
                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff67a487688,0x7ff67a487698,0x7ff67a4876a8
                                    3⤵
                                      PID:408
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:4828

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    944B

                                    MD5

                                    39901cb6d4c9a1064285f54916cbfd76

                                    SHA1

                                    e66678a581061a348026b736c6ff9b5fbd8a6c8e

                                    SHA256

                                    495cbaea42ba399e6c37e8b8b363018553163352e11c2b7084844f54a0f6f688

                                    SHA512

                                    31019a18937a7aee0a81c752aef8305a70b7706442aa4efaf468c4d27158bc4e9adf0442e10205a90c699a3c7a7a1c596744c20a474744a4e9b2a04f621f00a7

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    371B

                                    MD5

                                    98c7731fe329019fdbb6d12a5e9e8a81

                                    SHA1

                                    fb3729daded95991d1a38213ed49231442e38ef3

                                    SHA256

                                    81c637d516f0fa4fdbb578bd8b8226f9878a1e750b1d3f5bdd95a326a345c046

                                    SHA512

                                    d62e8e0de484f6b7af99361b7deb7cf7214412c25f606af56f60db613e6af0334294a6f3f05e55859cdb74070f6347ff1d622cecfad82311bd3eb7701aac93f4

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    0b3c1050821493549f8e31619d23f056

                                    SHA1

                                    ff0ae64ab065552f498090d2eb2a7b7d419dd7ef

                                    SHA256

                                    a6ca67754dfb585cdaa237cfc32fbcc31e4067e45be09b35f05418a200132670

                                    SHA512

                                    68aa75448fce1615128c3c921ac74eda821d66d436ddb4ea7c7ff5b7e03fa6acf3f2cdfb5a8c06626c5bd134c2fc1c9097f14dab8b98b00e89c3bc54af5ea733

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    bfa64f0cb04bc9f30bcf0e87ad715dc7

                                    SHA1

                                    c5f26bca2db3218125171d0cea4c66720e180c8b

                                    SHA256

                                    37ac4467f5399dd1811335235c57eb8ee4b8b75da7d721e6b77a8c24a235996e

                                    SHA512

                                    d6cbf67778dbcc4acb618edb82847b88f59098b3b8616adc7a85502e9bbeea79c58e31daa0abd8941424e57506699f61d6229a3ac154fedd27a92b4d97486a0d

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                    Filesize

                                    15KB

                                    MD5

                                    9ced25e3dcd171fb6c074a405d2c5c30

                                    SHA1

                                    4f3a5013c93f93fbdf301f9b957d46d4e18620e3

                                    SHA256

                                    b520c35b842d908693a744d4932e929752459b7b58781a982ed265118c0d4a16

                                    SHA512

                                    9d97b8efca574f5afeb819b26bf2b42e1209aed28f04980d4ef6fb5ec45ab7535793d893f8ff74c6363602d46531c9e067ddc70c1e84049c85b3960b9d084968

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    288KB

                                    MD5

                                    913285ac0d4c6dd341d0d721d6a6af1c

                                    SHA1

                                    388b50cb1c214aa318bd0f2616dbfae2463c4400

                                    SHA256

                                    85ba9b42d0bb94875343ecb77b7543b7fa727e1504495c0b702e8904af1b1784

                                    SHA512

                                    40a98af55f5dad1a7563ef9ce5829d34e3e5bc57135c7579053f08586ede2a09ee710e9d3ae6b5ecadd01e8f4d6f40c8170481bc06b1f6b116cef924b2184c3b

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    137KB

                                    MD5

                                    e74f71c6bdbc2ce886d3c59ebeb6117c

                                    SHA1

                                    dcb75662c459f5c65b607c83e0a2fa09aac97ea3

                                    SHA256

                                    918c36cd4a87e15699ba9c21464450dc402e6201b7ebfee4475d56f2561c494b

                                    SHA512

                                    53b84fab57c56c5cfd25ab0b2c87535882c7f63e3d8d3d4b525abd9aa8328f227739ed1c1742437041517920e8ae675254d73a182bfc8bacff0b1022c097f00a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    288KB

                                    MD5

                                    6b2b96b7089e216fa73e724742653ec4

                                    SHA1

                                    0013ccd00a7248d3e63a6c5a103b5122b74da3ee

                                    SHA256

                                    d9903fb7940130f483997f549612947b045832e1ff8100efa638e7f011efd491

                                    SHA512

                                    c242b18a492da664ca44ca8cea58c442e16ceb10356432aad47dc8037ba01b1b194e41e5cbfdf79b26fab01fc0852d4123c2acd784e74b81a9cf3c5dde12d1a3

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                    Filesize

                                    2B

                                    MD5

                                    99914b932bd37a50b983c5e7c90ae93b

                                    SHA1

                                    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                    SHA256

                                    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                    SHA512

                                    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                  • C:\Windows\TEMP\Crashpad\settings.dat

                                    Filesize

                                    40B

                                    MD5

                                    3c2cf370210349cde17c84c1d8ab7a36

                                    SHA1

                                    5da67b2fa8a30e891b6a0e4cb39fa2d6931f17f4

                                    SHA256

                                    f98e79370808edb1c8f5f754bf6cc259c63618b47a58751f285c25786546c877

                                    SHA512

                                    3e869131d1fc22b6dba4a4ec246c720e480f6044d52f9a0e62ecdeff20268c290db373b341444bbfd6c6a6b1e3397a13f75f42ec9343beb8eccaad8a1143a4dc

                                  • memory/900-41-0x0000000004350000-0x0000000004750000-memory.dmp

                                    Filesize

                                    4.0MB

                                  • memory/900-42-0x00007FFB37EA0000-0x00007FFB3807B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/900-44-0x0000000077130000-0x00000000772F2000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/900-39-0x0000000002560000-0x0000000002569000-memory.dmp

                                    Filesize

                                    36KB

                                  • memory/4932-35-0x0000000005720000-0x0000000005B20000-memory.dmp

                                    Filesize

                                    4.0MB

                                  • memory/4932-38-0x0000000077130000-0x00000000772F2000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4932-36-0x00007FFB37EA0000-0x00007FFB3807B000-memory.dmp

                                    Filesize

                                    1.9MB

                                  • memory/4932-34-0x0000000005720000-0x0000000005B20000-memory.dmp

                                    Filesize

                                    4.0MB

                                  • memory/4932-25-0x0000000000400000-0x000000000047E000-memory.dmp

                                    Filesize

                                    504KB

                                  • memory/4932-23-0x0000000000400000-0x000000000047E000-memory.dmp

                                    Filesize

                                    504KB