Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2025, 11:32

General

  • Target

    Release/New V1.0.3.exe

  • Size

    1.2MB

  • MD5

    bb51d554e3b4fd7fed2bad278b9970d0

  • SHA1

    7d6f516b0755b2472bfb39d086da0106a8eb3e68

  • SHA256

    1fb66beef1b9185abbf99a473188a755a0dee0e122a066a0e0776e251d716f95

  • SHA512

    acafe93c075c71b94ab3efacaec6dd168986d2a88b330958e57647adaca4e043a5ea538bb0007ba8685925c8373fda6a3d99c59c9f30f65de8fc948e2304efac

  • SSDEEP

    24576:lsKH7wrz1OIcJhiTKGOwD8HxgQotG411iS4QZl+5nLHoWLb57BW21wRqNb:rjIcJhrJxgQHPS42sHoWH9QuA+

Malware Config

Signatures

  • Detects Rhadamanthys payload 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1100
      • C:\Users\Admin\AppData\Local\Temp\Release\New V1.0.3.exe
        "C:\Users\Admin\AppData\Local\Temp\Release\New V1.0.3.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Sent Sent.cmd & Sent.cmd
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2988
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2972
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1840
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:816
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 261464
            4⤵
            • System Location Discovery: System Language Discovery
            PID:864
          • C:\Windows\SysWOW64\extrac32.exe
            extrac32 /Y /E Carroll
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1940
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "Circumstances" Club
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2132
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b 261464\Unity.com + Excellent + Annotation + Changing + Decades + Beginning + Junior + Notebooks + Regional + License + Blog 261464\Unity.com
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3004
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Products + ..\Additions + ..\Promotions + ..\Packet + ..\Weblogs + ..\Variation + ..\Among + ..\Volleyball + ..\Story f
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2300
          • C:\Users\Admin\AppData\Local\Temp\261464\Unity.com
            Unity.com f
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2736
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3012
      • C:\Users\Admin\AppData\Local\Temp\261464\Unity.com
        "C:\Users\Admin\AppData\Local\Temp\261464\Unity.com"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\261464\Unity.com

      Filesize

      62KB

      MD5

      89be5b6076fbb79a64ee4d395a19ccd7

      SHA1

      67ad1372d5ed61dd8db00392ddbefbcce9f69349

      SHA256

      111fd721103ca034d2394fe6f160a65aae9a850dd4000503ebdfc731ed7dfcf5

      SHA512

      734954912c247563bb42d3f5aa18d63767266affde7b1cbb400ba6b45fe466467d60795ecd6aa18ff83506d6e07ff76ad4c1d08acdfaab7712ce2940c09aec02

    • C:\Users\Admin\AppData\Local\Temp\261464\f

      Filesize

      659KB

      MD5

      0c333a581ed96e1e6a88953420dda7a9

      SHA1

      64850d764dd78c09142bc69be5dd9de0b3f94804

      SHA256

      12b25168ff8a9cf95062d43c335690ef1f7bc85e991995ac29bc40cca8888e0d

      SHA512

      43cd057d602c3822ef4acad70762d91af7b41188c8f0e421a7e08ca04ef29c2c02a801d88a106be8976affa685357918a7bc5552c8b233a4398895236cf0f53b

    • C:\Users\Admin\AppData\Local\Temp\Additions

      Filesize

      90KB

      MD5

      c72f068db481aea27a842c9bfe9860cd

      SHA1

      a5561a6759b918a5764704a6e11b3db42aa87a62

      SHA256

      286f77e1e107ffc16bddc64df1d9002c15a832c4cebd4c5b880f39edc0881e76

      SHA512

      d7fad6083e721437d54c706310ca3ca467c7b9cacb285e774a94df82929cf1f885d05a2b57570dedd5114741f0fbf7ebcd7cec1f91a43881ed12b7129cf21b8f

    • C:\Users\Admin\AppData\Local\Temp\Among

      Filesize

      79KB

      MD5

      7012d631f674f310afa13ce8914d65fd

      SHA1

      22a7c3cad15d58e3a457a85283819fc011fb3723

      SHA256

      1c914ffb2f2482606616fb6ebde6f0a7a6951d5010de4ba2171a2e5c9e327d15

      SHA512

      4162b802b91d8e57d1e6a9d23f9e2e695d455cb2b90797a09e8a337097433c90770834fbab8e6b820c60f461058043ff854dfeaed4024aeddec2cbbd3c409c33

    • C:\Users\Admin\AppData\Local\Temp\Annotation

      Filesize

      101KB

      MD5

      ad452847037030c279a3f01b9f702b3e

      SHA1

      c9a3b155a3f60fce83e8246a2876444cc8c11671

      SHA256

      cf6ba1c4d063a7804dfcdc92684d38f1780780fbe979812155eac32a393a003c

      SHA512

      c88e1486022f1bcba7b00848a7f426443e006532d29c925e75f47abc136cf263a166ea0c0ffd167aa2a10dc9ff521dcdb9e186bd000556aada467aa1d883f5bd

    • C:\Users\Admin\AppData\Local\Temp\Beginning

      Filesize

      62KB

      MD5

      d193671684129e46d875c809a6a19237

      SHA1

      252f0c80301c8e61c78540707a632ff29e2064a7

      SHA256

      248910e6ce536671b94115cd2de7c2536e44aa0bf458ff4e2049975553c10857

      SHA512

      8722aef442243a32c57a6854d8c7dc5306fc2175dac39d2dfefefcc5702234e2e1d4459158368adf3dcd2697f4e37701550d39f4f79856f7fe9b70e4619b873f

    • C:\Users\Admin\AppData\Local\Temp\Blog

      Filesize

      97KB

      MD5

      52ca742d1e9a64d89a3cf7636c33365b

      SHA1

      f6bf12bb1dd4bd5927702ff78c862511b036ee10

      SHA256

      3628cf39f9d0eee80c8dec592179dacf7e872f0c1c98aa42850a3cb5b764f73c

      SHA512

      fded7a474712b2e15ba79536665fb68b6fb06263b4a105412dbbd7f2fbd96f4cc6f5e40b2ba458db2e760c3b5ac3a21275ab14fae65e3fae4cb09e69b82c256e

    • C:\Users\Admin\AppData\Local\Temp\Carroll

      Filesize

      477KB

      MD5

      a77177e063866e67b654a09a832672c0

      SHA1

      6ee75c8e8829c39e6b2faae314389d02318f8f4d

      SHA256

      a7b45687d0a9e018e6e855831f91e762a54971cdf63531f53dbd8469393e85cd

      SHA512

      14984d6680ec1a7a0bf3b25db92ee3bb12d0b99abd52f8b33bb4369bc5bc69795c4fce5b28468d94354c5f33392ab605c97a9dbe174fc28fb4cabd428d532a61

    • C:\Users\Admin\AppData\Local\Temp\Changing

      Filesize

      78KB

      MD5

      f5935abba87ff80a1b04df9da907b8ec

      SHA1

      a584ce35e6e3ad19e28b5a0d911c82b1c8280a3f

      SHA256

      57bc7056743f23faaedd28978713bf6b07315a2ad25cbd438a2eecd0a4ed05ae

      SHA512

      9231ce1764e5766ebfded5ebafb98e7e1d3554bb39cead7dfe06ce53498820aafede8d66ee06ba8414e02251e193a862551927252458ae6769d472c927a2f9d2

    • C:\Users\Admin\AppData\Local\Temp\Club

      Filesize

      2KB

      MD5

      d40a9665e004c5013821eb49f33a0bb3

      SHA1

      c95a41dbf5736a553e7cee3712c34c9c502650cd

      SHA256

      36fbdb6df849a7569df809733c55594f7a85f564c1ea9253cc571f48e0b9e6de

      SHA512

      d6c91ce9cbb414680943c105e14529a8c73ff27a30a1eaa79f828d5dc075a616406c70736cee27d6e6f5d84a97c33613e728edae8a6caae2f8f5b8a6d493c50b

    • C:\Users\Admin\AppData\Local\Temp\Decades

      Filesize

      145KB

      MD5

      3d4c576e1a441a20097c61fa89e2fe4a

      SHA1

      0ed8693661fe17eb5c349151c9d3b83d02aadc58

      SHA256

      b1e89ae71184601a8686158391dadd9dc7a4c4cd1d9629261f6970504965a189

      SHA512

      3c71288cf30279f27380901bdc8d59af614a0bbf0118acf2be8d3f81e96e2345c1e899e8a92d5215f902292cedb92d3589cbd7cd246d7e4301f3ca15afde6136

    • C:\Users\Admin\AppData\Local\Temp\Excellent

      Filesize

      60KB

      MD5

      f25536572ad19cdc70cfa0abd5100b88

      SHA1

      34bb0452ea1e51dd3385dc73adb1695413b68292

      SHA256

      d78c31298eb299fe3de6e83e993256fe7d9d5ca7336227730921ebc1ddacb242

      SHA512

      c4de13ae2ef153e502ff07d42f9c61119e53f32c1f479dcf640b3e1edbf24bc90c5a64c135083afaf26cf9f3102309e8ba8c992961f03ba917be13f72f714815

    • C:\Users\Admin\AppData\Local\Temp\Junior

      Filesize

      109KB

      MD5

      a44cd41297d87bc0bf769e5625c43d5f

      SHA1

      c7e8d8073a98ceb8120cd74edf7736c8e1ce0d0d

      SHA256

      872e9a76d71fa36cff87360ee8b4ad58de8d7336649095cd8c0656c621bb2663

      SHA512

      a175da3080881f49c5b1ddf07d313c8501137a310de39bc28d1076c4d90ecf5d73c472e350f922098b08a899b1e578acb28a4b87a394872e8c1bafc7788cb94a

    • C:\Users\Admin\AppData\Local\Temp\License

      Filesize

      75KB

      MD5

      818d488f3102dd446be4a40844762190

      SHA1

      ffdd9aa9fa88ed506415f1cf6b3bd0efcfcd04fb

      SHA256

      b6cd579d3dc12c3d7b1208490834d500e040043f775f420ddf190b721bcdb398

      SHA512

      8c3e23d2a446182538c5f93a32a59c6ce589fba0b2326fc6893010f07ad774c236a673608bab9dc1513b8039cb68a13884160fc815eccc9b0d8ff2ca41901385

    • C:\Users\Admin\AppData\Local\Temp\Notebooks

      Filesize

      51KB

      MD5

      a362d53e8a3ed260b1f199183e0c6ef5

      SHA1

      adf2e7f54606c4e671673312e6912f6d7c81f588

      SHA256

      0979ca5f86f8467d92973f22390990f6986d8f3e2f6ab4d7be3204e5a541d722

      SHA512

      4910c9d708b9c17d2e7f95317b388249a829365ae24f8e229e0a1266b49c08bae1f2a38dca0810722e11964837d077b2ccb70d83a4b52748bdbdd59c49feb23b

    • C:\Users\Admin\AppData\Local\Temp\Packet

      Filesize

      81KB

      MD5

      456f43b6e72ff0d24fa3c53b217ba4d4

      SHA1

      faf97b154f4ff5cf3ea3c05edd181b678851b791

      SHA256

      06ce66ef041544e67e2285cb1058609c96956666fc9871ce73f7a18f935d9d22

      SHA512

      f305823a2874b563f8ee903261032ba7e906bb99e6ade2403d81794f4f62e1384262ca89766fd8fac860cdef13cdebf4bf4245af33d28d82b51ebf40944dcdf7

    • C:\Users\Admin\AppData\Local\Temp\Products

      Filesize

      98KB

      MD5

      111b101b105931f30eb83a71fe5afdd0

      SHA1

      c6d2a3d962cba8a577810a9f28a90f830868d085

      SHA256

      c4ba666d274ccd8b84f0b7a380a4631ff854fb13e1488de00e23f541def45c37

      SHA512

      094877a2d43d004e44140f6954bbb8536fe4671a81572033886de00001b84bdfbdb896dcda85bc9eec7e8497899bcc0e10697a24ab557d1ad1f09c3dce540633

    • C:\Users\Admin\AppData\Local\Temp\Promotions

      Filesize

      75KB

      MD5

      f27774e72d304c34dc7b89ad60d60795

      SHA1

      e4f2fac6ada186cb09f4453671dc975b7d05ff4a

      SHA256

      3528c5df4b5ffa9b32abd75b9ce12d64e06e6f074e6f423b15e34e414554aa1a

      SHA512

      2c22b06f67a4c9e41b96dff72c6a621dcd54308dd5e2b401074256b2cc7248158caae9d88f2f87d8521dc7e800c74bae10801dd8fc4f4049d898ca25d6b6192b

    • C:\Users\Admin\AppData\Local\Temp\Regional

      Filesize

      144KB

      MD5

      8a62bab69ae06519e4bbc92f11302008

      SHA1

      5ac11c04a6951a11a60e424040f56a1a073a5a4e

      SHA256

      c74739fcc933d5e007d3f8eaffcf90dc42c72aec7b306b96b78df7a3e46ff0b8

      SHA512

      1f7776575a7508c5cfcc8d35d7c6999f936b1a8dfa31116179394942eee27872beaf27b178b8028f697e64658e9e205bf81c2f096c86747ad15ea0b5f4b3c0b5

    • C:\Users\Admin\AppData\Local\Temp\Sent

      Filesize

      13KB

      MD5

      3ee7cdd746bba67652fc33569f65b26c

      SHA1

      faf8d585c7f958fb6fdb4c1722804e7cc72706a6

      SHA256

      830c15610555e0a97af93db9b52ca77def4a3f9f3591e92f7ca8ff24f6c0ba08

      SHA512

      5808fcdd9fd0f8cef9f2d4cfd09647fbebc1dc36384e8dc4ed77746e4b94315420d4005a6e37307583825c8bf5806ad86047507573a83046ce28fb939816b709

    • C:\Users\Admin\AppData\Local\Temp\Story

      Filesize

      16KB

      MD5

      868f399817a4fd0ccd2f6f7811a8ac6c

      SHA1

      dd7b57fe6fd0334c54d99ec6ffba70f681bd166c

      SHA256

      6e4c030887808454f3c0636e96cd37d51bf27dbc955cd749713729e6a27cf5f0

      SHA512

      2b479c61c71511420d0357053164073e0a32b4796321dfaa3b0757dfc146f45ec600c78b114e002e8caba26e2ad59cb3fa2148457bc889bfb769e3d16851aaad

    • C:\Users\Admin\AppData\Local\Temp\Variation

      Filesize

      62KB

      MD5

      e15f86584daedd177c1296dc33f188e4

      SHA1

      bc6515f729472565cffefb14a1ae3f14429a026d

      SHA256

      b52645f7bc60e9e6b7b49f4d5da26d5d64f4d44a38fa8afaae507d16a9ca8698

      SHA512

      5d6f9408a84e25e35aae00a9813685572bc5553a0a747cd5956cd9004259928ec3700f58c31ca08f1205fbcc27257f527092651e05d6138e20c87d280117c51e

    • C:\Users\Admin\AppData\Local\Temp\Volleyball

      Filesize

      61KB

      MD5

      463da136de6fde57596fcdb3372d6fd0

      SHA1

      085f19e35378ad99f6af3b40412ab355ae2d2de3

      SHA256

      edc012053ae253ed0877b417177f8dae9bc2040a91f9ed294e3b8ddb78627150

      SHA512

      5b86fd3249e9291f45370f27a8dd45d8ad407329648c03500d2fbddca99d9a9c73815420ee14dce2be963e06663bcd6d7342872ea83fbe5ab73b796809bf2608

    • C:\Users\Admin\AppData\Local\Temp\Weblogs

      Filesize

      97KB

      MD5

      d705b020227898d3e059653391c1b796

      SHA1

      6889cd184e9db0ef19cdb7fdde5917e03088d2ed

      SHA256

      c3ce02ff43ebb1c2015b96689cde0767ddc77dc76ad8e41d8b117f3bba196163

      SHA512

      411cad3b86b2aaa6baf4f71b5db65bca259c65c8e69c218504825c86c4f3c6171649fa7e2e37a2a96ebb5b7a85aa1d207d1ad9d67744f63df2d0efd071c3db4b

    • \Users\Admin\AppData\Local\Temp\261464\Unity.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • memory/2268-406-0x0000000076FA0000-0x0000000076FE7000-memory.dmp

      Filesize

      284KB

    • memory/2268-404-0x0000000077210000-0x00000000773B9000-memory.dmp

      Filesize

      1.7MB

    • memory/2268-403-0x00000000026D0000-0x0000000002AD0000-memory.dmp

      Filesize

      4.0MB

    • memory/2268-400-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/2736-391-0x0000000003980000-0x0000000003A01000-memory.dmp

      Filesize

      516KB

    • memory/2736-392-0x0000000003980000-0x0000000003A01000-memory.dmp

      Filesize

      516KB

    • memory/2736-394-0x0000000003A10000-0x0000000003E10000-memory.dmp

      Filesize

      4.0MB

    • memory/2736-395-0x0000000003A10000-0x0000000003E10000-memory.dmp

      Filesize

      4.0MB

    • memory/2736-396-0x0000000077210000-0x00000000773B9000-memory.dmp

      Filesize

      1.7MB

    • memory/2736-398-0x0000000076FA0000-0x0000000076FE7000-memory.dmp

      Filesize

      284KB

    • memory/2736-393-0x0000000003980000-0x0000000003A01000-memory.dmp

      Filesize

      516KB

    • memory/2736-389-0x0000000003980000-0x0000000003A01000-memory.dmp

      Filesize

      516KB

    • memory/2736-388-0x0000000003980000-0x0000000003A01000-memory.dmp

      Filesize

      516KB

    • memory/2736-387-0x0000000003980000-0x0000000003A01000-memory.dmp

      Filesize

      516KB