Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll
Resource
win10v2004-20250129-en
General
-
Target
8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll
-
Size
62.0MB
-
MD5
c878951a604018f259ac092ff2251a98
-
SHA1
b5a1a4cd2b88ed67adcb6293e54c1b13953c6f19
-
SHA256
8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553
-
SHA512
c827468238bea1de6fabcd46f45a62accdaba62d4f3506f4baba15b846d47fcd1a21134700639f55ee532a6b38fa769df0c12e5f568b49ab8d7e8a2628068a05
-
SSDEEP
1572864:9YsjkeZwu3B4RHLqyzWZvbYF8WNLKUnBDUpG5FQ:vIfzW6xBK
Malware Config
Signatures
-
Detects Rhadamanthys payload 4 IoCs
resource yara_rule behavioral2/memory/5024-2-0x0000000000B30000-0x0000000000BB1000-memory.dmp Rhadamanthys_v8 behavioral2/memory/5024-4-0x0000000000B30000-0x0000000000BB1000-memory.dmp Rhadamanthys_v8 behavioral2/memory/5024-3-0x0000000000B30000-0x0000000000BB1000-memory.dmp Rhadamanthys_v8 behavioral2/memory/5024-5-0x0000000000B30000-0x0000000000BB1000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5024 created 396 5024 rundll32.exe 49 -
Program crash 1 IoCs
pid pid_target Process procid_target 4276 5024 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5024 rundll32.exe 5024 rundll32.exe 5024 rundll32.exe 5024 rundll32.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3372 wrote to memory of 3516 3372 rundll32.exe 83 PID 3372 wrote to memory of 3516 3372 rundll32.exe 83 PID 3372 wrote to memory of 3516 3372 rundll32.exe 83 PID 3516 wrote to memory of 5024 3516 rundll32.exe 87 PID 3516 wrote to memory of 5024 3516 rundll32.exe 87 PID 3516 wrote to memory of 5024 3516 rundll32.exe 87 PID 3516 wrote to memory of 5024 3516 rundll32.exe 87 PID 3516 wrote to memory of 5024 3516 rundll32.exe 87 PID 5024 wrote to memory of 4892 5024 rundll32.exe 88 PID 5024 wrote to memory of 4892 5024 rundll32.exe 88 PID 5024 wrote to memory of 4892 5024 rundll32.exe 88 PID 5024 wrote to memory of 4892 5024 rundll32.exe 88 PID 5024 wrote to memory of 4892 5024 rundll32.exe 88
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:396
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 5844⤵
- Program crash
PID:4276
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5024 -ip 50241⤵PID:1712