Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3bootstrap.zip
windows7-x64
1bootstrap.zip
windows10-2004-x64
8bootstrap/...er.exe
windows7-x64
10bootstrap/...er.exe
windows10-2004-x64
10bootstrap/...64.dll
windows7-x64
1bootstrap/...64.dll
windows10-2004-x64
6bootstrap/...10.dll
windows7-x64
1bootstrap/...10.dll
windows10-2004-x64
8bootstrap/...11.dll
windows7-x64
1bootstrap/...11.dll
windows10-2004-x64
8bootstrap/...64.dll
windows7-x64
10bootstrap/...64.dll
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
09/02/2025, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
bootstrap.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bootstrap.zip
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
bootstrap/bootstrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
bootstrap/bootstrapper.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
bootstrap/tier0_s64.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
bootstrap/tier0_s64.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
bootstrap/vcruntime210.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
bootstrap/vcruntime210.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
bootstrap/vcruntime211.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
bootstrap/vcruntime211.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
bootstrap/vstdlib_s64.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
bootstrap/vstdlib_s64.dll
Resource
win10v2004-20250129-en
General
-
Target
bootstrap/vstdlib_s64.dll
-
Size
3.2MB
-
MD5
2af311d5fdb8df6250ee6681edea15bb
-
SHA1
68cea60147b29ae47fd18d97698e9bcf6f713c36
-
SHA256
c1cd2c6fd3c17d9e67ec45436064b911f2dc81fb2c32ece5ef9878b8af35dda5
-
SHA512
b20a08a1690dac97c456acc1cd8bfe01b3310c490abee3063a5189f45e28e0ac116f313524b9ca5003b84e2cc07c090e28a9fa9240fa3e4f03d9cf1fe00240de
-
SSDEEP
49152:wSN5WWMbW0m7Dng+arKHXKS2n4qBJ9X1LaYztS:FV4546S2n4Q9Fh
Malware Config
Signatures
-
Detects Rhadamanthys payload 4 IoCs
resource yara_rule behavioral12/memory/3872-1-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral12/memory/3872-4-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral12/memory/3872-3-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral12/memory/3872-2-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3872 created 2708 3872 aspnet_wp.exe 45 -
Enumerates VirtualBox registry keys 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo rundll32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rundll32.exe -
Looks for VMWare services registry key. 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vmtools rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VMMEMCTL rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1192 set thread context of 3872 1192 rundll32.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 4064 3872 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_wp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1192 rundll32.exe 3872 aspnet_wp.exe 3872 aspnet_wp.exe 3872 aspnet_wp.exe 3872 aspnet_wp.exe 2676 fontdrvhost.exe 2676 fontdrvhost.exe 2676 fontdrvhost.exe 2676 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1192 rundll32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 1192 wrote to memory of 3872 1192 rundll32.exe 84 PID 3872 wrote to memory of 2676 3872 aspnet_wp.exe 88 PID 3872 wrote to memory of 2676 3872 aspnet_wp.exe 88 PID 3872 wrote to memory of 2676 3872 aspnet_wp.exe 88 PID 3872 wrote to memory of 2676 3872 aspnet_wp.exe 88 PID 3872 wrote to memory of 2676 3872 aspnet_wp.exe 88
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2708
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bootstrap\vstdlib_s64.dll,#11⤵
- Enumerates VirtualBox registry keys
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare services registry key.
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 3443⤵
- Program crash
PID:4064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3872 -ip 38721⤵PID:1104