Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10CleanerV2.exe
windows7-x64
10CleanerV2.exe
windows10-2004-x64
10InstallSetup.exe
windows7-x64
8InstallSetup.exe
windows10-2004-x64
10Motrix-1.8.19-x64.exe
windows7-x64
7Motrix-1.8.19-x64.exe
windows10-2004-x64
7Rust_22_02...np.exe
windows7-x64
3Rust_22_02...np.exe
windows10-2004-x64
3SoftCPU.exe
windows7-x64
3SoftCPU.exe
windows10-2004-x64
7chrome.exe
windows7-x64
8chrome.exe
windows10-2004-x64
8client.exe
windows7-x64
10client.exe
windows10-2004-x64
10goodboy.exe
windows10-2004-x64
10install.exe
windows7-x64
10install.exe
windows10-2004-x64
10Resubmissions
14/03/2025, 13:03
250314-qacneavkv5 10Analysis
-
max time kernel
102s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2025, 13:03
Behavioral task
behavioral1
Sample
CleanerV2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
CleanerV2.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
InstallSetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
InstallSetup.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral5
Sample
Motrix-1.8.19-x64.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Motrix-1.8.19-x64.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
Rust_22_02_2023_gnp.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Rust_22_02_2023_gnp.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
SoftCPU.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
SoftCPU.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
chrome.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
chrome.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
client.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
client.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
goodboy.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
install.exe
Resource
win7-20241010-en
Behavioral task
behavioral17
Sample
install.exe
Resource
win10v2004-20250314-en
General
-
Target
install.exe
-
Size
439KB
-
MD5
e1d10be0d41ba9e8dbad2a53876b3a00
-
SHA1
e7a2d4f602bfd178eb4ec6ac9bd406cb5eae50ed
-
SHA256
5bc044ef951c5095e4b7c094df6e54b19dfaafcd148583bb694625b7a0900f1c
-
SHA512
1e7a4065ccf983853b6d212f1d9c9cf43374ee30fd89d4a8d67042b5b560127a7986d60533e949ae77efc48169f96d8ce4cd6f6b0f2f43edebabea238f17fdcb
-
SSDEEP
12288:1O7k28xC7HMDVBjfbL5S6IZ7OGQN/RutyU3ivG/Jt9:+OS6IZ7QN/R8yoaG/L
Malware Config
Signatures
-
Detects Rhadamanthys payload 2 IoCs
resource yara_rule behavioral17/memory/396-0-0x0000000000CE0000-0x0000000000D61000-memory.dmp Rhadamanthys_v8 behavioral17/memory/396-12-0x0000000000CE0000-0x0000000000D61000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 396 created 2784 396 install.exe 49 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 396 install.exe 396 install.exe 396 install.exe 396 install.exe 1000 svchost.exe 1000 svchost.exe 1000 svchost.exe 1000 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 396 wrote to memory of 1000 396 install.exe 83 PID 396 wrote to memory of 1000 396 install.exe 83 PID 396 wrote to memory of 1000 396 install.exe 83 PID 396 wrote to memory of 1000 396 install.exe 83 PID 396 wrote to memory of 1000 396 install.exe 83
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2784
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:396