Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    62s
  • max time network
    68s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/03/2025, 20:55

General

  • Target

    Bootstrapper.exe

  • Size

    250.0MB

  • MD5

    c7102c624c1599933063af2bc66ffd77

  • SHA1

    cbd5deda7ce4fb90fb8cf6295bacaaf9dbd265fc

  • SHA256

    3342b0a18be89977895326bdb51efaad6ad82a4ca8dbf420300debec0824f607

  • SHA512

    26e8c6a0f31a562577f42e63c70498228b65ebb6704d512a9d4db1e5edac56d5873a52bda94575637394ca4677f5d0ff5263681774bf171bed1396672b4c8018

  • SSDEEP

    24576:93RriG1mpGYo8xnYfdw6iBr/Lxc6FBirVADjZGpN+jP9zB77+swD:5Z9Aq86dwrLNcsYrwzV7rwD

Malware Config

Signatures

  • Detects Rhadamanthys payload 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2892
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:816
    • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4032
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c expand Maternity.xll Maternity.xll.bat & Maternity.xll.bat
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3736
        • C:\Windows\SysWOW64\expand.exe
          expand Maternity.xll Maternity.xll.bat
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3092
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:5928
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4468
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1396
        • C:\Windows\SysWOW64\findstr.exe
          findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2336
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 677001
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4840
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Taxation.xll
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4832
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "BO" Hawk
          3⤵
          • System Location Discovery: System Language Discovery
          PID:5024
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 677001\Conscious.com + Folk + Waterproof + Remains + Premiere + White + Invention + Delta + Existed + Lately + Planned 677001\Conscious.com
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4288
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Greater.xll + ..\Hence.xll + ..\Pairs.xll + ..\Picking.xll + ..\Fat.xll + ..\Bc.xll + ..\Subcommittee.xll + ..\Mask.xll + ..\Harvest.xll + ..\Gather.xll L
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3316
        • C:\Users\Admin\AppData\Local\Temp\677001\Conscious.com
          Conscious.com L
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:5012
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 932
            4⤵
            • Program crash
            PID:2056
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2384
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5012 -ip 5012
      1⤵
        PID:4668
      • C:\Windows\system32\BackgroundTransferHost.exe
        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
        1⤵
        • Modifies registry class
        PID:5804

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\a2798816-1184-410c-82aa-1441cd492e56.down_data

        Filesize

        555KB

        MD5

        5683c0028832cae4ef93ca39c8ac5029

        SHA1

        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

        SHA256

        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

        SHA512

        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

      • C:\Users\Admin\AppData\Local\Temp\677001\Conscious.com

        Filesize

        3KB

        MD5

        b06ae173f96bc4bb2b638cea97c5dbb0

        SHA1

        150424b47b3a96844723fc97df6bfb70587808bf

        SHA256

        cfd1c4b774d2a811b22bbab1dd4c5b04f8ec9d316f3033da597e99cddad56db1

        SHA512

        ba2b261ffc84352301a2b89055fcdf6f30a6ae3b15d8da728d9c6dd55c90ac4479c993851b5fb67d038f3c99e73b9230dac6a82977d1f466a8b892f2fe227cbb

      • C:\Users\Admin\AppData\Local\Temp\677001\Conscious.com

        Filesize

        925KB

        MD5

        62d09f076e6e0240548c2f837536a46a

        SHA1

        26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

        SHA256

        1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

        SHA512

        32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

      • C:\Users\Admin\AppData\Local\Temp\677001\L

        Filesize

        656KB

        MD5

        b6cfa179ed4f6ce4d1c3f733dd5fa25b

        SHA1

        6dc3a14ea9f3a6779b6227398af17991ba336dd6

        SHA256

        04e7d931a1b767e2bec8d954d3163505b44078f500d589447aa2b8fda632e98c

        SHA512

        df484ecd9aeae6f04ffd9cf11fdd8d425225eb8d2868ffe29afdfaee4a337ce45e886e687c05808e5546f70bd45283c0a4c2c5a25ddd53ccb060768654b4044f

      • C:\Users\Admin\AppData\Local\Temp\Bc.xll

        Filesize

        61KB

        MD5

        6ed41054372d0bb368d955d6a070a803

        SHA1

        f1a9621dbd245cabb08f3f4296569436a9474ac3

        SHA256

        598d42a7c5a106153b7ac405d6f2ad84724e1d135759b46d02bab971cf08f5b2

        SHA512

        e86e97f3c095acc6bbca870d0799e543e4d95fa9de9b26af9a9be47df06dc12c0d77f0e223a0068e191a2527bad804eb84e16a73763628befe7765b04f360903

      • C:\Users\Admin\AppData\Local\Temp\Delta

        Filesize

        121KB

        MD5

        e2d166e544d58a05a4c83ea6ac5561d0

        SHA1

        4c2ca5dda02465593ad4862051ab626c9edfc5e8

        SHA256

        60ba82f844fdb8217b8ac3f0990276001e499c8c55f5cf4b2c95fc61f0724531

        SHA512

        770ed44f6631ff52294251caba0673f45c10c7550d71fe6d43c3684ad9a3f64555b3b405fe6f43d22e4c00a5fa34b90fcb4e29e1ffd105c89c8105e2359d89b9

      • C:\Users\Admin\AppData\Local\Temp\Existed

        Filesize

        73KB

        MD5

        7981ee35c049b171464c6c15822abc40

        SHA1

        a7dc0311faf545bc16dd5db5d66a44db863ebedc

        SHA256

        9d59f5f2b749314fcee24515f2e23378697388ae25571d0c070d5a62a3b964ae

        SHA512

        5538d2b6dde3e0362997ce2495067cbe0dc3c354b82328f245479b8c8e62e66a85d0c16c8b8df69ff7a8d7bfa562e8f0ab00f861857302da8b4389b668490124

      • C:\Users\Admin\AppData\Local\Temp\Fat.xll

        Filesize

        74KB

        MD5

        db0a553f0830dd13ea00d489d75a59cf

        SHA1

        3be047bba4f4f6252b91879afb8eb1448e985463

        SHA256

        9c99a9c5c17fe4a33b81b5118baaad232397d87516f15718b73d028c34f29afb

        SHA512

        487f16c427fcc7aa13a058dd401cc845bf07a5a92de3fb49edf62a4be8279edf80ffa14465dbcbd5fd2fb76674c193995d9afb992ff9b4cd24ca7ba78502a066

      • C:\Users\Admin\AppData\Local\Temp\Folk

        Filesize

        133KB

        MD5

        6ee9cdf407cd19594250963cf9d181f4

        SHA1

        fb6f1977211b72ac2ccf550782c8acde4283f605

        SHA256

        b148578386b3ce0a7b2da505d33a886bf8f8e671c0d73b3bf4f9ec943c11df5b

        SHA512

        b689606aed7bfb497870bd36d543538e5ed76f19a005a1d7b9bb6338b7b6e5860ab880b8b26124abebe188ac9475a606639c65fd0649fd603e84de7718959fe3

      • C:\Users\Admin\AppData\Local\Temp\Gather.xll

        Filesize

        14KB

        MD5

        ecccc237fcc18a0d5b0b27ade82dc8a7

        SHA1

        7d67280fb4eaf263b0759293c334e621b0c28333

        SHA256

        8bac425f8c5c67b51d4445bb4364002e01259f0f43063317c43a8efd70eb8b47

        SHA512

        07aa172f0c2f69a4766653bae1e2e85947748f361504196476502b32b872919da5f068ebe603478eb1d57fb8a9a1d24b575f395eef611f0388f0a5bc9678a982

      • C:\Users\Admin\AppData\Local\Temp\Greater.xll

        Filesize

        70KB

        MD5

        f1fd84ea9b8e52d3c74b3a2205d704f1

        SHA1

        f08981533c68337da0fc57093b5f7ca34e8fae1d

        SHA256

        9b73986db9c06e3c4338546f7e270f8b6c28c376d7b6aa7b626eb966553420a2

        SHA512

        40e9be86035d27ddfad030f49269ac12c661252731d86276950337337685ba49db5715c2fd4b1c4dfc315f912b805e2efd73554e898a1048a9bbaf3d9e0bbcd7

      • C:\Users\Admin\AppData\Local\Temp\Harvest.xll

        Filesize

        52KB

        MD5

        7363de7605e5ff4c3e265dbe5f4ac73d

        SHA1

        83cae618c50b7c3c5af42408be108a4b5b356bdf

        SHA256

        3e76968c44a7283c0f4f62a778f69edc023402e2ced36f173305d3e3f693ff0e

        SHA512

        a2c49016069acbb85bba9f8a46285b0a43a95ba8ee5c87b97894c5d8f1d48d4b81412f443948956fefcaba43f047b8e88053517b06226d2654c6737e0c4dc9f3

      • C:\Users\Admin\AppData\Local\Temp\Hawk

        Filesize

        2KB

        MD5

        2e435f7d586104b55e8d83d058a7b904

        SHA1

        ff6a1e8114acf07e16ce7f389ca002c09395c666

        SHA256

        6013a458d944c51b222b664f37e2deddc027b21361d88e338a00073a93c60eba

        SHA512

        9d4961ae942f0c1c11ca9418b2a827b21e630fbe684c4d0ceff7c3aee4b66b3dbf6739058ea4440f0e21cb0040a58d1c133eb749d1fc79eed12439a505a63cd7

      • C:\Users\Admin\AppData\Local\Temp\Hence.xll

        Filesize

        98KB

        MD5

        e4fb974bb5837a2b5488bcca63d704cb

        SHA1

        a3be82b22ae0162f9b98c69dc9bb8e818b0a780e

        SHA256

        fd253c98c7fad4302fcf15d06c4d649e93c7efbe206a05c95bf55a1d5cbe4a68

        SHA512

        433b5236eab56aacf9cb020c3ccea858d03379a41f3cb9fd355e10ccf22ac458572949fbe44d1fcff4edecb0db373c0668d3e612c74017c1c8ae5088ea21d770

      • C:\Users\Admin\AppData\Local\Temp\Invention

        Filesize

        62KB

        MD5

        3b9ac7aae61bcff635ec1a9bb19227c4

        SHA1

        3ecac11aeb7f28a1fe1fb4d10965d9599b0b595c

        SHA256

        c6f36f22c89d99d50e8ca54cc159c59c740a892467576e2d1a6b67c390c25137

        SHA512

        59405e79a086d2fc98fd477e57dd3b7d01fa2556e4323a91b821602c2582977220cb2e0e5cd56a0a092ac5715d44d2d50b720466b979ab14118a96b21d51cf13

      • C:\Users\Admin\AppData\Local\Temp\Lately

        Filesize

        97KB

        MD5

        c293bbd0693fc2240993a22699142b7b

        SHA1

        78b5608c1cdd3c86e55431199f1cf50cdd7d7772

        SHA256

        735b9344707f46e7c81958055b4c77ae3dc2672fec6f0eb6349082dbe1c2e456

        SHA512

        61dfaf9168eefd56602ea142c0d4b9176595907c2355728440bf17713b73f2e957c3724cd461cee753a42cc6092f61222aa75f2201481f1c773c2605d6899791

      • C:\Users\Admin\AppData\Local\Temp\Mask.xll

        Filesize

        51KB

        MD5

        63230584f42d7cb40c9741c18fe0d4be

        SHA1

        a7b89c752e59c7d610c39c42ecb7ae510aec56e6

        SHA256

        b4cdd291699df575c017a8b5f01f7e51f21abe9ab33a2dabd4cdee241d3ffa29

        SHA512

        d2f9237f003d9f38d8113d952c04b7a998a18ae34295b386509f3dd86b01a809ed1556a2f2b30bfa0c10e6464e8ec2d02a71cdc6db038e9e2d61c5df498f7de8

      • C:\Users\Admin\AppData\Local\Temp\Pairs.xll

        Filesize

        73KB

        MD5

        b6459f6df266d629b98353f547cd27e9

        SHA1

        0a63e7f709975dc46049f7a86f6d3fe36d9f202c

        SHA256

        ed10be904d3789078628ee68e74d9f5bd86dbb965d1019e5c0bf57cf988aabda

        SHA512

        be36c7bdcd4d49366c4203dd94a181182e8748dbf0682d9b55529196e76f8fd9c06fa58f19bfaf95200f5e9d86d7220306477432f6320ead0f6fbdb4015c9b6f

      • C:\Users\Admin\AppData\Local\Temp\Picking.xll

        Filesize

        96KB

        MD5

        3c423a6595086f8c05c9a8c93deca4ae

        SHA1

        2df46cfc9b72d8b2356077ff70152f15bfe1e9c6

        SHA256

        228aec6da2103ffac6868cb0cdf37c3b0610d6b89b7627ea7e577c7bee2aff22

        SHA512

        750a948b7df9f0b7d497574d5a6c45a99e0283886ab458861805e8faa5566d866e74a8258737cf11e44f7b776be4edb70d3e91c15e6a2a1f4c73886292bf7812

      • C:\Users\Admin\AppData\Local\Temp\Planned

        Filesize

        11KB

        MD5

        0f2f84dc507612c3c5280313fbbafdb2

        SHA1

        9929bd6fc1e5cffee4f3f93e1488e3227ada824d

        SHA256

        1ec6cbb5d0506122e8ed557f52e81d33f09f2e14e8f09c27c2873303c1a37670

        SHA512

        3a0329c2c30ad469cba29a33e3d5da3140a3b023246e55db7f1c95af564b961d33c1aa7e0b32db0d3c9700a54011751abe178930ab0b8f91df45bf4fd3ec6209

      • C:\Users\Admin\AppData\Local\Temp\Premiere

        Filesize

        144KB

        MD5

        ee2f6e1863a4b5143551091905ae3dd7

        SHA1

        ae37402d61932d9f6dae1eea7a2d55fa45679d5a

        SHA256

        857746479eed6f566336a2912f850c012863593719ebbab4617c1910653becf0

        SHA512

        37ea6efa251676b21f4b80ae6514303839df8c9f1df1b768a09b77aa44cea2c0497c0436f6d3fa22e30482aab65e990a52b94c9c570bf16067e61775c5ce2c96

      • C:\Users\Admin\AppData\Local\Temp\Remains

        Filesize

        105KB

        MD5

        0fc44d9e7a7b1bd1a934d0b8aa1d80ee

        SHA1

        32b0c3577b19bffa75277a2eec6c0406b7073fee

        SHA256

        c3a68e71c7baaca31ac8acad536156f7cb7e32ceee51ca887808f10238904496

        SHA512

        6856be37e77c1b0d321a3923822d2d464e3d4ad94663021d4f96a85be5842f28148e7b34c483a291cd4b735df993516197b5ab198af11a0cf7c84d573888d9dc

      • C:\Users\Admin\AppData\Local\Temp\Subcommittee.xll

        Filesize

        67KB

        MD5

        9a631707f4c2d2a8b86d01e81fde674d

        SHA1

        3b78693ad353acf6833e802ddf398ca7f9cc7fef

        SHA256

        d604a23485e9dee5b33d5774b0a3e22b397b7cbc30a907e962da4eb47420bd3c

        SHA512

        e30f850229a3bf81d566bad909da64ba5a174b288ecb925a3b4fdd4b557a12a41ba1aba61efa9799b86f74d99f7036545705e0780941a5a60a4dd5cc3b19bf4e

      • C:\Users\Admin\AppData\Local\Temp\Taxation.xll

        Filesize

        477KB

        MD5

        0411b1071d2588fdb5d6a94fb832009e

        SHA1

        d3f52cfb853dd5eb5b510d7af4bffe923c693548

        SHA256

        93d7d94d0874f6889e768011c33c826523935f4e0efadd575906b9f93b368825

        SHA512

        3a37aa947fd3eda3dd23ab155a48e9a4d8669b5074dd1b4e3ecc26177199aa51c345ebac18961f3b1a49d14be3e5e53ca3f4f222d56eba222864e4ec18564dc0

      • C:\Users\Admin\AppData\Local\Temp\Waterproof

        Filesize

        125KB

        MD5

        615cd5feaba3f3229ff23d950a2d6592

        SHA1

        27fe119c5b964a06acd154942461fd65f902beca

        SHA256

        6e4d88545869fa0eb96dbebbe8ed3e5d2b7b8b571dc61fad7ea87aaa9c291adb

        SHA512

        8d301136beb5e76770e454ec88b55b571de30900d2f13fe62243e11e0d4f9c164ec6fac4f77473699c15f44dd063ff7bcb6f48adc7990a38410865e1fb9eef2a

      • C:\Users\Admin\AppData\Local\Temp\White

        Filesize

        51KB

        MD5

        f5706e17c94a7e8e98e00852cd505042

        SHA1

        dc1c62bad8f456cebff4c8dc904de5cdaa8549b9

        SHA256

        ce75f92970122600eaf633fcd2e733a41b977f9a4b67674649b13f2797b5d490

        SHA512

        200e958e0c86298384cdcb9338ec70a4fd5b0ae89702eee86538eeb8d2a53026fa4872ea5d77649ec3c363ca9c4a6f539e80c811088f60dda134424894df3289

      • C:\Users\Admin\AppData\Local\Temp\maternity.xll

        Filesize

        30KB

        MD5

        fe2b47d95ebbbe6dbb215eb426999ccc

        SHA1

        7b9d70adcdc52ae63c3578d3479b6159cba3de5d

        SHA256

        8a832b996da79f08801ef99954e3f79ce01ab6dda8d80e0cf73b5db8ae74fd56

        SHA512

        ab414ac3516ee27f04301dde62f55da71468cc4f4cfbcbdc69e04e96f63e92236723a64fa62a816a7dc8eb8151e18c9bf7d071c806a45b5f48757f1f5955b88c

      • memory/816-93-0x00007FFFCB7C0000-0x00007FFFCB9C9000-memory.dmp

        Filesize

        2.0MB

      • memory/816-95-0x0000000077040000-0x0000000077292000-memory.dmp

        Filesize

        2.3MB

      • memory/816-92-0x0000000000C40000-0x0000000001040000-memory.dmp

        Filesize

        4.0MB

      • memory/816-90-0x00000000003C0000-0x00000000003CA000-memory.dmp

        Filesize

        40KB

      • memory/5012-80-0x0000000004730000-0x00000000047B1000-memory.dmp

        Filesize

        516KB

      • memory/5012-85-0x00000000047C0000-0x0000000004BC0000-memory.dmp

        Filesize

        4.0MB

      • memory/5012-87-0x00007FFFCB7C0000-0x00007FFFCB9C9000-memory.dmp

        Filesize

        2.0MB

      • memory/5012-83-0x0000000004730000-0x00000000047B1000-memory.dmp

        Filesize

        516KB

      • memory/5012-89-0x0000000077040000-0x0000000077292000-memory.dmp

        Filesize

        2.3MB

      • memory/5012-86-0x00000000047C0000-0x0000000004BC0000-memory.dmp

        Filesize

        4.0MB

      • memory/5012-84-0x0000000004730000-0x00000000047B1000-memory.dmp

        Filesize

        516KB

      • memory/5012-82-0x0000000004730000-0x00000000047B1000-memory.dmp

        Filesize

        516KB

      • memory/5012-78-0x0000000004730000-0x00000000047B1000-memory.dmp

        Filesize

        516KB

      • memory/5012-79-0x0000000004730000-0x00000000047B1000-memory.dmp

        Filesize

        516KB