Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
37s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/03/2025, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
bleezwallet.exe
Resource
win11-20250313-en
General
-
Target
bleezwallet.exe
-
Size
433KB
-
MD5
d1604ca3648fd64385bbdf9a33c6f7de
-
SHA1
e7b43a8694eedb026332ada91a81b87877fdca4c
-
SHA256
f9998b2e172543ecc1205ba39bb74fab6839a5481961be70eabeff857845ec03
-
SHA512
b3001d422ce582401f6c4612bd85fa12458405d90da6c33ad50bec9adf65b419d072d4fc3cafee80b690921038950ccc492a54f60d5b588c39b95648faa85313
-
SSDEEP
12288:R8DpoeXC7J6uf0i6r0k7h/xImW/NtY330ngqyJAU2:WDpoeS7HfNyTt/x9W/An0n
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/38qadhar.4ovk3
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 788 set thread context of 2776 788 bleezwallet.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 5060 2776 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bleezwallet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 788 wrote to memory of 4452 788 bleezwallet.exe 82 PID 788 wrote to memory of 4452 788 bleezwallet.exe 82 PID 788 wrote to memory of 4452 788 bleezwallet.exe 82 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83 PID 788 wrote to memory of 2776 788 bleezwallet.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bleezwallet.exe"C:\Users\Admin\AppData\Local\Temp\bleezwallet.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 4283⤵
- Program crash
PID:5060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2776 -ip 27761⤵PID:896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:2824
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4276