Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    28s
  • max time network
    37s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/03/2025, 16:33

General

  • Target

    bleezwallet.exe

  • Size

    433KB

  • MD5

    d1604ca3648fd64385bbdf9a33c6f7de

  • SHA1

    e7b43a8694eedb026332ada91a81b87877fdca4c

  • SHA256

    f9998b2e172543ecc1205ba39bb74fab6839a5481961be70eabeff857845ec03

  • SHA512

    b3001d422ce582401f6c4612bd85fa12458405d90da6c33ad50bec9adf65b419d072d4fc3cafee80b690921038950ccc492a54f60d5b588c39b95648faa85313

  • SSDEEP

    12288:R8DpoeXC7J6uf0i6r0k7h/xImW/NtY330ngqyJAU2:WDpoeS7HfNyTt/x9W/An0n

Malware Config

Extracted

Family

rhadamanthys

C2

https://144.76.133.166:8034/5502b8a765a7d7349/38qadhar.4ovk3

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bleezwallet.exe
    "C:\Users\Admin\AppData\Local\Temp\bleezwallet.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4452
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2776
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 428
          3⤵
          • Program crash
          PID:5060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2776 -ip 2776
      1⤵
        PID:896
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
        1⤵
          PID:2824
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4276

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/788-0-0x000000007442E000-0x000000007442F000-memory.dmp

            Filesize

            4KB

          • memory/788-1-0x00000000005D0000-0x0000000000642000-memory.dmp

            Filesize

            456KB

          • memory/788-11-0x0000000074420000-0x0000000074BD1000-memory.dmp

            Filesize

            7.7MB

          • memory/788-12-0x0000000074420000-0x0000000074BD1000-memory.dmp

            Filesize

            7.7MB

          • memory/2776-4-0x0000000000400000-0x000000000047E000-memory.dmp

            Filesize

            504KB

          • memory/2776-8-0x0000000000400000-0x000000000047E000-memory.dmp

            Filesize

            504KB

          • memory/2776-6-0x0000000000400000-0x000000000047E000-memory.dmp

            Filesize

            504KB

          • memory/2776-9-0x0000000000400000-0x000000000047E000-memory.dmp

            Filesize

            504KB