File name:

7zFM.exe

Full analysis: https://app.any.run/tasks/0c942083-89e9-442d-b077-95ff03891946
Verdict: Malicious activity
Threats:

Rhadamanthys is a C++ information-stealing malware that extracts sensitive data from infiltrated machines. Its layered operational chain and advanced evasion tactics make it a major risk in cybersecurity landscapes.

Analysis date: June 15, 2025, 16:20:12
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
rhadamanthys
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

ECF577B1A11714B94D4E4CC786D95B8E

SHA1:

9D07B13E585C284091058F2824424BFCF01CF026

SHA256:

F4065C5C4B490A42AFF8F3325138AEEA6993E8FE9816C132F3FBADFF06EBF929

SSDEEP:

49152:yXlAQ6e7yts0X4gRG6Kj7cSNkBPufeB0rrknYXA2WjLwE6d0uZU0tTThgLzYwFgu:Gu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RHADAMANTHYS has been detected (YARA)

      • 7zFM.exe (PID: 4232)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 7zFM.exe (PID: 2492)
      • encry.exe (PID: 3148)
    • Drops 7-zip archiver for unpacking

      • 7zFM.exe (PID: 2492)
    • Reads security settings of Internet Explorer

      • 7zFM.exe (PID: 2492)
    • Process drops legitimate windows executable

      • encry.exe (PID: 3148)
    • The process drops C-runtime libraries

      • encry.exe (PID: 3148)
    • Process drops python dynamic module

      • encry.exe (PID: 3148)
    • Loads Python modules

      • encry.exe (PID: 6380)
    • Connects to SMTP port

      • encry.exe (PID: 6380)
    • Application launched itself

      • encry.exe (PID: 3148)
  • INFO

    • Checks supported languages

      • 7zFM.exe (PID: 2492)
      • 7zFM.exe (PID: 4232)
      • encry.exe (PID: 3148)
      • encry.exe (PID: 6380)
    • Reads the machine GUID from the registry

      • 7zFM.exe (PID: 2492)
      • encry.exe (PID: 6380)
    • The sample compiled with english language support

      • 7zFM.exe (PID: 2492)
      • encry.exe (PID: 3148)
    • Reads the computer name

      • 7zFM.exe (PID: 2492)
      • 7zFM.exe (PID: 4232)
      • encry.exe (PID: 3148)
      • encry.exe (PID: 6380)
    • Process checks computer location settings

      • 7zFM.exe (PID: 2492)
    • Creates files or folders in the user directory

      • 7zFM.exe (PID: 2492)
    • Create files in a temporary directory

      • encry.exe (PID: 3148)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (55.8)
.exe | Win64 Executable (generic) (21)
.scr | Windows screen saver (9.9)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:10:07 23:50:07+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 46592
InitializedDataSize: 16896
UninitializedDataSize: -
EntryPoint: 0xd532
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription: exeBase
FileVersion: 1.0.0.0
InternalName: exeBase.exe
LegalCopyright: Copyright © 2012
OriginalFileName: exeBase.exe
ProductName: exeBase
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
4
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 7zfm.exe #RHADAMANTHYS 7zfm.exe no specs encry.exe encry.exe

Process information

PID
CMD
Path
Indicators
Parent process
2492"C:\Users\admin\AppData\Local\Temp\7zFM.exe" C:\Users\admin\AppData\Local\Temp\7zFM.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
exeBase
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\7zfm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3148"C:\Users\admin\AppData\Roaming\encry.exe" C:\Users\admin\AppData\Roaming\encry.exe
7zFM.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\encry.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4232"C:\Users\admin\AppData\Roaming\7zFM.exe" C:\Users\admin\AppData\Roaming\7zFM.exe
7zFM.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip File Manager
Version:
24.09
Modules
Images
c:\users\admin\appdata\roaming\7zfm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
6380"C:\Users\admin\AppData\Roaming\encry.exe" C:\Users\admin\AppData\Roaming\encry.exe
encry.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\encry.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
901
Read events
901
Write events
0
Delete events
0

Modification events

No data
Executable files
17
Suspicious files
1
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
3148encry.exeC:\Users\admin\AppData\Local\Temp\_MEI31482\_decimal.pydexecutable
MD5:584652F877074FE71D7B1F8EEA1F849E
SHA256:E0F93185CD64F1DB3B9D1D20D620A691C5C453094B14D3B2BA2837F908F13304
3148encry.exeC:\Users\admin\AppData\Local\Temp\_MEI31482\_socket.pydexecutable
MD5:1AD8628499A107382153348A14A1DFC7
SHA256:7A20FE96274F554CC527C65F42A8DE9CF0C201852BEDDDC12E44D9106BAB728F
3148encry.exeC:\Users\admin\AppData\Local\Temp\_MEI31482\base_library.zipcompressed
MD5:476797C80F0003B31CA02B75D4332545
SHA256:0409872305A979F7F7E2FF9D17BD6DBCEE1FBAF1E1F189353373309BC6438D37
3148encry.exeC:\Users\admin\AppData\Local\Temp\_MEI31482\_bz2.pydexecutable
MD5:51CA0713F8FD5F142625A44DF7ED7100
SHA256:8768315B1E0E81CCD0D96C3D6A863803F5DD1DE6AF849285C439D61ABD32B647
3148encry.exeC:\Users\admin\AppData\Local\Temp\_MEI31482\_hashlib.pydexecutable
MD5:692837EB1FCB73EF33A1474B18DFC7CD
SHA256:D674D53F7E2F906FBAF0D19AB871F9CFF53956D40B3CE003A2B4B44B549D4B92
24927zFM.exeC:\Users\admin\AppData\Roaming\encry.exeexecutable
MD5:52A4D103BBC8BA983B48941FB4357782
SHA256:425B6358666151299274392F5C4E7F8545F9C90DA8D76809822708A131557FCB
3148encry.exeC:\Users\admin\AppData\Local\Temp\_MEI31482\VCRUNTIME140.dllexecutable
MD5:32DA96115C9D783A0769312C0482A62D
SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F
24927zFM.exeC:\Users\admin\AppData\Roaming\7zFM.exeexecutable
MD5:6CA7989BDA0E7884A638388EAC04F5BD
SHA256:9FECF813248F963734AB1BCEDB567666B3799D73B63B3CAFFF55F54ED7FEB6FF
3148encry.exeC:\Users\admin\AppData\Local\Temp\_MEI31482\cryptography-45.0.3.dist-info\INSTALLERtext
MD5:365C9BFEB7D89244F2CE01C1DE44CB85
SHA256:CEEBAE7B8927A3227E5303CF5E0F1F7B34BB542AD7250AC03FBCDE36EC2F1508
3148encry.exeC:\Users\admin\AppData\Local\Temp\_MEI31482\cryptography-45.0.3.dist-info\RECORDcsv
MD5:7B10C15C868B09AFE658E1707A0A6DEA
SHA256:AA07A43C9ECE6BE2A240F5B242931FE605966DD6A2DF730B55F056CF0CA13C13
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
27
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4944
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3768
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3768
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4680
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6380
encry.exe
142.251.5.109:587
smtp.gmail.com
GOOGLE
US
whitelisted
2336
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4944
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4944
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.142
whitelisted
smtp.gmail.com
  • 142.251.5.109
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.129
  • 40.126.31.2
  • 20.190.159.64
  • 40.126.31.130
  • 40.126.31.0
  • 40.126.31.67
  • 20.190.159.68
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted

Threats

No threats detected
No debug info