Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2023 11:31
Static task
static1
Behavioral task
behavioral1
Sample
a10386e62ad4e91a86c164a0288564cf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a10386e62ad4e91a86c164a0288564cf.exe
Resource
win10v2004-20221111-en
General
-
Target
a10386e62ad4e91a86c164a0288564cf.exe
-
Size
207KB
-
MD5
a10386e62ad4e91a86c164a0288564cf
-
SHA1
6135151cbb13013b07510bab11df7006d930f49f
-
SHA256
259d03eb1abf679421dfaac9e04881e82385aeea11a168aecb25101d0e65070b
-
SHA512
bbeec805e9882357758ab2271aa765b9628a986d0864b9a0f7967d1ba90fae45982b69db7deae2bfdef0ff0ed6720b6b688a9acdae2dcd1c445711ad0cc82d6b
-
SSDEEP
3072:jXt5qNx67uPiuFbdMa59LT6dpN+VxuJdJMIsn/cU8xwHmapb:bqx67uPiunLT6IqPMxzzp
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
resource yara_rule behavioral2/memory/1316-141-0x0000000000E20000-0x0000000000E3D000-memory.dmp family_rhadamanthys behavioral2/memory/1316-143-0x0000000000E20000-0x0000000000E3D000-memory.dmp family_rhadamanthys -
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/632-133-0x0000000002BE0000-0x0000000002BE9000-memory.dmp family_smokeloader -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 1 IoCs
pid Process 1316 B923.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a10386e62ad4e91a86c164a0288564cf.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a10386e62ad4e91a86c164a0288564cf.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a10386e62ad4e91a86c164a0288564cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 B923.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID B923.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B923.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B923.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI B923.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 632 a10386e62ad4e91a86c164a0288564cf.exe 632 a10386e62ad4e91a86c164a0288564cf.exe 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found 1108 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1108 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 632 a10386e62ad4e91a86c164a0288564cf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1316 B923.exe Token: SeCreatePagefilePrivilege 1316 B923.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1316 1108 Process not Found 86 PID 1108 wrote to memory of 1316 1108 Process not Found 86 PID 1108 wrote to memory of 1316 1108 Process not Found 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a10386e62ad4e91a86c164a0288564cf.exe"C:\Users\Admin\AppData\Local\Temp\a10386e62ad4e91a86c164a0288564cf.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:632
-
C:\Users\Admin\AppData\Local\Temp\B923.exeC:\Users\Admin\AppData\Local\Temp\B923.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD52e58f23422076cc03f492c0c9ca6ce14
SHA1883c51ea2768488cbdabfb5969349c8d41072c36
SHA256d3308f8b8905c046fa48a7a828b1047511709ad9c7d9b7d4e67ec94083e76c39
SHA51227208c19cf0c540877230cc97834348cf11465b0fc1e751576cbc70cb9469ac01b7835ed30afd06468665461c447afc375c5210158782ea16fcb5aaf9975194f
-
Filesize
349KB
MD52e58f23422076cc03f492c0c9ca6ce14
SHA1883c51ea2768488cbdabfb5969349c8d41072c36
SHA256d3308f8b8905c046fa48a7a828b1047511709ad9c7d9b7d4e67ec94083e76c39
SHA51227208c19cf0c540877230cc97834348cf11465b0fc1e751576cbc70cb9469ac01b7835ed30afd06468665461c447afc375c5210158782ea16fcb5aaf9975194f