Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2023 12:05
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
320KB
-
MD5
7a9b6eb60536124b2f91400c444c55f5
-
SHA1
7c67fc722d6c12f9349b4119c2a960d3b590c0da
-
SHA256
a9b130790783e321b1817977af11af8117662e77a246e3902479f39cba863249
-
SHA512
c9be0f1546f7702648135992e186e744cf542e218ac51c49c051ed6fe6cb7af76d121a74e5194c797d9a5e107c6653b9caf8fffcc6f73e88df6f9cb0ffe1f38b
-
SSDEEP
6144:PGzt0gWK+yGvYIynRkaHvLDe5rfSXRVFL9tCcC+p1j6FxDQPw32B8f:PgcYPn7TDsgFRtZ2d0w
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
resource yara_rule behavioral2/memory/2576-140-0x0000000000D50000-0x0000000000D6D000-memory.dmp family_rhadamanthys behavioral2/memory/2576-142-0x0000000000D50000-0x0000000000D6D000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2576 AppLaunch.exe 2576 AppLaunch.exe 2576 AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4848 set thread context of 2576 4848 tmp.exe 81 -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 AppLaunch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2576 AppLaunch.exe Token: SeCreatePagefilePrivilege 2576 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4848 wrote to memory of 2576 4848 tmp.exe 81 PID 4848 wrote to memory of 2576 4848 tmp.exe 81 PID 4848 wrote to memory of 2576 4848 tmp.exe 81 PID 4848 wrote to memory of 2576 4848 tmp.exe 81 PID 4848 wrote to memory of 2576 4848 tmp.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2576
-