Analysis
-
max time kernel
53s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-02-2023 15:20
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
384KB
-
MD5
be6ead5fba6e45225d2c869c593c091e
-
SHA1
51b1f2a3ba54d0f675694831a7c9c509093c3399
-
SHA256
72ffef4d565a07136b07f1c8c4518f159c0d3afdfae4e7736963f17eb35b0b59
-
SHA512
32e0cfe77acf48e76c01ce50115a6288f2e5f1bb57532f96fced385aa5025fcd4d8b29ae83a0d06cbfb27aee3b58aa9cbedf86e68196c205e1c2e562ee213147
-
SSDEEP
6144:XiexrddlUFwKfSO2pKvYc9/5aLiqoKDv:XdTlmsQYcl0Jr
Malware Config
Extracted
colibri
1.4.0
http://wqfegrbjiskfmas.top/gate.php
http://interferenceatmobile.xyz/gate.php
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/1304-59-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1304-61-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1304-62-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys behavioral1/memory/1304-72-0x0000000000250000-0x000000000026C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Executes dropped EXE 1 IoCs
pid Process 1448 A084.tmp.exe -
Loads dropped DLL 5 IoCs
pid Process 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 740 1448 WerFault.exe 29 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1304 tmp.exe 1304 tmp.exe 748 dllhost.exe 748 dllhost.exe 748 dllhost.exe 748 dllhost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1304 wrote to memory of 748 1304 tmp.exe 27 PID 1304 wrote to memory of 748 1304 tmp.exe 27 PID 1304 wrote to memory of 748 1304 tmp.exe 27 PID 1304 wrote to memory of 748 1304 tmp.exe 27 PID 1304 wrote to memory of 748 1304 tmp.exe 27 PID 1304 wrote to memory of 748 1304 tmp.exe 27 PID 1448 wrote to memory of 740 1448 A084.tmp.exe 31 PID 1448 wrote to memory of 740 1448 A084.tmp.exe 31 PID 1448 wrote to memory of 740 1448 A084.tmp.exe 31 PID 1448 wrote to memory of 740 1448 A084.tmp.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\A084.tmp.exe"C:\Users\Admin\AppData\Local\Temp\A084.tmp.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 1722⤵
- Loads dropped DLL
- Program crash
PID:740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
877KB
MD55fd30bde601c8d7b3d1486650d44f7cf
SHA186578f815e67293885878be187d61ed7f1fa573e
SHA256207ccbaf358bed54df98aed79b7a7ed243392b550f5d5bf4d1a72ca7fbe56c52
SHA5126bb7e60af4bf5a58054c42534967caf1c3f6652ec658741a52f3ed153e27717f6cec0df34daee2e76bb6d7358b6f40679b4a2d96ff974eb8b5eeae618be7e97b
-
Filesize
877KB
MD55fd30bde601c8d7b3d1486650d44f7cf
SHA186578f815e67293885878be187d61ed7f1fa573e
SHA256207ccbaf358bed54df98aed79b7a7ed243392b550f5d5bf4d1a72ca7fbe56c52
SHA5126bb7e60af4bf5a58054c42534967caf1c3f6652ec658741a52f3ed153e27717f6cec0df34daee2e76bb6d7358b6f40679b4a2d96ff974eb8b5eeae618be7e97b
-
Filesize
877KB
MD55fd30bde601c8d7b3d1486650d44f7cf
SHA186578f815e67293885878be187d61ed7f1fa573e
SHA256207ccbaf358bed54df98aed79b7a7ed243392b550f5d5bf4d1a72ca7fbe56c52
SHA5126bb7e60af4bf5a58054c42534967caf1c3f6652ec658741a52f3ed153e27717f6cec0df34daee2e76bb6d7358b6f40679b4a2d96ff974eb8b5eeae618be7e97b
-
Filesize
877KB
MD55fd30bde601c8d7b3d1486650d44f7cf
SHA186578f815e67293885878be187d61ed7f1fa573e
SHA256207ccbaf358bed54df98aed79b7a7ed243392b550f5d5bf4d1a72ca7fbe56c52
SHA5126bb7e60af4bf5a58054c42534967caf1c3f6652ec658741a52f3ed153e27717f6cec0df34daee2e76bb6d7358b6f40679b4a2d96ff974eb8b5eeae618be7e97b
-
Filesize
877KB
MD55fd30bde601c8d7b3d1486650d44f7cf
SHA186578f815e67293885878be187d61ed7f1fa573e
SHA256207ccbaf358bed54df98aed79b7a7ed243392b550f5d5bf4d1a72ca7fbe56c52
SHA5126bb7e60af4bf5a58054c42534967caf1c3f6652ec658741a52f3ed153e27717f6cec0df34daee2e76bb6d7358b6f40679b4a2d96ff974eb8b5eeae618be7e97b
-
Filesize
877KB
MD55fd30bde601c8d7b3d1486650d44f7cf
SHA186578f815e67293885878be187d61ed7f1fa573e
SHA256207ccbaf358bed54df98aed79b7a7ed243392b550f5d5bf4d1a72ca7fbe56c52
SHA5126bb7e60af4bf5a58054c42534967caf1c3f6652ec658741a52f3ed153e27717f6cec0df34daee2e76bb6d7358b6f40679b4a2d96ff974eb8b5eeae618be7e97b
-
Filesize
877KB
MD55fd30bde601c8d7b3d1486650d44f7cf
SHA186578f815e67293885878be187d61ed7f1fa573e
SHA256207ccbaf358bed54df98aed79b7a7ed243392b550f5d5bf4d1a72ca7fbe56c52
SHA5126bb7e60af4bf5a58054c42534967caf1c3f6652ec658741a52f3ed153e27717f6cec0df34daee2e76bb6d7358b6f40679b4a2d96ff974eb8b5eeae618be7e97b