Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2023 15:20
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
384KB
-
MD5
be6ead5fba6e45225d2c869c593c091e
-
SHA1
51b1f2a3ba54d0f675694831a7c9c509093c3399
-
SHA256
72ffef4d565a07136b07f1c8c4518f159c0d3afdfae4e7736963f17eb35b0b59
-
SHA512
32e0cfe77acf48e76c01ce50115a6288f2e5f1bb57532f96fced385aa5025fcd4d8b29ae83a0d06cbfb27aee3b58aa9cbedf86e68196c205e1c2e562ee213147
-
SSDEEP
6144:XiexrddlUFwKfSO2pKvYc9/5aLiqoKDv:XdTlmsQYcl0Jr
Malware Config
Extracted
colibri
1.4.0
http://wqfegrbjiskfmas.top/gate.php
http://interferenceatmobile.xyz/gate.php
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral2/memory/2208-138-0x0000000002310000-0x000000000232C000-memory.dmp family_rhadamanthys behavioral2/memory/2208-139-0x0000000002310000-0x000000000232C000-memory.dmp family_rhadamanthys behavioral2/memory/2208-141-0x0000000002310000-0x000000000232C000-memory.dmp family_rhadamanthys behavioral2/memory/2208-148-0x0000000002310000-0x000000000232C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Executes dropped EXE 1 IoCs
pid Process 3884 F273.tmp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1572 2208 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2208 tmp.exe 2208 tmp.exe 1504 dllhost.exe 1504 dllhost.exe 1504 dllhost.exe 1504 dllhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1504 2208 tmp.exe 84 PID 2208 wrote to memory of 1504 2208 tmp.exe 84 PID 2208 wrote to memory of 1504 2208 tmp.exe 84 PID 2208 wrote to memory of 1504 2208 tmp.exe 84 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 7002⤵
- Program crash
PID:1572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2208 -ip 22081⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\F273.tmp.exe"C:\Users\Admin\AppData\Local\Temp\F273.tmp.exe"1⤵
- Executes dropped EXE
PID:3884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
877KB
MD55fd30bde601c8d7b3d1486650d44f7cf
SHA186578f815e67293885878be187d61ed7f1fa573e
SHA256207ccbaf358bed54df98aed79b7a7ed243392b550f5d5bf4d1a72ca7fbe56c52
SHA5126bb7e60af4bf5a58054c42534967caf1c3f6652ec658741a52f3ed153e27717f6cec0df34daee2e76bb6d7358b6f40679b4a2d96ff974eb8b5eeae618be7e97b
-
Filesize
877KB
MD55fd30bde601c8d7b3d1486650d44f7cf
SHA186578f815e67293885878be187d61ed7f1fa573e
SHA256207ccbaf358bed54df98aed79b7a7ed243392b550f5d5bf4d1a72ca7fbe56c52
SHA5126bb7e60af4bf5a58054c42534967caf1c3f6652ec658741a52f3ed153e27717f6cec0df34daee2e76bb6d7358b6f40679b4a2d96ff974eb8b5eeae618be7e97b