Analysis

  • max time kernel
    145s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 12:21

General

  • Target

    f33e43ec6f4426ec239385ceced1a66f8de71114b63ef993750004469fae8108.exe

  • Size

    324KB

  • MD5

    eab34773c208f92d39686d3015968a9e

  • SHA1

    e7b53dcea746c63065d068a731bf9ac3b2a68698

  • SHA256

    f33e43ec6f4426ec239385ceced1a66f8de71114b63ef993750004469fae8108

  • SHA512

    83b15c0cfd594ba1ae8e89db1c96a25e2caa29d8bd3b8271778bbb92895e49d510af43c7b089a7b63238c17f1b6023e305ed74169a9ab5c98f0898b2afdee59d

  • SSDEEP

    6144:M7uLolWx1jVoBQ4tlr0CMN8EIaELUzOP:3Ya1mfeNTVEd

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 3 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f33e43ec6f4426ec239385ceced1a66f8de71114b63ef993750004469fae8108.exe
    "C:\Users\Admin\AppData\Local\Temp\f33e43ec6f4426ec239385ceced1a66f8de71114b63ef993750004469fae8108.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Windows\system32\rundll32.exe
      "C:\Users\Admin\AppData\Roaming\nsis_unse56f959.dll",PrintUIEntry |5CQkOhmAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAKVkHwBs8|AtBQPz8Gj|AFoAbQBGAEj|AHMAUAA5AHH|AEQAZgBRAEv8SQAtAVlIg+wo6P8EAgAASIPEKP|DzMzMTIlEJP8YSIlUJBBIifdMJAhdAUiLRCTfMEiJBCSBAThIfm8ACEjHRCQQLQH76w6BARBIg8ABuo8BEIEBQEg5lgBz|SWfA4sMJEgDyL9Ii8FIi0yrAVT+ewAD0UiLyooJ74gI68FmBWVIi|cEJWDz8DPJSIv|UBhIO9F0Nkj|g8IgSIsCSDv|wnQqZoN4SBj|dRpMi0BQZkHfgzhrdAcREUt1|QgREHgQLnQFSH+LAOvVSItI|QD9wWoAQFNVVldBf1RBVUFWQVddAf9mgTlNWk2L+P9Mi|JIi9kPhf388|BMY0k8QYH|PAlQRQAAD4V96vPwQYuECYjz8P+FwEiNPAEPhL3WahGDvAmMLQEP+4TH8|BEi2cgRP+LXxyLdyREi|9PGEwD4UwD2f9IA|EzyUWFyfcPhKTz8E2LxEH|ixBFM9JIA9P|igKEwHQdQcHfyg0PvsD6AAFE+wPQvxF17EGB+v+q|A18dA6Dwf8BSYPABEE7yf9zaevGi8EPt|8MTkWLLItMA9|rdFgz7aoQdFH3QYsUwQDTM8mK|wJMi8LrD8HJ9sgRA8jlEAFBigD+1RDtM8Az9kE78wy24BCmAIPGAYP|+Ahy7usKSIv|y0H|1UmJBPf7g8XkEMQEO28Y+3KvZgFBX0FeQX9dQVxfXl1bMxffSIHsYAFkAIvp|+hm|v||SIXAtw+EmHUgTI2vAYu+KxDIM||om30gjf9fBEyNRUYz0r+Ly|9UJGiAIExfi+APhGt1IEWoEO8zwIvTkSBIiXzrJCCmIHCAIEiL8OcPhEt1IKYgUEiN|1YIRI1HQEiN+4wkhRFIi9jofF39fiCNVkjeIBDiIe3M8|DoZ+8gRIsGp41XCEEgpiBYyiGJ14QkgIcS3vPwiw4e2iBYiYwkcREHMJEg2+gx7yCLnC0yTIt|XTpIg|tsSIog|zBMiWQkOEyL3aQaMkyJXIQBhCRt3IcRhpKNEY1HSzD3jCTw8|BJi9To2+n8BTCKnHgySI39hHgyQYDzIY1P72xEMBikAoPpAe9184G8eDIhUmV|eHVNi4Qk9CIx95Qk+DUBwkg72P9yOIP6bHYzRPeNSUD6AJRBuAD0mACmIEDKIvh0GUR8tjDAMUmNVCRskSC|SYPobOhrgjBI+4vOpiB4SIX|dJ8Si1VCTI4wGzFI|41MJED|10iBAcR0IWEkLQgtAQ==
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • outlook_office_path
      • outlook_win_path
      PID:212
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 212 -s 296
        3⤵
        • Program crash
        PID:1220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 632
      2⤵
      • Program crash
      PID:4128
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 860 -ip 860
    1⤵
      PID:4476
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 196 -p 212 -ip 212
      1⤵
        PID:4560

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\nsis_unse56f959.dll

              Filesize

              49KB

              MD5

              832890fded186835970d1d3302590138

              SHA1

              5385703e9dcde43e60928b2e9c941b7232468a6a

              SHA256

              438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576

              SHA512

              5cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1

            • C:\Users\Admin\AppData\Roaming\nsis_unse56f959.dll

              Filesize

              49KB

              MD5

              832890fded186835970d1d3302590138

              SHA1

              5385703e9dcde43e60928b2e9c941b7232468a6a

              SHA256

              438c088568093ad767802ba5e132efbd4e643ddf62e4996565c3b46719e3e576

              SHA512

              5cf752eac75b532b32501c9d469cbcb6638b49cf20df040554b37986cbe3c068a10e2ff69747b594b5b114111cbbe1cdfbbd0f394a7ac71b863e042414a68ae1

            • memory/212-145-0x00007FF409BE0000-0x00007FF409CDA000-memory.dmp

              Filesize

              1000KB

            • memory/212-149-0x00007FF409BE0000-0x00007FF409CDA000-memory.dmp

              Filesize

              1000KB

            • memory/212-154-0x00007FFAA0890000-0x00007FFAA08A2000-memory.dmp

              Filesize

              72KB

            • memory/212-153-0x00007FF409BE0000-0x00007FF409CDA000-memory.dmp

              Filesize

              1000KB

            • memory/212-143-0x000001AA62F70000-0x000001AA62F77000-memory.dmp

              Filesize

              28KB

            • memory/212-144-0x00007FF409BE0000-0x00007FF409CDA000-memory.dmp

              Filesize

              1000KB

            • memory/212-152-0x00007FF409BE0000-0x00007FF409CDA000-memory.dmp

              Filesize

              1000KB

            • memory/212-151-0x00007FF409BE0000-0x00007FF409CDA000-memory.dmp

              Filesize

              1000KB

            • memory/212-150-0x00007FF409BE0000-0x00007FF409CDA000-memory.dmp

              Filesize

              1000KB

            • memory/860-148-0x00000000049B0000-0x00000000049CD000-memory.dmp

              Filesize

              116KB

            • memory/860-139-0x00000000049B0000-0x00000000049CD000-memory.dmp

              Filesize

              116KB

            • memory/860-147-0x0000000002D50000-0x0000000002D75000-memory.dmp

              Filesize

              148KB

            • memory/860-146-0x0000000000400000-0x0000000002BBF000-memory.dmp

              Filesize

              39.7MB

            • memory/860-134-0x0000000002D50000-0x0000000002D75000-memory.dmp

              Filesize

              148KB

            • memory/860-136-0x00000000049B0000-0x00000000049CD000-memory.dmp

              Filesize

              116KB

            • memory/860-137-0x0000000004930000-0x0000000004932000-memory.dmp

              Filesize

              8KB