Analysis
-
max time kernel
36s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2023, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
506405f75f30b61908c652ac3b6f063e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
506405f75f30b61908c652ac3b6f063e.exe
Resource
win10v2004-20230220-en
General
-
Target
506405f75f30b61908c652ac3b6f063e.exe
-
Size
294KB
-
MD5
506405f75f30b61908c652ac3b6f063e
-
SHA1
993f3672177a802bef64e776de4447bf886a9b50
-
SHA256
4fc39495038014b3e49eb088c92c9310487beca6a027ebc72d60607a05b4f331
-
SHA512
ce5d7d93864decb5e70e028f455fec063cea530511efebe0889b5f7cd8dd482b937e4073c969c74a5d597ce5d226aea7c322d8cc343b06e7b818fd10a9bfce76
-
SSDEEP
6144:xxjWfp6vyNK1FaJvHqoRKOiT2XP2Xs7W/uG2cGxp2Qyotm:xxjWfp6vySFnOY2XPw/RGKQyom
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/1272-66-0x0000000000090000-0x00000000000AC000-memory.dmp family_rhadamanthys behavioral1/memory/1272-67-0x0000000000090000-0x00000000000AC000-memory.dmp family_rhadamanthys behavioral1/memory/1272-69-0x0000000000090000-0x00000000000AC000-memory.dmp family_rhadamanthys behavioral1/memory/1272-77-0x0000000000090000-0x00000000000AC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1352 set thread context of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1272 AppLaunch.exe 1272 AppLaunch.exe 432 dllhost.exe 432 dllhost.exe 432 dllhost.exe 432 dllhost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 PID 1352 wrote to memory of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 PID 1352 wrote to memory of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 PID 1352 wrote to memory of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 PID 1352 wrote to memory of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 PID 1352 wrote to memory of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 PID 1352 wrote to memory of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 PID 1352 wrote to memory of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 PID 1352 wrote to memory of 1272 1352 506405f75f30b61908c652ac3b6f063e.exe 29 PID 1272 wrote to memory of 432 1272 AppLaunch.exe 30 PID 1272 wrote to memory of 432 1272 AppLaunch.exe 30 PID 1272 wrote to memory of 432 1272 AppLaunch.exe 30 PID 1272 wrote to memory of 432 1272 AppLaunch.exe 30 PID 1272 wrote to memory of 432 1272 AppLaunch.exe 30 PID 1272 wrote to memory of 432 1272 AppLaunch.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\506405f75f30b61908c652ac3b6f063e.exe"C:\Users\Admin\AppData\Local\Temp\506405f75f30b61908c652ac3b6f063e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:432
-
-