Analysis
-
max time kernel
76s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe
-
Size
343KB
-
MD5
9996b0548ad0cba93c9da1eebcf9203f
-
SHA1
f3278076a8f11d7ef075276627a79c0bd38cc8cc
-
SHA256
cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd
-
SHA512
bf4170ee20b98e38e98f27ddce04b57eb7ab8002622556cc40ac8a688fffcc9c087f5c94b5e37dc3f25084d7304f826cfc1c7296016a8859a7d075d13cfff15e
-
SSDEEP
3072:Z5t49DGaLCG1O2ZiEo6G9e3odDdfkq1cIgk6BY2mVvIraf2j5AyXQ7+o1nHFsYen:gnLC9Lf3XDWkl2MvqjdA7hHCYMvB4b+
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/5116-138-0x00000000007A0000-0x00000000007BC000-memory.dmp family_rhadamanthys behavioral1/memory/5116-140-0x00000000007A0000-0x00000000007BC000-memory.dmp family_rhadamanthys behavioral1/memory/5116-143-0x00000000007A0000-0x00000000007BC000-memory.dmp family_rhadamanthys behavioral1/memory/5116-146-0x00000000007A0000-0x00000000007BC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 5116 cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe 5116 cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe 5116 cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1400 5116 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5116 cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe 5116 cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5116 wrote to memory of 4360 5116 cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe 89 PID 5116 wrote to memory of 4360 5116 cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe"C:\Users\Admin\AppData\Local\Temp\cbf77b8618991c3335437f00e07c4d601fbb30031948d45e15a23962cb89ddfd.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"2⤵PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 7362⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5116 -ip 51161⤵PID:3560