Analysis
-
max time kernel
109s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe
Resource
win10v2004-20230220-en
7 signatures
150 seconds
General
-
Target
d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe
-
Size
354KB
-
MD5
cfc3328ac884f2ce20eeaae93c11adb5
-
SHA1
d317a1037299f3284f7ee53a062f15d0f4b00dc5
-
SHA256
d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb
-
SHA512
b597ee229ea215bf537768039d67ea88c9f793ac110ab6cd5ef9d8d8f0a77c78679e00436ddb93eccd016c9dce966a0b5a7f8d1b50b17852cdc505fd5eb4f1f4
-
SSDEEP
6144:xuXLG0dHYT2l1oP2RJESWOeOJBmsnRyA5TDZ83ZGi5dDYKE:xuXD6SLRJElOeOJBmsgADZ8wi4KE
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/2040-142-0x0000000000580000-0x000000000059C000-memory.dmp family_rhadamanthys behavioral1/memory/2040-144-0x0000000000580000-0x000000000059C000-memory.dmp family_rhadamanthys behavioral1/memory/2040-146-0x00000000005A0000-0x00000000005BA000-memory.dmp family_rhadamanthys behavioral1/memory/2040-147-0x0000000000580000-0x000000000059C000-memory.dmp family_rhadamanthys behavioral1/memory/2040-151-0x0000000000580000-0x000000000059C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2040 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 2040 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 2040 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 1332 2040 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 2040 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 PID 2100 wrote to memory of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 PID 2100 wrote to memory of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 PID 2100 wrote to memory of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 PID 2100 wrote to memory of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 PID 2100 wrote to memory of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 PID 2100 wrote to memory of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 PID 2100 wrote to memory of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 PID 2100 wrote to memory of 2040 2100 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 87 PID 2040 wrote to memory of 2876 2040 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 94 PID 2040 wrote to memory of 2876 2040 d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe"C:\Users\Admin\AppData\Local\Temp\d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe"C:\Users\Admin\AppData\Local\Temp\d402fe08be245b546c3b6388fa8a29eb8735349686d6b5aaf06c39734090adfb.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 6803⤵
- Program crash
PID:1332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2040 -ip 20401⤵PID:2132