Analysis

  • max time kernel
    39s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29/03/2023, 07:51

General

  • Target

    454f54246c0e1a6ed2d493fc442292b93f1b66ccffc9f57bdf2307ef6d6d0388.exe

  • Size

    307KB

  • MD5

    15ccf8c9bac338729ac1b12e740b7fb7

  • SHA1

    f894d4e657b61b9548da60229809421206ed6064

  • SHA256

    454f54246c0e1a6ed2d493fc442292b93f1b66ccffc9f57bdf2307ef6d6d0388

  • SHA512

    fa06e9dd79ca2df21b2f0d65d2b8be7a176aa8002ad3de0159dfbaa1bd6059c86baa9782e77cad1807e5b8bd5e92b7b650d5d80c74b50f92198f40bb0e88895c

  • SSDEEP

    3072:o6GXZ+QKkLDnm3AQuh7jYFv55hT7kdYdwxB3uYCIfsCrou+0aavqPXX5eShM4:o5VKkLDpDqvDFZdwxBeYeMq0aWqP4q

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\454f54246c0e1a6ed2d493fc442292b93f1b66ccffc9f57bdf2307ef6d6d0388.exe
    "C:\Users\Admin\AppData\Local\Temp\454f54246c0e1a6ed2d493fc442292b93f1b66ccffc9f57bdf2307ef6d6d0388.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\system32\dllhost.exe
      "C:\Windows\system32\dllhost.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • outlook_office_path
      • outlook_win_path
      PID:4192

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3068-139-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/3068-140-0x0000000000780000-0x000000000079C000-memory.dmp

          Filesize

          112KB

        • memory/3068-124-0x0000000000620000-0x000000000064E000-memory.dmp

          Filesize

          184KB

        • memory/3068-122-0x0000000000620000-0x000000000064E000-memory.dmp

          Filesize

          184KB

        • memory/3068-129-0x0000000000780000-0x000000000079C000-memory.dmp

          Filesize

          112KB

        • memory/3068-130-0x0000000000660000-0x0000000000662000-memory.dmp

          Filesize

          8KB

        • memory/3068-131-0x0000000000660000-0x0000000000663000-memory.dmp

          Filesize

          12KB

        • memory/3068-132-0x0000000000780000-0x000000000079C000-memory.dmp

          Filesize

          112KB

        • memory/3068-123-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/3068-127-0x0000000000780000-0x000000000079C000-memory.dmp

          Filesize

          112KB

        • memory/4192-135-0x00007FF61D1A0000-0x00007FF61D29A000-memory.dmp

          Filesize

          1000KB

        • memory/4192-138-0x00007FF61D1A0000-0x00007FF61D29A000-memory.dmp

          Filesize

          1000KB

        • memory/4192-134-0x000002C674EF0000-0x000002C674EF7000-memory.dmp

          Filesize

          28KB

        • memory/4192-133-0x000002C674F40000-0x000002C674F41000-memory.dmp

          Filesize

          4KB

        • memory/4192-141-0x00007FF61D1A0000-0x00007FF61D29A000-memory.dmp

          Filesize

          1000KB

        • memory/4192-142-0x00007FF61D1A0000-0x00007FF61D29A000-memory.dmp

          Filesize

          1000KB

        • memory/4192-143-0x00007FF61D1A0000-0x00007FF61D29A000-memory.dmp

          Filesize

          1000KB

        • memory/4192-144-0x00007FF61D1A0000-0x00007FF61D29A000-memory.dmp

          Filesize

          1000KB

        • memory/4192-145-0x00007FF61D1A0000-0x00007FF61D29A000-memory.dmp

          Filesize

          1000KB