Analysis
-
max time kernel
105s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
0b022ec9f04e701c407ef27fc2684f96.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0b022ec9f04e701c407ef27fc2684f96.exe
Resource
win10v2004-20230220-en
General
-
Target
0b022ec9f04e701c407ef27fc2684f96.exe
-
Size
315KB
-
MD5
0b022ec9f04e701c407ef27fc2684f96
-
SHA1
39f593e6e3c278bec44ccb44713f370e791890fb
-
SHA256
f1b26f0cc0816504f12258a3ee424de6fbe44726489a30318f210a97a2160fb9
-
SHA512
0bd0d209e2ae6f7c06aa7c5161a591217f34dc402b04ab317b24f2a919647e35b56fb4b77b9aa3df8b32dc3ad1b9d1ae27bb5772d8fb74f56aaaa38c2cad9e50
-
SSDEEP
6144:XMQ7AYGvhE/2hmRk5DmcUH5fc47Ztkjt:8sATJe2ccUH5fc47Gt
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral2/memory/4588-138-0x0000000000A90000-0x0000000000AAC000-memory.dmp family_rhadamanthys behavioral2/memory/4588-140-0x0000000000A90000-0x0000000000AAC000-memory.dmp family_rhadamanthys behavioral2/memory/4588-142-0x0000000000A90000-0x0000000000AAC000-memory.dmp family_rhadamanthys behavioral2/memory/4588-143-0x0000000002720000-0x0000000003720000-memory.dmp family_rhadamanthys behavioral2/memory/4588-150-0x0000000000A90000-0x0000000000AAC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4588 0b022ec9f04e701c407ef27fc2684f96.exe 4588 0b022ec9f04e701c407ef27fc2684f96.exe 4588 0b022ec9f04e701c407ef27fc2684f96.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1948 4588 WerFault.exe 88 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4588 0b022ec9f04e701c407ef27fc2684f96.exe 4588 0b022ec9f04e701c407ef27fc2684f96.exe 4460 dllhost.exe 4460 dllhost.exe 4460 dllhost.exe 4460 dllhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4460 4588 0b022ec9f04e701c407ef27fc2684f96.exe 95 PID 4588 wrote to memory of 4460 4588 0b022ec9f04e701c407ef27fc2684f96.exe 95 PID 4588 wrote to memory of 4460 4588 0b022ec9f04e701c407ef27fc2684f96.exe 95 PID 4588 wrote to memory of 4460 4588 0b022ec9f04e701c407ef27fc2684f96.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b022ec9f04e701c407ef27fc2684f96.exe"C:\Users\Admin\AppData\Local\Temp\0b022ec9f04e701c407ef27fc2684f96.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 7242⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4588 -ip 45881⤵PID:4556