Analysis
-
max time kernel
158s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 12:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bcbdacb.exe
Resource
win7-20230220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bcbdacb.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
bcbdacb.exe
-
Size
1.2MB
-
MD5
b99290063c63c1449c6d61c62f95528d
-
SHA1
dc80d751832030dbe05bb34e691a6237e2a224b5
-
SHA256
162833c025dda5b2154fc193bc71bc3e375794e13f6392f387839599df9d90e0
-
SHA512
4f6b717d1c18042243f7f62009e2638fa51e2a7139285a8469e3ba2458dc658ef6ccc8401b7c1ade0742c4dd6dd7ab98c487165f0142558191e9a7192c57c19c
-
SSDEEP
12288:UPqvdlwvVVmpmiUkWnbaczXSisUFhiqNnuJCbM/C3irgP92vjy9jhBvcS5K+xlBW:Uy5iV7bTEyhBVdhPTyITdOqa
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2508-141-0x0000000000F60000-0x0000000000F7D000-memory.dmp family_rhadamanthys behavioral2/memory/2508-144-0x00000000030D0000-0x00000000040D0000-memory.dmp family_rhadamanthys behavioral2/memory/2508-146-0x0000000000F60000-0x0000000000F7D000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
InstallUtil.exepid process 2508 InstallUtil.exe 2508 InstallUtil.exe 2508 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bcbdacb.exedescription pid process target process PID 4176 set thread context of 2508 4176 bcbdacb.exe InstallUtil.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bcbdacb.exedescription pid process target process PID 4176 wrote to memory of 2508 4176 bcbdacb.exe InstallUtil.exe PID 4176 wrote to memory of 2508 4176 bcbdacb.exe InstallUtil.exe PID 4176 wrote to memory of 2508 4176 bcbdacb.exe InstallUtil.exe PID 4176 wrote to memory of 2508 4176 bcbdacb.exe InstallUtil.exe PID 4176 wrote to memory of 2508 4176 bcbdacb.exe InstallUtil.exe PID 4176 wrote to memory of 2508 4176 bcbdacb.exe InstallUtil.exe PID 4176 wrote to memory of 2508 4176 bcbdacb.exe InstallUtil.exe PID 4176 wrote to memory of 2508 4176 bcbdacb.exe InstallUtil.exe PID 4176 wrote to memory of 2508 4176 bcbdacb.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcbdacb.exe"C:\Users\Admin\AppData\Local\Temp\bcbdacb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2508
-