Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2023 20:49
Static task
static1
Behavioral task
behavioral1
Sample
bcbdacb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bcbdacb.exe
Resource
win10v2004-20230220-en
General
-
Target
bcbdacb.exe
-
Size
1.2MB
-
MD5
b99290063c63c1449c6d61c62f95528d
-
SHA1
dc80d751832030dbe05bb34e691a6237e2a224b5
-
SHA256
162833c025dda5b2154fc193bc71bc3e375794e13f6392f387839599df9d90e0
-
SHA512
4f6b717d1c18042243f7f62009e2638fa51e2a7139285a8469e3ba2458dc658ef6ccc8401b7c1ade0742c4dd6dd7ab98c487165f0142558191e9a7192c57c19c
-
SSDEEP
12288:UPqvdlwvVVmpmiUkWnbaczXSisUFhiqNnuJCbM/C3irgP92vjy9jhBvcS5K+xlBW:Uy5iV7bTEyhBVdhPTyITdOqa
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1768-142-0x0000000002810000-0x000000000282D000-memory.dmp family_rhadamanthys behavioral2/memory/1768-146-0x0000000002810000-0x000000000282D000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
InstallUtil.exepid process 1768 InstallUtil.exe 1768 InstallUtil.exe 1768 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bcbdacb.exedescription pid process target process PID 4104 set thread context of 1768 4104 bcbdacb.exe InstallUtil.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bcbdacb.exedescription pid process target process PID 4104 wrote to memory of 1768 4104 bcbdacb.exe InstallUtil.exe PID 4104 wrote to memory of 1768 4104 bcbdacb.exe InstallUtil.exe PID 4104 wrote to memory of 1768 4104 bcbdacb.exe InstallUtil.exe PID 4104 wrote to memory of 1768 4104 bcbdacb.exe InstallUtil.exe PID 4104 wrote to memory of 1768 4104 bcbdacb.exe InstallUtil.exe PID 4104 wrote to memory of 1768 4104 bcbdacb.exe InstallUtil.exe PID 4104 wrote to memory of 1768 4104 bcbdacb.exe InstallUtil.exe PID 4104 wrote to memory of 1768 4104 bcbdacb.exe InstallUtil.exe PID 4104 wrote to memory of 1768 4104 bcbdacb.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcbdacb.exe"C:\Users\Admin\AppData\Local\Temp\bcbdacb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1768-135-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1768-138-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1768-139-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1768-142-0x0000000002810000-0x000000000282D000-memory.dmpFilesize
116KB
-
memory/1768-143-0x0000000000E60000-0x0000000000E62000-memory.dmpFilesize
8KB
-
memory/1768-144-0x0000000000E60000-0x0000000000E63000-memory.dmpFilesize
12KB
-
memory/1768-145-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1768-146-0x0000000002810000-0x000000000282D000-memory.dmpFilesize
116KB
-
memory/4104-133-0x000001FA6DB10000-0x000001FA6DC48000-memory.dmpFilesize
1.2MB
-
memory/4104-134-0x000001FA6DFB0000-0x000001FA6DFC0000-memory.dmpFilesize
64KB