Analysis
-
max time kernel
85s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-de -
resource tags
arch:x64arch:x86image:win10v2004-20230220-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
24-05-2023 11:54
Behavioral task
behavioral1
Sample
UpdatePack-KB971033-x64.exe
Resource
win10v2004-20230220-de
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
UpdatePack-KB971033-x64.exe
-
Size
656.4MB
-
MD5
70e0aff711faae8f8d22bd77a6360985
-
SHA1
6a9a40557c9491f453f10bf4cced5acfb9b42149
-
SHA256
1faa0a86d8c56f85c46e1790c28d3c382ba4de6c7a6c8a0187f38fa52ee3c60d
-
SHA512
8437b22e9f3f41cb92c19756bd0d7678245d38237eed682a97ff2f434977df6195712396f26480677a97fc29d3b5bbf789d5e40b5769d732df1f1fea025b2e34
-
SSDEEP
6144:lMkSD+z3hVyHzDDzYepZZMSohQL6ncCDQRs3TXIrkUAlBSnSt/P:lu8kDPYs/johHREkDoSFP
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
UpdatePack-KB971033-x64.exedescription pid process target process PID 3412 set thread context of 4540 3412 UpdatePack-KB971033-x64.exe vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
UpdatePack-KB971033-x64.exedescription pid process target process PID 3412 wrote to memory of 4540 3412 UpdatePack-KB971033-x64.exe vbc.exe PID 3412 wrote to memory of 4540 3412 UpdatePack-KB971033-x64.exe vbc.exe PID 3412 wrote to memory of 4540 3412 UpdatePack-KB971033-x64.exe vbc.exe PID 3412 wrote to memory of 4540 3412 UpdatePack-KB971033-x64.exe vbc.exe PID 3412 wrote to memory of 4540 3412 UpdatePack-KB971033-x64.exe vbc.exe PID 3412 wrote to memory of 4540 3412 UpdatePack-KB971033-x64.exe vbc.exe PID 3412 wrote to memory of 4540 3412 UpdatePack-KB971033-x64.exe vbc.exe PID 3412 wrote to memory of 4540 3412 UpdatePack-KB971033-x64.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UpdatePack-KB971033-x64.exe"C:\Users\Admin\AppData\Local\Temp\UpdatePack-KB971033-x64.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3412-133-0x0000000000070000-0x00000000000D8000-memory.dmpFilesize
416KB
-
memory/3412-134-0x0000000004A00000-0x0000000004A66000-memory.dmpFilesize
408KB
-
memory/3412-135-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/3412-139-0x0000000004AC0000-0x0000000004AD0000-memory.dmpFilesize
64KB
-
memory/4540-137-0x0000000000390000-0x00000000003C7000-memory.dmpFilesize
220KB