Analysis
-
max time kernel
188s -
max time network
210s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
25-05-2023 11:46
Static task
static1
Behavioral task
behavioral1
Sample
680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe
Resource
win10-20230915-en
General
-
Target
680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe
-
Size
3.2MB
-
MD5
af19789d0289ff3e415dd28e6cfa4a92
-
SHA1
c71c49ddc98dea032688c80d253e36efc3541bbc
-
SHA256
680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b
-
SHA512
730ee3b6f37b39dbab89d4f4861c420c46f353f00a6065e0b681214bf6e7d0af34eb60e5d2c743a2570a70e2e7d090ca4a7a705c71c97d8eff6f555cf6152972
-
SSDEEP
49152:meAQahgmy5H5xwSc3qAfWgKn7YtXT8kNEWQ8htSYJF5RnRmMEv9gvB/R6GnpBTeJ:mxO5O3qAfWgKnQwMZQ8/rrR8v9Q7FCyQ
Malware Config
Extracted
bitrat
1.38
179.43.142.55:1995
-
communication_password
a76d949640a165da25ccfe9a8fd82c8a
-
tor_process
tor
Extracted
rhadamanthys
http://163.123.142.243/lekamapopo/6bw0pk.h5m8
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/5072-87-0x0000000002EB0000-0x0000000002ECC000-memory.dmp family_rhadamanthys behavioral1/memory/5072-88-0x0000000002EB0000-0x0000000002ECC000-memory.dmp family_rhadamanthys behavioral1/memory/5072-89-0x0000000002EB0000-0x0000000002ECC000-memory.dmp family_rhadamanthys behavioral1/memory/5072-92-0x0000000002EB0000-0x0000000002ECC000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Blocklisted process makes network request 14 IoCs
flow pid Process 5 4624 rundll32.exe 7 4624 rundll32.exe 8 5072 rundll32.exe 9 5072 rundll32.exe 15 5072 rundll32.exe 16 5072 rundll32.exe 17 4624 rundll32.exe 18 5072 rundll32.exe 19 5072 rundll32.exe 20 5072 rundll32.exe 22 5072 rundll32.exe 23 4624 rundll32.exe 24 5072 rundll32.exe 28 5072 rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 5084 rundll32.exe 2960 rundll32.exe 4668 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4624 rundll32.exe 4624 rundll32.exe 4624 rundll32.exe 4624 rundll32.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 5084 set thread context of 4624 5084 rundll32.exe 74 PID 5084 set thread context of 4624 5084 rundll32.exe 74 PID 5084 set thread context of 4624 5084 rundll32.exe 74 PID 4668 set thread context of 5072 4668 rundll32.exe 75 PID 4668 set thread context of 5072 4668 rundll32.exe 75 PID 4668 set thread context of 5072 4668 rundll32.exe 75 PID 2960 set thread context of 4932 2960 rundll32.exe 77 PID 2960 set thread context of 4932 2960 rundll32.exe 77 PID 2960 set thread context of 4932 2960 rundll32.exe 77 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4624 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4624 rundll32.exe 4624 rundll32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2316 wrote to memory of 5084 2316 680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe 70 PID 2316 wrote to memory of 5084 2316 680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe 70 PID 2316 wrote to memory of 5084 2316 680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe 70 PID 2316 wrote to memory of 2960 2316 680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe 71 PID 2316 wrote to memory of 2960 2316 680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe 71 PID 2316 wrote to memory of 2960 2316 680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe 71 PID 2316 wrote to memory of 4668 2316 680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe 72 PID 2316 wrote to memory of 4668 2316 680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe 72 PID 2316 wrote to memory of 4668 2316 680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe 72 PID 5084 wrote to memory of 4624 5084 rundll32.exe 74 PID 5084 wrote to memory of 4624 5084 rundll32.exe 74 PID 5084 wrote to memory of 4624 5084 rundll32.exe 74 PID 5084 wrote to memory of 4624 5084 rundll32.exe 74 PID 5084 wrote to memory of 4624 5084 rundll32.exe 74 PID 5084 wrote to memory of 4624 5084 rundll32.exe 74 PID 5084 wrote to memory of 4624 5084 rundll32.exe 74 PID 4668 wrote to memory of 5072 4668 rundll32.exe 75 PID 4668 wrote to memory of 5072 4668 rundll32.exe 75 PID 4668 wrote to memory of 5072 4668 rundll32.exe 75 PID 4668 wrote to memory of 5072 4668 rundll32.exe 75 PID 4668 wrote to memory of 5072 4668 rundll32.exe 75 PID 4668 wrote to memory of 5072 4668 rundll32.exe 75 PID 4668 wrote to memory of 5072 4668 rundll32.exe 75 PID 2960 wrote to memory of 4932 2960 rundll32.exe 77 PID 2960 wrote to memory of 4932 2960 rundll32.exe 77 PID 2960 wrote to memory of 4932 2960 rundll32.exe 77 PID 2960 wrote to memory of 4932 2960 rundll32.exe 77 PID 2960 wrote to memory of 4932 2960 rundll32.exe 77 PID 2960 wrote to memory of 4932 2960 rundll32.exe 77 PID 2960 wrote to memory of 4932 2960 rundll32.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe"C:\Users\Admin\AppData\Local\Temp\680493394907af7edb8c6c3c80d04561d7e597ad751900fb064af285e7aaf57b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\rundll32.exerundll32 zlib1.dll,gzungetc2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4624
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 zlib32.dll,gzungetc2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\System32\WerFault.exe"3⤵PID:4932
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 zlib64.dll,gzungetc2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Blocklisted process makes network request
PID:5072
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5f57886ace1ab4972b0308f69b1a0029c
SHA1519b2a981cb522ed2b0901f9871f9aa9781a6cd5
SHA2562be981b3686ee5e725583f5936f5f0a0992723cad784457f91d9d1d5a15a0852
SHA512c2b3f016a8c3993771cd5709e469c9dedfa1dd35047691de5e853e2ad0ac025ec210fc6cb662c82d08f62e2c889e5060e796414a4eaf6a6c1719cdd7e5debdf8
-
Filesize
59KB
MD5f57886ace1ab4972b0308f69b1a0029c
SHA1519b2a981cb522ed2b0901f9871f9aa9781a6cd5
SHA2562be981b3686ee5e725583f5936f5f0a0992723cad784457f91d9d1d5a15a0852
SHA512c2b3f016a8c3993771cd5709e469c9dedfa1dd35047691de5e853e2ad0ac025ec210fc6cb662c82d08f62e2c889e5060e796414a4eaf6a6c1719cdd7e5debdf8
-
Filesize
2.6MB
MD582800db9f991ebe0957d1c2b22baaa3f
SHA18dd9e22a89402be5cdeaeb287c19587047b8d4e8
SHA256431a296814439b6b6edd4fe155b7ef03d3ac7bf26b9c85632d5ffedea28d6122
SHA512f5a0a82dc1ebb8b74727e8ed5e984b634e123be70e4a55a6c6138902eda9899678407cb47c12c3143bbcfd5555250626a9ae4459e81a634ef8b678d3101576f4
-
Filesize
241KB
MD5170ecc123e06d6ceb27318b720a32897
SHA1458e3faf27edbe7eb93ed3edc50ef65bf8db204b
SHA25665de3437c7f6bf4a2ceb2c0ef3aa46ad82687a76b7c609f8b39ceb937e899a23
SHA512132fbc05ff9764c3e5c120222eed7025ccc7727513cd6bb253e2fdcdec88226bb76360b7c5193197ffdd1fcf1ff957288dbe34527bcccf9e9509accdfc66d12f
-
Filesize
399KB
MD58bc379e8f3d3a9921ded76ce8346d098
SHA16fa2ee7ce9b15e758ed9e9fcccf4df8b9e46089f
SHA2567e8b7219994c2076f5413b067da77a640b432b4472d8765ec71f5ff75ac9ae68
SHA512a149ba05408a91b4d99feaec26112680b8e9e00bf252ac4c2dbe02fdce81307fce1abc95bbdaeb3fc207a094de7053a6235f9f0f02fb208f5ab2673d0b60bd84
-
Filesize
2.6MB
MD582800db9f991ebe0957d1c2b22baaa3f
SHA18dd9e22a89402be5cdeaeb287c19587047b8d4e8
SHA256431a296814439b6b6edd4fe155b7ef03d3ac7bf26b9c85632d5ffedea28d6122
SHA512f5a0a82dc1ebb8b74727e8ed5e984b634e123be70e4a55a6c6138902eda9899678407cb47c12c3143bbcfd5555250626a9ae4459e81a634ef8b678d3101576f4
-
Filesize
241KB
MD5170ecc123e06d6ceb27318b720a32897
SHA1458e3faf27edbe7eb93ed3edc50ef65bf8db204b
SHA25665de3437c7f6bf4a2ceb2c0ef3aa46ad82687a76b7c609f8b39ceb937e899a23
SHA512132fbc05ff9764c3e5c120222eed7025ccc7727513cd6bb253e2fdcdec88226bb76360b7c5193197ffdd1fcf1ff957288dbe34527bcccf9e9509accdfc66d12f
-
Filesize
399KB
MD58bc379e8f3d3a9921ded76ce8346d098
SHA16fa2ee7ce9b15e758ed9e9fcccf4df8b9e46089f
SHA2567e8b7219994c2076f5413b067da77a640b432b4472d8765ec71f5ff75ac9ae68
SHA512a149ba05408a91b4d99feaec26112680b8e9e00bf252ac4c2dbe02fdce81307fce1abc95bbdaeb3fc207a094de7053a6235f9f0f02fb208f5ab2673d0b60bd84