Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2023 06:39
Static task
static1
Behavioral task
behavioral1
Sample
4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe
Resource
win10v2004-20230220-en
General
-
Target
4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe
-
Size
499KB
-
MD5
face4d621d9302a91d413b7e3382bbef
-
SHA1
9eaf7022c629efe0afbd3ba6f3df2c5b519071c2
-
SHA256
4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9
-
SHA512
1956e726720ba3dd77c3b0170ab5c5cb678d1b008b0c88e482a8fb86bcb525e8acd81dcf59f2e3303e3590f7ee482a6195e0bdcaf05edc5225651d70c18e2149
-
SSDEEP
6144:NngNIqM32ZLFKdEytr9mpy86eFV2kt25WJ0eR1yp4IQnHkfdI3VQ86iJ5mLe6YtI:gS2ZLAHr9SrKD4Bn3lQ86iJ519twRn
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1828-136-0x0000000002870000-0x0000000002C70000-memory.dmp family_rhadamanthys behavioral1/memory/1828-137-0x0000000002870000-0x0000000002C70000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exedescription pid process target process PID 1828 created 3168 1828 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe Explorer.EXE -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3264 1828 WerFault.exe 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
certreq.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.execertreq.exepid process 1828 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe 1828 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe 1828 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe 1828 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe 4048 certreq.exe 4048 certreq.exe 4048 certreq.exe 4048 certreq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exedescription pid process target process PID 1828 wrote to memory of 4048 1828 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe certreq.exe PID 1828 wrote to memory of 4048 1828 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe certreq.exe PID 1828 wrote to memory of 4048 1828 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe certreq.exe PID 1828 wrote to memory of 4048 1828 4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe certreq.exe -
outlook_office_path 1 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe"C:\Users\Admin\AppData\Local\Temp\4a0246f582678efd65f9d8c2f61e3ee080bf97a7e04972630c99db815a5f84f9.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 7203⤵
- Program crash
PID:3264
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1828 -ip 18281⤵PID:4864