Analysis
-
max time kernel
60s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-06-2023 06:51
Static task
static1
Behavioral task
behavioral1
Sample
ee1a7366583000add321abdd79949f01.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ee1a7366583000add321abdd79949f01.exe
Resource
win10v2004-20230220-en
General
-
Target
ee1a7366583000add321abdd79949f01.exe
-
Size
438KB
-
MD5
ee1a7366583000add321abdd79949f01
-
SHA1
db9201bf7bb4345670b1aaf0b89937099f8bb1e6
-
SHA256
bc1e4e6dd1eec20e8b6685d7e844a0ad045c0700210ef40f451e51dd9fa00910
-
SHA512
ab580e02bb8c0d70ac5edfa8f59848df029f724fbb00b6c92075a9e0497fb1559ece07cd95e5a59b85f05060c76290247dd4265ad41dd045b3af8a13cd5e8372
-
SSDEEP
12288:avBo236cRReRKARDf6U0m7e5J1NezYneTIR7q6wNvJ:aJ3XReRZfH0m7e5J7STIRO
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1040-57-0x0000000003740000-0x0000000003B40000-memory.dmp family_rhadamanthys behavioral1/memory/1040-58-0x0000000003740000-0x0000000003B40000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
ee1a7366583000add321abdd79949f01.exedescription pid process target process PID 1040 created 1372 1040 ee1a7366583000add321abdd79949f01.exe Explorer.EXE -
Deletes itself 1 IoCs
Processes:
certreq.exepid process 1720 certreq.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
certreq.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
ee1a7366583000add321abdd79949f01.execertreq.exepid process 1040 ee1a7366583000add321abdd79949f01.exe 1040 ee1a7366583000add321abdd79949f01.exe 1040 ee1a7366583000add321abdd79949f01.exe 1040 ee1a7366583000add321abdd79949f01.exe 1720 certreq.exe 1720 certreq.exe 1720 certreq.exe 1720 certreq.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ee1a7366583000add321abdd79949f01.exedescription pid process target process PID 1040 wrote to memory of 1720 1040 ee1a7366583000add321abdd79949f01.exe certreq.exe PID 1040 wrote to memory of 1720 1040 ee1a7366583000add321abdd79949f01.exe certreq.exe PID 1040 wrote to memory of 1720 1040 ee1a7366583000add321abdd79949f01.exe certreq.exe PID 1040 wrote to memory of 1720 1040 ee1a7366583000add321abdd79949f01.exe certreq.exe PID 1040 wrote to memory of 1720 1040 ee1a7366583000add321abdd79949f01.exe certreq.exe PID 1040 wrote to memory of 1720 1040 ee1a7366583000add321abdd79949f01.exe certreq.exe -
outlook_office_path 1 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\ee1a7366583000add321abdd79949f01.exe"C:\Users\Admin\AppData\Local\Temp\ee1a7366583000add321abdd79949f01.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:1720
-