Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2023 06:51
Static task
static1
Behavioral task
behavioral1
Sample
ee1a7366583000add321abdd79949f01.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ee1a7366583000add321abdd79949f01.exe
Resource
win10v2004-20230220-en
General
-
Target
ee1a7366583000add321abdd79949f01.exe
-
Size
438KB
-
MD5
ee1a7366583000add321abdd79949f01
-
SHA1
db9201bf7bb4345670b1aaf0b89937099f8bb1e6
-
SHA256
bc1e4e6dd1eec20e8b6685d7e844a0ad045c0700210ef40f451e51dd9fa00910
-
SHA512
ab580e02bb8c0d70ac5edfa8f59848df029f724fbb00b6c92075a9e0497fb1559ece07cd95e5a59b85f05060c76290247dd4265ad41dd045b3af8a13cd5e8372
-
SSDEEP
12288:avBo236cRReRKARDf6U0m7e5J1NezYneTIR7q6wNvJ:aJ3XReRZfH0m7e5J7STIRO
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2264-136-0x0000000003B90000-0x0000000003F90000-memory.dmp family_rhadamanthys behavioral2/memory/2264-137-0x0000000003B90000-0x0000000003F90000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
ee1a7366583000add321abdd79949f01.exedescription pid process target process PID 2264 created 2812 2264 ee1a7366583000add321abdd79949f01.exe Explorer.EXE -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1056 2264 WerFault.exe ee1a7366583000add321abdd79949f01.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
certreq.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
ee1a7366583000add321abdd79949f01.execertreq.exepid process 2264 ee1a7366583000add321abdd79949f01.exe 2264 ee1a7366583000add321abdd79949f01.exe 2264 ee1a7366583000add321abdd79949f01.exe 2264 ee1a7366583000add321abdd79949f01.exe 1892 certreq.exe 1892 certreq.exe 1892 certreq.exe 1892 certreq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ee1a7366583000add321abdd79949f01.exedescription pid process target process PID 2264 wrote to memory of 1892 2264 ee1a7366583000add321abdd79949f01.exe certreq.exe PID 2264 wrote to memory of 1892 2264 ee1a7366583000add321abdd79949f01.exe certreq.exe PID 2264 wrote to memory of 1892 2264 ee1a7366583000add321abdd79949f01.exe certreq.exe PID 2264 wrote to memory of 1892 2264 ee1a7366583000add321abdd79949f01.exe certreq.exe -
outlook_office_path 1 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
Processes:
certreq.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\ee1a7366583000add321abdd79949f01.exe"C:\Users\Admin\AppData\Local\Temp\ee1a7366583000add321abdd79949f01.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 8723⤵
- Program crash
PID:1056
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2264 -ip 22641⤵PID:3088