Resubmissions
20/08/2024, 14:12
240820-rjb9nswdmd 1017/08/2024, 19:49
240817-yjs1ratbnf 1015/08/2024, 17:38
240815-v7zlnavale 1030/06/2023, 12:04
230630-n8y8yshh95 10Analysis
-
max time kernel
124s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
cc.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
cc.exe
Resource
win10v2004-20230621-en
General
-
Target
cc.exe
-
Size
501KB
-
MD5
f73e68f4995b58c9a1e47d67da9372ca
-
SHA1
0760b6b12d99915182bee3e3fa0e9aabd7a830c0
-
SHA256
ea741d942926073191df32a404977cc4afa3b17bcd34871faafbf7f61be71c26
-
SHA512
a419e78a385ad5e11224dad96b508e7bb01209a21fad338722e68d1d92cd78b92267af13f037126d04e49451fa62f089edb6ee77f7d2ce1cb9e26d56473b02af
-
SSDEEP
6144:HoR7YSOIypGIyGYdqfCwgKo74ERmvOJUlARI7hJEftv99J:yTPMlyldqfCwTE/QmJUlAO7hJElv9L
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
resource yara_rule behavioral2/memory/4928-136-0x0000000003800000-0x0000000003C00000-memory.dmp family_rhadamanthys behavioral2/memory/4928-137-0x0000000003800000-0x0000000003C00000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4928 created 3124 4928 cc.exe 43 -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{2DCA4442-ADF3-4C3F-A124-12A284535163}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{FFBAAB73-2EAE-42EA-9BBE-18D795542EFB}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{D8131A03-2404-479C-B85C-222BAA5C2128}.catalogItem svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1208 4928 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4928 cc.exe 4928 cc.exe 4928 cc.exe 4928 cc.exe 3344 certreq.exe 3344 certreq.exe 3344 certreq.exe 3344 certreq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3344 4928 cc.exe 88 PID 4928 wrote to memory of 3344 4928 cc.exe 88 PID 4928 wrote to memory of 3344 4928 cc.exe 88 PID 4928 wrote to memory of 3344 4928 cc.exe 88 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3259792829-1422303781-2047321929-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\cc.exe"C:\Users\Admin\AppData\Local\Temp\cc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 9803⤵
- Program crash
PID:1208
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4928 -ip 49281⤵PID:984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:4028