Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
15-07-2023 05:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe
Resource
win10-20230703-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe
-
Size
374KB
-
MD5
967775fbefc77938a36ef45c7deabccb
-
SHA1
eb1bc33881ebaa4a47abbb2a9e4d3cbfd98a5b91
-
SHA256
4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd
-
SHA512
3d14fd1ac1af2b9646ed6dd46e57f27971a5368d7e9c766cee77ef17482333ca9d53570945f98edb436c58e9399ccb19816d89c4b2c1732c5bfd18d3d457bbd3
-
SSDEEP
6144:d1LpxvA1F4D1BTjwypbU4YNWqfuUjxJFuDxBRdg9WIIg+xP0l7Ea/0:7deUBI6UtfuUjADJdjgoP0ea8
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/2128-126-0x00000000026C0000-0x0000000002AC0000-memory.dmp family_rhadamanthys behavioral1/memory/2128-128-0x00000000026C0000-0x0000000002AC0000-memory.dmp family_rhadamanthys behavioral1/memory/2128-127-0x00000000026C0000-0x0000000002AC0000-memory.dmp family_rhadamanthys behavioral1/memory/2128-129-0x00000000026C0000-0x0000000002AC0000-memory.dmp family_rhadamanthys behavioral1/memory/2128-142-0x00000000026C0000-0x0000000002AC0000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2128 created 3176 2128 4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe 61 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2128 4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe 2128 4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe 2128 4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe 2128 4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 4856 2128 4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe 70 PID 2128 wrote to memory of 4856 2128 4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe 70 PID 2128 wrote to memory of 4856 2128 4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe 70 PID 2128 wrote to memory of 4856 2128 4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe 70
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe"C:\Users\Admin\AppData\Local\Temp\4e993c98839d5adf3246ee13f4d60f6166d028fcf6f8ec05137e5c2a1c5942cd.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵PID:4856
-