Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-07-2023 01:10
Static task
static1
Behavioral task
behavioral1
Sample
aef5c6fec5ea5f20f0e71f34d3777919.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
aef5c6fec5ea5f20f0e71f34d3777919.exe
Resource
win10v2004-20230703-en
General
-
Target
aef5c6fec5ea5f20f0e71f34d3777919.exe
-
Size
448KB
-
MD5
aef5c6fec5ea5f20f0e71f34d3777919
-
SHA1
013c70c60334495904fa1e83a129dd3c369e6acf
-
SHA256
01c7c28d8fcbded6bb906af11b34e65e19a71bc433fa3c8b5e615130f78028d5
-
SHA512
bd48e8ec604e074b759b1c08c9d1e6adb90da902b4f23b9f37210ec32183c22a53d0a571d3c46bf43c32f47debc47313c0c98136ac6bc55bf1004b41c19f2774
-
SSDEEP
6144:L/E8DIpjK28t4snQTlp3z/pSZ+pDKpf9EkQbKxVK+PXItNOapG8RuzRiRh3Zi:dEpj7snAv/cgu4VGn6OaM+ucj
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/2616-55-0x0000000001DC0000-0x00000000021C0000-memory.dmp family_rhadamanthys behavioral1/memory/2616-56-0x0000000001DC0000-0x00000000021C0000-memory.dmp family_rhadamanthys behavioral1/memory/2616-57-0x0000000001DC0000-0x00000000021C0000-memory.dmp family_rhadamanthys behavioral1/memory/2616-58-0x0000000001DC0000-0x00000000021C0000-memory.dmp family_rhadamanthys behavioral1/memory/2616-67-0x0000000001DC0000-0x00000000021C0000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2616 created 1208 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 10 -
Deletes itself 1 IoCs
pid Process 2792 certreq.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 2792 certreq.exe 2792 certreq.exe 2792 certreq.exe 2792 certreq.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2792 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 29 PID 2616 wrote to memory of 2792 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 29 PID 2616 wrote to memory of 2792 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 29 PID 2616 wrote to memory of 2792 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 29 PID 2616 wrote to memory of 2792 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 29 PID 2616 wrote to memory of 2792 2616 aef5c6fec5ea5f20f0e71f34d3777919.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\aef5c6fec5ea5f20f0e71f34d3777919.exe"C:\Users\Admin\AppData\Local\Temp\aef5c6fec5ea5f20f0e71f34d3777919.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:2792
-