Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2023 01:10
Static task
static1
Behavioral task
behavioral1
Sample
aef5c6fec5ea5f20f0e71f34d3777919.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
aef5c6fec5ea5f20f0e71f34d3777919.exe
Resource
win10v2004-20230703-en
General
-
Target
aef5c6fec5ea5f20f0e71f34d3777919.exe
-
Size
448KB
-
MD5
aef5c6fec5ea5f20f0e71f34d3777919
-
SHA1
013c70c60334495904fa1e83a129dd3c369e6acf
-
SHA256
01c7c28d8fcbded6bb906af11b34e65e19a71bc433fa3c8b5e615130f78028d5
-
SHA512
bd48e8ec604e074b759b1c08c9d1e6adb90da902b4f23b9f37210ec32183c22a53d0a571d3c46bf43c32f47debc47313c0c98136ac6bc55bf1004b41c19f2774
-
SSDEEP
6144:L/E8DIpjK28t4snQTlp3z/pSZ+pDKpf9EkQbKxVK+PXItNOapG8RuzRiRh3Zi:dEpj7snAv/cgu4VGn6OaM+ucj
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral2/memory/2728-134-0x0000000002430000-0x0000000002830000-memory.dmp family_rhadamanthys behavioral2/memory/2728-135-0x0000000002430000-0x0000000002830000-memory.dmp family_rhadamanthys behavioral2/memory/2728-136-0x0000000002430000-0x0000000002830000-memory.dmp family_rhadamanthys behavioral2/memory/2728-137-0x0000000002430000-0x0000000002830000-memory.dmp family_rhadamanthys behavioral2/memory/2728-146-0x0000000002430000-0x0000000002830000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2728 created 3168 2728 aef5c6fec5ea5f20f0e71f34d3777919.exe 48 -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2728 aef5c6fec5ea5f20f0e71f34d3777919.exe 2728 aef5c6fec5ea5f20f0e71f34d3777919.exe 2728 aef5c6fec5ea5f20f0e71f34d3777919.exe 2728 aef5c6fec5ea5f20f0e71f34d3777919.exe 3732 certreq.exe 3732 certreq.exe 3732 certreq.exe 3732 certreq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 3732 2728 aef5c6fec5ea5f20f0e71f34d3777919.exe 90 PID 2728 wrote to memory of 3732 2728 aef5c6fec5ea5f20f0e71f34d3777919.exe 90 PID 2728 wrote to memory of 3732 2728 aef5c6fec5ea5f20f0e71f34d3777919.exe 90 PID 2728 wrote to memory of 3732 2728 aef5c6fec5ea5f20f0e71f34d3777919.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\aef5c6fec5ea5f20f0e71f34d3777919.exe"C:\Users\Admin\AppData\Local\Temp\aef5c6fec5ea5f20f0e71f34d3777919.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:3732
-