Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2023 09:29

General

  • Target

    2ee4b1df29fe85c016c84d5855b0ec9f.exe

  • Size

    1016KB

  • MD5

    2ee4b1df29fe85c016c84d5855b0ec9f

  • SHA1

    3062e6dab48c12c1b66c63813f20a0fc86c79966

  • SHA256

    686f9d8e29ba0fd3e4285ecd2f85716bea5be6c3b6571c955c9f6ea9274dc9cf

  • SHA512

    467e227cc86a58e21d038f0b5bba19c229cc1b735199e0a65fba06d099a7c5201ffb50c41845bc115887b9700b592bdfaa65b496db4a02b579c537c9c6255f9a

  • SSDEEP

    12288:aExUboCrf3E1zPXkbaEGJmtNjVu2q8OqdCB5GDdSUHrCAZWgAYhaoa6Wn4jfHh1:a3skbXG+NlOqFeA/BO6W4jp

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 6 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ee4b1df29fe85c016c84d5855b0ec9f.exe
    "C:\Users\Admin\AppData\Local\Temp\2ee4b1df29fe85c016c84d5855b0ec9f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 36
      2⤵
      • Program crash
      PID:2832
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1292
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:2992

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1996-54-0x0000000000900000-0x0000000000A05000-memory.dmp

      Filesize

      1.0MB

    • memory/2972-78-0x0000000000480000-0x00000000004B6000-memory.dmp

      Filesize

      216KB

    • memory/2972-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2972-80-0x0000000002070000-0x0000000002470000-memory.dmp

      Filesize

      4.0MB

    • memory/2972-63-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/2972-64-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/2972-65-0x00000000000B0000-0x00000000000B7000-memory.dmp

      Filesize

      28KB

    • memory/2972-66-0x0000000002070000-0x0000000002470000-memory.dmp

      Filesize

      4.0MB

    • memory/2972-68-0x0000000002070000-0x0000000002470000-memory.dmp

      Filesize

      4.0MB

    • memory/2972-67-0x0000000002070000-0x0000000002470000-memory.dmp

      Filesize

      4.0MB

    • memory/2972-69-0x0000000002070000-0x0000000002470000-memory.dmp

      Filesize

      4.0MB

    • memory/2972-79-0x0000000002070000-0x0000000002470000-memory.dmp

      Filesize

      4.0MB

    • memory/2972-56-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/2972-72-0x0000000000480000-0x00000000004B6000-memory.dmp

      Filesize

      216KB

    • memory/2972-55-0x0000000000400000-0x0000000000471000-memory.dmp

      Filesize

      452KB

    • memory/2992-84-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-92-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-82-0x0000000000120000-0x0000000000127000-memory.dmp

      Filesize

      28KB

    • memory/2992-90-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-97-0x00000000777A0000-0x0000000077949000-memory.dmp

      Filesize

      1.7MB

    • memory/2992-85-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-86-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-71-0x0000000000060000-0x0000000000063000-memory.dmp

      Filesize

      12KB

    • memory/2992-83-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-88-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-91-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-93-0x00000000777A0000-0x0000000077949000-memory.dmp

      Filesize

      1.7MB

    • memory/2992-94-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-95-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-96-0x000007FFFFE80000-0x000007FFFFFAD000-memory.dmp

      Filesize

      1.2MB

    • memory/2992-70-0x0000000000060000-0x0000000000063000-memory.dmp

      Filesize

      12KB