Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2023 09:55
Static task
static1
Behavioral task
behavioral1
Sample
74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe
-
Size
495KB
-
MD5
4c224ad23e402d58bbd23023bf883dc0
-
SHA1
67cbaf4b24ccf90ca845626d1ed97831ef0dd55b
-
SHA256
74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983
-
SHA512
5aad2b848d6098c8cdbf58ce115ac832826e82f803aaaca5625197c445d3849f6cb256aaeeebed4bd3a5b0db92f0f957ee5de79312f4fc4b9769f8deae0b5766
-
SSDEEP
12288:hwp22VqKfpoJfgq+mugd256TJzxpQodc5X:hwp26PfOJfgbmBT5c5
Malware Config
Extracted
systembc
discordcdn8839248.com:4327
chinabar821994.com:4327
Signatures
-
Detect rhadamanthys stealer shellcode 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2720-138-0x0000000004190000-0x0000000004590000-memory.dmp family_rhadamanthys behavioral2/memory/2720-139-0x0000000004190000-0x0000000004590000-memory.dmp family_rhadamanthys behavioral2/memory/2720-140-0x0000000004190000-0x0000000004590000-memory.dmp family_rhadamanthys behavioral2/memory/2720-141-0x0000000004190000-0x0000000004590000-memory.dmp family_rhadamanthys behavioral2/memory/2720-153-0x0000000004190000-0x0000000004590000-memory.dmp family_rhadamanthys behavioral2/memory/2720-156-0x0000000004190000-0x0000000004590000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exedescription pid process target process PID 2720 created 684 2720 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe Explorer.EXE -
Executes dropped EXE 1 IoCs
Processes:
8L[N6{J.exepid process 4656 8L[N6{J.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8L[N6{J.exedescription pid process target process PID 4656 set thread context of 3792 4656 8L[N6{J.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 816 2720 WerFault.exe 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe 2552 4656 WerFault.exe 8L[N6{J.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.execertreq.exepid process 2720 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe 2720 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe 2720 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe 2720 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe 652 certreq.exe 652 certreq.exe 652 certreq.exe 652 certreq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe8L[N6{J.exedescription pid process target process PID 2720 wrote to memory of 652 2720 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe certreq.exe PID 2720 wrote to memory of 652 2720 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe certreq.exe PID 2720 wrote to memory of 652 2720 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe certreq.exe PID 2720 wrote to memory of 652 2720 74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe certreq.exe PID 4656 wrote to memory of 3792 4656 8L[N6{J.exe AppLaunch.exe PID 4656 wrote to memory of 3792 4656 8L[N6{J.exe AppLaunch.exe PID 4656 wrote to memory of 3792 4656 8L[N6{J.exe AppLaunch.exe PID 4656 wrote to memory of 3792 4656 8L[N6{J.exe AppLaunch.exe PID 4656 wrote to memory of 3792 4656 8L[N6{J.exe AppLaunch.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983exeexe_JC.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 7883⤵
- Program crash
PID:816
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2720 -ip 27201⤵PID:1832
-
C:\Users\Admin\AppData\Local\Microsoft\8L[N6{J.exe"C:\Users\Admin\AppData\Local\Microsoft\8L[N6{J.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 2962⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4656 -ip 46561⤵PID:2816
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
961KB
MD5648e1bf1672068d725a9b8434627947e
SHA1c21e0bd251e33d4464fdd376ae46fe4f01c533cf
SHA2564a5fe40bf37ab130d9110fab42764841ee9f9b49af7f9bef1fb79bc377fa14e2
SHA512c735fadc81e2851f930491095fbd0fb023da9a53037efdf7c989583952636023d4205aa72dd3c217935f44e53fb34cb7a0d5ef9e4baac192f4515780e59de725
-
Filesize
961KB
MD5648e1bf1672068d725a9b8434627947e
SHA1c21e0bd251e33d4464fdd376ae46fe4f01c533cf
SHA2564a5fe40bf37ab130d9110fab42764841ee9f9b49af7f9bef1fb79bc377fa14e2
SHA512c735fadc81e2851f930491095fbd0fb023da9a53037efdf7c989583952636023d4205aa72dd3c217935f44e53fb34cb7a0d5ef9e4baac192f4515780e59de725