Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2023 15:52

General

  • Target

    9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe

  • Size

    482KB

  • MD5

    64b9cbea3a5849549a4eed0408084900

  • SHA1

    06acd87d6411d9cfb341dd22578556f4470cb918

  • SHA256

    9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e

  • SHA512

    1b4c343f105ba86fa87da32a467e9c54664268072d9651af6b874a96b1ef71349f0fdc4e2f5d24b4e2db800397b849a245d648da38a0563326c371080b81e5a0

  • SSDEEP

    6144:tRhQLVIIUkuneo1l4YEgsRDaWuYXoPewdCCpsAg3Gv38QtajXvSAwSPcw60gGD0C:t0xIIUkueCFsVe2wZpVgq8Q0SwVvvL

Score
10/10

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2528

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2528-54-0x0000000000220000-0x0000000000269000-memory.dmp

    Filesize

    292KB

  • memory/2528-55-0x0000000000270000-0x00000000002E3000-memory.dmp

    Filesize

    460KB

  • memory/2528-56-0x0000000000400000-0x00000000018F6000-memory.dmp

    Filesize

    21.0MB

  • memory/2528-57-0x0000000000400000-0x00000000018F6000-memory.dmp

    Filesize

    21.0MB

  • memory/2528-58-0x0000000000220000-0x0000000000269000-memory.dmp

    Filesize

    292KB

  • memory/2528-59-0x0000000000270000-0x00000000002E3000-memory.dmp

    Filesize

    460KB

  • memory/2528-64-0x0000000000300000-0x0000000000307000-memory.dmp

    Filesize

    28KB

  • memory/2528-65-0x00000000035A0000-0x00000000039A0000-memory.dmp

    Filesize

    4.0MB

  • memory/2528-67-0x00000000035A0000-0x00000000039A0000-memory.dmp

    Filesize

    4.0MB

  • memory/2528-66-0x00000000035A0000-0x00000000039A0000-memory.dmp

    Filesize

    4.0MB

  • memory/2528-68-0x00000000035A0000-0x00000000039A0000-memory.dmp

    Filesize

    4.0MB

  • memory/2528-69-0x0000000000400000-0x00000000018F6000-memory.dmp

    Filesize

    21.0MB