Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 15:52
Static task
static1
Behavioral task
behavioral1
Sample
9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe
-
Size
482KB
-
MD5
64b9cbea3a5849549a4eed0408084900
-
SHA1
06acd87d6411d9cfb341dd22578556f4470cb918
-
SHA256
9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e
-
SHA512
1b4c343f105ba86fa87da32a467e9c54664268072d9651af6b874a96b1ef71349f0fdc4e2f5d24b4e2db800397b849a245d648da38a0563326c371080b81e5a0
-
SSDEEP
6144:tRhQLVIIUkuneo1l4YEgsRDaWuYXoPewdCCpsAg3Gv38QtajXvSAwSPcw60gGD0C:t0xIIUkueCFsVe2wZpVgq8Q0SwVvvL
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral2/memory/3500-145-0x0000000003A40000-0x0000000003E40000-memory.dmp family_rhadamanthys behavioral2/memory/3500-146-0x0000000003A40000-0x0000000003E40000-memory.dmp family_rhadamanthys behavioral2/memory/3500-147-0x0000000003A40000-0x0000000003E40000-memory.dmp family_rhadamanthys behavioral2/memory/3500-148-0x0000000003A40000-0x0000000003E40000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1564 3500 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3500 9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe 3500 9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe"C:\Users\Admin\AppData\Local\Temp\9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 4842⤵
- Program crash
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3500 -ip 35001⤵PID:2344