Analysis

  • max time kernel
    138s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/08/2023, 15:52

General

  • Target

    9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe

  • Size

    482KB

  • MD5

    64b9cbea3a5849549a4eed0408084900

  • SHA1

    06acd87d6411d9cfb341dd22578556f4470cb918

  • SHA256

    9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e

  • SHA512

    1b4c343f105ba86fa87da32a467e9c54664268072d9651af6b874a96b1ef71349f0fdc4e2f5d24b4e2db800397b849a245d648da38a0563326c371080b81e5a0

  • SSDEEP

    6144:tRhQLVIIUkuneo1l4YEgsRDaWuYXoPewdCCpsAg3Gv38QtajXvSAwSPcw60gGD0C:t0xIIUkueCFsVe2wZpVgq8Q0SwVvvL

Score
10/10

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\9fe249dcf9427f8108078fa84ca1d2f16c31936b3457027bb424eadb689aea3e_JC.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 484
      2⤵
      • Program crash
      PID:1564
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3500 -ip 3500
    1⤵
      PID:2344

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3500-133-0x0000000003690000-0x00000000036D9000-memory.dmp

            Filesize

            292KB

          • memory/3500-134-0x00000000036E0000-0x0000000003753000-memory.dmp

            Filesize

            460KB

          • memory/3500-135-0x0000000000400000-0x00000000018F6000-memory.dmp

            Filesize

            21.0MB

          • memory/3500-136-0x0000000000400000-0x00000000018F6000-memory.dmp

            Filesize

            21.0MB

          • memory/3500-137-0x0000000003690000-0x00000000036D9000-memory.dmp

            Filesize

            292KB

          • memory/3500-138-0x00000000036E0000-0x0000000003753000-memory.dmp

            Filesize

            460KB

          • memory/3500-144-0x0000000001910000-0x0000000001917000-memory.dmp

            Filesize

            28KB

          • memory/3500-145-0x0000000003A40000-0x0000000003E40000-memory.dmp

            Filesize

            4.0MB

          • memory/3500-146-0x0000000003A40000-0x0000000003E40000-memory.dmp

            Filesize

            4.0MB

          • memory/3500-147-0x0000000003A40000-0x0000000003E40000-memory.dmp

            Filesize

            4.0MB

          • memory/3500-148-0x0000000003A40000-0x0000000003E40000-memory.dmp

            Filesize

            4.0MB

          • memory/3500-149-0x0000000000400000-0x00000000018F6000-memory.dmp

            Filesize

            21.0MB