Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
17/08/2023, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe
Resource
win10-20230703-en
General
-
Target
28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe
-
Size
83KB
-
MD5
7dc3df0b2a354597a2e176f058a89987
-
SHA1
09cc1d2a0634043986bbbf5f6c35ba637dca8fe2
-
SHA256
28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633
-
SHA512
e0b77fcc8ee3dbb2ab2115aa8f86bd812276d20c9de55bb0599f391462becb01c1df037a114d73c6c73b563dd87a14c546039f5aae24b0262135183215196bb0
-
SSDEEP
1536:tZC45DT2B4cRW4BaG1+GThdcR4EnviR2Ttm9Y5:uCGThdcSZY5
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/5008-4632-0x0000000002F10000-0x0000000003310000-memory.dmp family_rhadamanthys behavioral1/memory/5008-4639-0x0000000002F10000-0x0000000003310000-memory.dmp family_rhadamanthys behavioral1/memory/5008-5232-0x0000000002F10000-0x0000000003310000-memory.dmp family_rhadamanthys behavioral1/memory/5008-5237-0x0000000002F10000-0x0000000003310000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5008 created 2420 5008 Vaqjmew.exe 49 -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 3956 Vaqjmew.exe 920 Hjejary.exe 5008 Vaqjmew.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2276 set thread context of 1596 2276 28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe 70 PID 3956 set thread context of 5008 3956 Vaqjmew.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1596 RegAsm.exe 1596 RegAsm.exe 5008 Vaqjmew.exe 5008 Vaqjmew.exe 5008 Vaqjmew.exe 5008 Vaqjmew.exe 1060 certreq.exe 1060 certreq.exe 1060 certreq.exe 1060 certreq.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2276 28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe Token: SeDebugPrivilege 1596 RegAsm.exe Token: SeDebugPrivilege 3956 Vaqjmew.exe Token: SeDebugPrivilege 920 Hjejary.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1596 2276 28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe 70 PID 2276 wrote to memory of 1596 2276 28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe 70 PID 2276 wrote to memory of 1596 2276 28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe 70 PID 2276 wrote to memory of 1596 2276 28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe 70 PID 2276 wrote to memory of 1596 2276 28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe 70 PID 2276 wrote to memory of 1596 2276 28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe 70 PID 1596 wrote to memory of 3956 1596 RegAsm.exe 71 PID 1596 wrote to memory of 3956 1596 RegAsm.exe 71 PID 1596 wrote to memory of 3956 1596 RegAsm.exe 71 PID 3956 wrote to memory of 920 3956 Vaqjmew.exe 73 PID 3956 wrote to memory of 920 3956 Vaqjmew.exe 73 PID 3956 wrote to memory of 5008 3956 Vaqjmew.exe 74 PID 3956 wrote to memory of 5008 3956 Vaqjmew.exe 74 PID 3956 wrote to memory of 5008 3956 Vaqjmew.exe 74 PID 3956 wrote to memory of 5008 3956 Vaqjmew.exe 74 PID 3956 wrote to memory of 5008 3956 Vaqjmew.exe 74 PID 3956 wrote to memory of 5008 3956 Vaqjmew.exe 74 PID 3956 wrote to memory of 5008 3956 Vaqjmew.exe 74 PID 3956 wrote to memory of 5008 3956 Vaqjmew.exe 74 PID 5008 wrote to memory of 1060 5008 Vaqjmew.exe 75 PID 5008 wrote to memory of 1060 5008 Vaqjmew.exe 75 PID 5008 wrote to memory of 1060 5008 Vaqjmew.exe 75 PID 5008 wrote to memory of 1060 5008 Vaqjmew.exe 75
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe"C:\Users\Admin\AppData\Local\Temp\28c3d3c7eaeda6d725a37485794dd08a79225440a66d4595c76698979a92c633.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Vaqjmew.exe"C:\Users\Admin\AppData\Local\Temp\Vaqjmew.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Hjejary.exe"C:\Users\Admin\AppData\Local\Temp\Hjejary.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\Vaqjmew.exeC:\Users\Admin\AppData\Local\Temp\Vaqjmew.exe5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5008
-
-
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD57141cd0b50defb4e1539475686b1ffbe
SHA168adaedd7b62ed3a29f406d2ced5b4ae8dd76101
SHA256e06efa2b34b9d5744ea32b729234ae09ef015527ccc1b70086cf693b50368191
SHA512e7069135f5e5ba86376cd078bfbde654b257fb2e26a56d61fb4a91ced8c133ac1e7481d6215745a2d48988942a3cd0e7b9eb57ec90a6d32d079a57d13d03d2af
-
Filesize
83KB
MD57141cd0b50defb4e1539475686b1ffbe
SHA168adaedd7b62ed3a29f406d2ced5b4ae8dd76101
SHA256e06efa2b34b9d5744ea32b729234ae09ef015527ccc1b70086cf693b50368191
SHA512e7069135f5e5ba86376cd078bfbde654b257fb2e26a56d61fb4a91ced8c133ac1e7481d6215745a2d48988942a3cd0e7b9eb57ec90a6d32d079a57d13d03d2af
-
Filesize
83KB
MD5a65e7d38e28e2e993462addd9364086c
SHA159bbabe51bb063e5610e11dfe76678e4bd8d3ca0
SHA256246694b07e7f0bdf64cbec8550686d211a844de1888d689a834391a22b66617d
SHA5121363b586c4a56532e6b5eb275721df8d9bab45b8948e8945633520004b5c47acd5ea7800b40998dd42fb36af032454981f31b635324765ecfda9a1bf336e6a7f
-
Filesize
83KB
MD5a65e7d38e28e2e993462addd9364086c
SHA159bbabe51bb063e5610e11dfe76678e4bd8d3ca0
SHA256246694b07e7f0bdf64cbec8550686d211a844de1888d689a834391a22b66617d
SHA5121363b586c4a56532e6b5eb275721df8d9bab45b8948e8945633520004b5c47acd5ea7800b40998dd42fb36af032454981f31b635324765ecfda9a1bf336e6a7f
-
Filesize
83KB
MD5a65e7d38e28e2e993462addd9364086c
SHA159bbabe51bb063e5610e11dfe76678e4bd8d3ca0
SHA256246694b07e7f0bdf64cbec8550686d211a844de1888d689a834391a22b66617d
SHA5121363b586c4a56532e6b5eb275721df8d9bab45b8948e8945633520004b5c47acd5ea7800b40998dd42fb36af032454981f31b635324765ecfda9a1bf336e6a7f