Resubmissions

27/11/2024, 10:04 UTC

241127-l4fjyawjcj 10

31/08/2023, 11:48 UTC

230831-nypxjaeh73 10

Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/08/2023, 11:48 UTC

General

  • Target

    vincent_rhad.exe

  • Size

    456KB

  • MD5

    014b6d7fd900989ef6cbac0aaddf7026

  • SHA1

    f3bfdcd146a1c56da652dc1d3317c00b81b8e053

  • SHA256

    14ba649ece39c9ccd1c0aea0e1be52543860cd4046bd200bb9fe6c97e51a1319

  • SHA512

    11e98446af77f2fd6904d8c53adcd721777b824fdf6686c943acefea172e721b70f3c806d6ffa6f9f88d91cfbbfe76b06b3e98a17dd0ad30c17a0110c6c52024

  • SSDEEP

    6144:2uWP/BtSnurUylcrGYlnIttxv8HbcLgsd1Gus5psdrvV44dixP+MHDkBYdxtG9+8:2uWP/BZUyoLu8Agsmxwrvejkd2

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 5 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3176
      • C:\Users\Admin\AppData\Local\Temp\vincent_rhad.exe
        "C:\Users\Admin\AppData\Local\Temp\vincent_rhad.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1608
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:4716

    Network

    • flag-us
      DNS
      158.240.127.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      158.240.127.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      1.208.79.178.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      1.208.79.178.in-addr.arpa
      IN PTR
      Response
      1.208.79.178.in-addr.arpa
      IN PTR
      https-178-79-208-1amsllnwnet
    • flag-us
      DNS
      22.160.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      22.160.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      54.177.243.136.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      54.177.243.136.in-addr.arpa
      IN PTR
      Response
      54.177.243.136.in-addr.arpa
      IN PTR
      static54177243136clients your-serverde
    • flag-us
      DNS
      26.165.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      26.165.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.31.95.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.31.95.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      254.5.248.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      254.5.248.8.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      86.8.109.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      86.8.109.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      7.173.189.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      7.173.189.20.in-addr.arpa
      IN PTR
      Response
    • 136.243.177.54:8010
      tls
      vincent_rhad.exe
      38.9kB
      2.0MB
      800
      1402
    • 136.243.177.54:8010
      tls
      certreq.exe
      83.7kB
      4.3kB
      75
      42
    • 8.8.8.8:53
      158.240.127.40.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      158.240.127.40.in-addr.arpa

    • 8.8.8.8:53
      1.208.79.178.in-addr.arpa
      dns
      71 B
      116 B
      1
      1

      DNS Request

      1.208.79.178.in-addr.arpa

    • 8.8.8.8:53
      22.160.190.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      22.160.190.20.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      54.177.243.136.in-addr.arpa
      dns
      73 B
      131 B
      1
      1

      DNS Request

      54.177.243.136.in-addr.arpa

    • 8.8.8.8:53
      26.165.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      26.165.165.52.in-addr.arpa

    • 8.8.8.8:53
      18.31.95.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      18.31.95.13.in-addr.arpa

    • 8.8.8.8:53
      254.5.248.8.in-addr.arpa
      dns
      70 B
      124 B
      1
      1

      DNS Request

      254.5.248.8.in-addr.arpa

    • 8.8.8.8:53
      86.8.109.52.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      86.8.109.52.in-addr.arpa

    • 8.8.8.8:53
      7.173.189.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      7.173.189.20.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1608-12-0x0000000003100000-0x0000000003136000-memory.dmp

      Filesize

      216KB

    • memory/1608-1-0x0000000002380000-0x0000000002780000-memory.dmp

      Filesize

      4.0MB

    • memory/1608-2-0x0000000002380000-0x0000000002780000-memory.dmp

      Filesize

      4.0MB

    • memory/1608-3-0x0000000002380000-0x0000000002780000-memory.dmp

      Filesize

      4.0MB

    • memory/1608-4-0x0000000002380000-0x0000000002780000-memory.dmp

      Filesize

      4.0MB

    • memory/1608-0-0x00000000021F0000-0x00000000021F7000-memory.dmp

      Filesize

      28KB

    • memory/1608-6-0x0000000003100000-0x0000000003136000-memory.dmp

      Filesize

      216KB

    • memory/1608-13-0x0000000002380000-0x0000000002780000-memory.dmp

      Filesize

      4.0MB

    • memory/4716-19-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-24-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-15-0x0000026667DF0000-0x0000026667DF7000-memory.dmp

      Filesize

      28KB

    • memory/4716-17-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-18-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-16-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-5-0x0000026667C50000-0x0000026667C53000-memory.dmp

      Filesize

      12KB

    • memory/4716-20-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-21-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-14-0x0000026667C50000-0x0000026667C53000-memory.dmp

      Filesize

      12KB

    • memory/4716-25-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-26-0x00007FF8529D0000-0x00007FF852BC5000-memory.dmp

      Filesize

      2.0MB

    • memory/4716-23-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-27-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-28-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-29-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-30-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-31-0x00007FF449670000-0x00007FF44979F000-memory.dmp

      Filesize

      1.2MB

    • memory/4716-32-0x0000026667DF0000-0x0000026667DF5000-memory.dmp

      Filesize

      20KB

    • memory/4716-33-0x00007FF8529D0000-0x00007FF852BC5000-memory.dmp

      Filesize

      2.0MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.