Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-10-2023 13:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
rh111.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
rh111.exe
Resource
win10v2004-20230915-en
ammyyadminflawedammyyphobosrhadamanthyssmokeloaderbackdoorbootkitcollectionevasionpersistenceransomwareratspywarestealertrojan
windows10-2004-x64
41 signatures
150 seconds
General
-
Target
rh111.exe
-
Size
1.9MB
-
MD5
1b87684768db892932be3f0661c54251
-
SHA1
e5acdb93f6eb75656c9a8242e21b01bf978dc7cf
-
SHA256
65fcd66d75c64db0f8b7819431d77f83a421e9fd210ff6bdf74c47e7a4c39636
-
SHA512
0fc3cc6ed99e45a3d1ca7cd2dd4d7bfc2f5f11ee7cf0e3d58bfbb4db26f16599cae45b96fc032cd6a050c1ea70bfd02291537088168dd149eee85b38d2527a82
-
SSDEEP
24576:jx4Ul0rrIOGz9I6U7AeyGvHynlLghECQl4L529dktxtPCv1ri+J/ac//zWOYopmB:mUl0/2kHW8ECQl4wi+snopp2vQ
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
rh111.exepid process 388 rh111.exe 388 rh111.exe 388 rh111.exe 388 rh111.exe 388 rh111.exe 388 rh111.exe 388 rh111.exe 388 rh111.exe 388 rh111.exe 388 rh111.exe 388 rh111.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rh111.exedescription pid process Token: SeDebugPrivilege 388 rh111.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
rh111.exedescription pid process target process PID 388 wrote to memory of 2016 388 rh111.exe rh111.exe PID 388 wrote to memory of 2016 388 rh111.exe rh111.exe PID 388 wrote to memory of 2016 388 rh111.exe rh111.exe PID 388 wrote to memory of 2016 388 rh111.exe rh111.exe PID 388 wrote to memory of 2420 388 rh111.exe rh111.exe PID 388 wrote to memory of 2420 388 rh111.exe rh111.exe PID 388 wrote to memory of 2420 388 rh111.exe rh111.exe PID 388 wrote to memory of 2420 388 rh111.exe rh111.exe PID 388 wrote to memory of 2428 388 rh111.exe rh111.exe PID 388 wrote to memory of 2428 388 rh111.exe rh111.exe PID 388 wrote to memory of 2428 388 rh111.exe rh111.exe PID 388 wrote to memory of 2428 388 rh111.exe rh111.exe PID 388 wrote to memory of 2228 388 rh111.exe rh111.exe PID 388 wrote to memory of 2228 388 rh111.exe rh111.exe PID 388 wrote to memory of 2228 388 rh111.exe rh111.exe PID 388 wrote to memory of 2228 388 rh111.exe rh111.exe PID 388 wrote to memory of 2444 388 rh111.exe rh111.exe PID 388 wrote to memory of 2444 388 rh111.exe rh111.exe PID 388 wrote to memory of 2444 388 rh111.exe rh111.exe PID 388 wrote to memory of 2444 388 rh111.exe rh111.exe PID 388 wrote to memory of 2452 388 rh111.exe rh111.exe PID 388 wrote to memory of 2452 388 rh111.exe rh111.exe PID 388 wrote to memory of 2452 388 rh111.exe rh111.exe PID 388 wrote to memory of 2452 388 rh111.exe rh111.exe PID 388 wrote to memory of 1756 388 rh111.exe rh111.exe PID 388 wrote to memory of 1756 388 rh111.exe rh111.exe PID 388 wrote to memory of 1756 388 rh111.exe rh111.exe PID 388 wrote to memory of 1756 388 rh111.exe rh111.exe PID 388 wrote to memory of 1060 388 rh111.exe rh111.exe PID 388 wrote to memory of 1060 388 rh111.exe rh111.exe PID 388 wrote to memory of 1060 388 rh111.exe rh111.exe PID 388 wrote to memory of 1060 388 rh111.exe rh111.exe PID 388 wrote to memory of 2832 388 rh111.exe rh111.exe PID 388 wrote to memory of 2832 388 rh111.exe rh111.exe PID 388 wrote to memory of 2832 388 rh111.exe rh111.exe PID 388 wrote to memory of 2832 388 rh111.exe rh111.exe PID 388 wrote to memory of 3020 388 rh111.exe rh111.exe PID 388 wrote to memory of 3020 388 rh111.exe rh111.exe PID 388 wrote to memory of 3020 388 rh111.exe rh111.exe PID 388 wrote to memory of 3020 388 rh111.exe rh111.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rh111.exe"C:\Users\Admin\AppData\Local\Temp\rh111.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\rh111.exeC:\Users\Admin\AppData\Local\Temp\rh111.exe2⤵PID:3020