Analysis
-
max time kernel
151s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 03:20
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe
-
Size
513KB
-
MD5
89fe28686a81b90bf1f46b6d46251ce4
-
SHA1
19f6a799b4777acf208926cee4913c0a889db72e
-
SHA256
8e5f99b92349381fd772b1bdb18cce2c6595181fcad0f68de25593276d61620f
-
SHA512
9cb0181a6a9e6a37c10a6acf9c172fd4130f4d476b76c3b97acc71c157c3d8135f42d1f2a10bb87d07ecf784d30e705dc071b5630705e9f939127762795d0dfc
-
SSDEEP
12288:pX5JC7oT39ra0hI1iGKsHJwUJ10qx6qhE12:pLC7mtThIcGNSS1VY31
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-20-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys behavioral1/memory/1736-21-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys behavioral1/memory/1736-22-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys behavioral1/memory/1736-23-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys behavioral1/memory/1736-25-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys behavioral1/memory/1736-35-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys behavioral1/memory/1736-37-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exedescription pid process target process PID 1736 created 1180 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe Explorer.EXE -
Deletes itself 1 IoCs
Processes:
certreq.exepid process 2668 certreq.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exedescription pid process target process PID 2188 set thread context of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.execertreq.exepid process 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe 2668 certreq.exe 2668 certreq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exedescription pid process Token: SeDebugPrivilege 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exeSecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exedescription pid process target process PID 2188 wrote to memory of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe PID 2188 wrote to memory of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe PID 2188 wrote to memory of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe PID 2188 wrote to memory of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe PID 2188 wrote to memory of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe PID 2188 wrote to memory of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe PID 2188 wrote to memory of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe PID 2188 wrote to memory of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe PID 2188 wrote to memory of 1736 2188 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe PID 1736 wrote to memory of 2668 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe certreq.exe PID 1736 wrote to memory of 2668 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe certreq.exe PID 1736 wrote to memory of 2668 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe certreq.exe PID 1736 wrote to memory of 2668 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe certreq.exe PID 1736 wrote to memory of 2668 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe certreq.exe PID 1736 wrote to memory of 2668 1736 SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.MSIL.Androm.1.11946.26080.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
PID:2668