Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-12-2023 15:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
2.9MB
-
MD5
50b5f7c97594361c760ecf27a93f3bd4
-
SHA1
b4347e675b7b5733ee9cccc9fdeda78f68d32fdc
-
SHA256
d20181563c161b0772cfad41069a572fe4c5f4f64d08be9ef99992723cec6c87
-
SHA512
671dbd211fa190482ef69f73440913ccf6cb1cb5b63ffb6177942986554512f76a770ebe801adbef14179eaca26934b9430ddef354007e56423814109eb552c5
-
SSDEEP
49152:pogLnkIaOPQlwORBCEM/97yzWTCiuw7Kz38Q8xTnQbv9+ktdxlISXaaVlKwBopNC:K2nkgKLCEMNBThuw7KzMQ8GF+UdnISXl
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1672 created 1100 1672 tmp.exe 18 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1672 tmp.exe 1672 tmp.exe 2080 dialer.exe 2080 dialer.exe 2080 dialer.exe 2080 dialer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2080 1672 tmp.exe 28 PID 1672 wrote to memory of 2080 1672 tmp.exe 28 PID 1672 wrote to memory of 2080 1672 tmp.exe 28 PID 1672 wrote to memory of 2080 1672 tmp.exe 28 PID 1672 wrote to memory of 2080 1672 tmp.exe 28 PID 1672 wrote to memory of 2080 1672 tmp.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-