Analysis
-
max time kernel
197s -
max time network
295s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
08/01/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
16748566fc9e297fa08b4433fadeafdd63c1527fad4cac0cf8df287df56088d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16748566fc9e297fa08b4433fadeafdd63c1527fad4cac0cf8df287df56088d1.exe
Resource
win10-20231215-en
General
-
Target
16748566fc9e297fa08b4433fadeafdd63c1527fad4cac0cf8df287df56088d1.exe
-
Size
1.2MB
-
MD5
1b728c6e8f10313d7367c82e48d022da
-
SHA1
192a6598214c1a9d19717f18e271a4360eb38b44
-
SHA256
16748566fc9e297fa08b4433fadeafdd63c1527fad4cac0cf8df287df56088d1
-
SHA512
3bf139a04d28a6858ec8c697f3387c613844d0628ad42725d21274a3574937482da2bc921944d34b4b7e1d91f4821e328cf2668ad768a52cb2c63c15b136d258
-
SSDEEP
24576:1D3s67Twbc8NIdi9SePHdvwtlTWlTnF6hcz5+ntmgTUji:RX7Tdosepwr4TnF6hYEtp
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4512 created 3372 4512 Far.pif 31 PID 768 created 2992 768 Far.pif 34 -
Executes dropped EXE 2 IoCs
pid Process 4512 Far.pif 768 Far.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4512 set thread context of 768 4512 Far.pif 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3412 tasklist.exe 3484 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2292 PING.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4512 Far.pif 4512 Far.pif 4512 Far.pif 4512 Far.pif 4512 Far.pif 4512 Far.pif 4512 Far.pif 4512 Far.pif 4512 Far.pif 4512 Far.pif 768 Far.pif 768 Far.pif 3884 dialer.exe 3884 dialer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3412 tasklist.exe Token: SeDebugPrivilege 3484 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4512 Far.pif 4512 Far.pif 4512 Far.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4512 Far.pif 4512 Far.pif 4512 Far.pif -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1932 wrote to memory of 4676 1932 16748566fc9e297fa08b4433fadeafdd63c1527fad4cac0cf8df287df56088d1.exe 76 PID 1932 wrote to memory of 4676 1932 16748566fc9e297fa08b4433fadeafdd63c1527fad4cac0cf8df287df56088d1.exe 76 PID 1932 wrote to memory of 4676 1932 16748566fc9e297fa08b4433fadeafdd63c1527fad4cac0cf8df287df56088d1.exe 76 PID 4676 wrote to memory of 3584 4676 cmd.exe 74 PID 4676 wrote to memory of 3584 4676 cmd.exe 74 PID 4676 wrote to memory of 3584 4676 cmd.exe 74 PID 3584 wrote to memory of 3412 3584 cmd.exe 78 PID 3584 wrote to memory of 3412 3584 cmd.exe 78 PID 3584 wrote to memory of 3412 3584 cmd.exe 78 PID 3584 wrote to memory of 1400 3584 cmd.exe 77 PID 3584 wrote to memory of 1400 3584 cmd.exe 77 PID 3584 wrote to memory of 1400 3584 cmd.exe 77 PID 3584 wrote to memory of 3484 3584 cmd.exe 81 PID 3584 wrote to memory of 3484 3584 cmd.exe 81 PID 3584 wrote to memory of 3484 3584 cmd.exe 81 PID 3584 wrote to memory of 3888 3584 cmd.exe 80 PID 3584 wrote to memory of 3888 3584 cmd.exe 80 PID 3584 wrote to memory of 3888 3584 cmd.exe 80 PID 3584 wrote to memory of 4052 3584 cmd.exe 86 PID 3584 wrote to memory of 4052 3584 cmd.exe 86 PID 3584 wrote to memory of 4052 3584 cmd.exe 86 PID 3584 wrote to memory of 4724 3584 cmd.exe 85 PID 3584 wrote to memory of 4724 3584 cmd.exe 85 PID 3584 wrote to memory of 4724 3584 cmd.exe 85 PID 3584 wrote to memory of 4488 3584 cmd.exe 82 PID 3584 wrote to memory of 4488 3584 cmd.exe 82 PID 3584 wrote to memory of 4488 3584 cmd.exe 82 PID 3584 wrote to memory of 4512 3584 cmd.exe 84 PID 3584 wrote to memory of 4512 3584 cmd.exe 84 PID 3584 wrote to memory of 2292 3584 cmd.exe 83 PID 3584 wrote to memory of 2292 3584 cmd.exe 83 PID 3584 wrote to memory of 2292 3584 cmd.exe 83 PID 4512 wrote to memory of 768 4512 Far.pif 87 PID 4512 wrote to memory of 768 4512 Far.pif 87 PID 4512 wrote to memory of 768 4512 Far.pif 87 PID 4512 wrote to memory of 768 4512 Far.pif 87 PID 768 wrote to memory of 3884 768 Far.pif 88 PID 768 wrote to memory of 3884 768 Far.pif 88 PID 768 wrote to memory of 3884 768 Far.pif 88 PID 768 wrote to memory of 3884 768 Far.pif 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\16748566fc9e297fa08b4433fadeafdd63c1527fad4cac0cf8df287df56088d1.exe"C:\Users\Admin\AppData\Local\Temp\16748566fc9e297fa08b4433fadeafdd63c1527fad4cac0cf8df287df56088d1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k cmd < Advancement & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\6293\Far.pifC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\6293\Far.pif2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:768
-
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2992
-
C:\Windows\system32\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Windows\SysWOW64\cmd.execmd1⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"2⤵PID:1400
-
-
C:\Windows\SysWOW64\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe"2⤵PID:3888
-
-
C:\Windows\SysWOW64\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Payday + Corporate + Spain 6293\i2⤵PID:4488
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost2⤵
- Runs ping.exe
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\6293\Far.pif6293\Far.pif 6293\i2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Zoo + Viewers + Bow + Contractors + Protection + Desk + Kinds 6293\Far.pif2⤵PID:4724
-
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir 62932⤵PID:4052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD52ae1f13722decd0594ca044ae0d15dfd
SHA132029490a94c8eff2c23e24deb2882c59bbe1fd5
SHA256959a6c6b778e5c1bc8e7b20697d2a9f1575fa340ec6c532470d03ddfbecf2f47
SHA512b27acb048c8dadabd201a4f9577aeed463a3563e244381353fbc7486e15643e010deefb02f4d6c8100161ae6ed071fe0b5fb1bd03dbdbede9261433dc5125788
-
Filesize
1.0MB
MD5bfa84dbde0df8f1cad3e179bd46a6e34
SHA106ae3c38d4b2f8125656268925ebde9eca6a1f9e
SHA2566de412b8674ffba5d78ff9d36abffbe2cf86fd08b2231592fca2fcf41f1f2314
SHA512edd4c839437570003e1cc4a04e6cb7bf8c70c0ebdae741e69782e9bdf47c42441cd8d709170898859b94b3248cccf0e9dfa5e183c110b93ded935ce69a0ff82a
-
Filesize
630KB
MD54c96fd2b7c0ea38176b31fda162a7146
SHA1b06c2ebf201618f43920bf13b1abcd3b8d49a6c4
SHA2565acbededf9a6b000c248fc863492f4adfeded5adcf0da4dc072d1bebe9217c9f
SHA5124531dc4c95116bacc5883562c5db2bbcf27001d27215fd24317c838bbd5ba90117054fa7a4df22ad456c363bd3beeff780866639e24cd10a6827d7b4677606c9
-
Filesize
13KB
MD5505f790e3cc3f421285b34b305cae9af
SHA121670a4c7fed0276b21dca2a3c99f6d3a0df8bd0
SHA256eedf0f94e30907d8c55a5f6dc6312e52943d3268f1f4bc72270ce6debae53d34
SHA5121499095e2dcc66be8593d6bf418be378ca6bed7454fca57fe4220b06f1f4a4b20ce9242aa9b75b237fec4a9996a2f3e946d2d6b01b1557cabe2e19d0dcb5bf26
-
Filesize
151KB
MD5efd8b81929d7c38b49e8daad7a20c138
SHA1ef55c3f3e31eb93389b639112ed97cf5fc41b1bf
SHA2567ba2c0e7bf1e5ece9a84dbab13b90708a6b7cab1ce4d410dbfc293cdcfbf8565
SHA5125a4e3ec6f49c42548132edc544cdc713759a42b9006f3fae76d5dd9708319e33b8d758059f8ed82efe62ad14381631863c3a31bc70e53b5ecb18c9804fc4402f
-
Filesize
171KB
MD535ac7a5b2a591749c8a33f19dab5cdbc
SHA1fc1ea0fe6e7e8481213e8a3434148211f71ab12a
SHA256de04d7be8bd7b73ebfb135cbee3aafe84d3a544ace7c5dbe994610d139608175
SHA51249a8fcd2f7a0a44bbc6bb71ea9791f23e4570b81dc4f26b0994294943cb9cd0247442a3b657fae6fefb5f3b4b74a31a4f0de43b818d6c776ea0757473a9c9a60
-
Filesize
435KB
MD58998a0723f051b5c7e91abcfbf187143
SHA16900fb44e2699f1897c1bfc87478ee8a44b7da06
SHA256bb4d3575aa1136fac21d60e1f6f40190f631163f73e6554ef296d9e950b4d5ee
SHA5123c8ea2c055bbbf4c5eb6f88f97989440ff5591797526f3779e7469adc383063e0dc47dadbfe0fb43c361f3f043eb5fa7e4cad7cf5d63c0093d9edb7900553862
-
Filesize
155KB
MD5283b60351b19b137b0ad4efb86dcbfc1
SHA151d61a9add9dcb749f8ddd2f7fb9a4a9cf7c46bc
SHA256a3217c4e170b80d7c75ff38d9667ccaa66349d8e0c3fc022f4ec0982909a754a
SHA5125417af78aa3ca8e76657ff3e89cd68d4b4925e6931620bec7d58324c839db140035f4ce11c73e74fc44da8f0cc63d2c92d37c667c7fed879b193636a60494929
-
Filesize
45KB
MD50c257b9edbcc7f41af6e1027bc0713ee
SHA12149a7bb22476f85610c842c34628b2f22d8a549
SHA2567ac226e081d090f2e3cb99104b4226fcd5e77cb83f7edb23081c1a2bd376533c
SHA512f98b584e5112a81336ad4d7f2a1a4066028fc0c9d7a0b5b148172bd4c9a0485983ea868522a61999415837fdbd73401cb703138729e03831dc39bbe6c1f3f25b
-
Filesize
444KB
MD54d83c8404f636cbb8ab0f08ed1063a14
SHA11bf2758f989495e5a2f13acd4c9fb2c8c176613f
SHA256eceef58e2264d5624f0e961fc693dc07f5759b8c05e5c049dc56830ef2664000
SHA5121d80fd78fd324ce95204557a097e0cee348d76e4de4c08cfd5b550ae4f0fee1b3fec42167ba9502574748e89518a74f1f4a20a59167334da9f2fbd575444a9fc
-
Filesize
184KB
MD5e08866278f3a97aef93ba2a839c11f04
SHA1a014f0417591da266a95f7590c9019b3cf6ae3bc
SHA25621685a7876fe2ca8c890f0819a3d4e561a53a6f2c6a3212e134a87c2e1e4d39b
SHA512679b15d6db25a5ce4f9a11474136be23876776e8b4fe4c9384cc51bea15c6d715a15df5afc1283a08a19083afd2a4a99ce6347d2ece95eb1702354a57d3bc4cd
-
Filesize
370KB
MD5bf8235618cb869e00161cb6318689e46
SHA14b0e0ee156dfd1f1686d37772d24ce67393e58ac
SHA25655f26cc8c2d64a7174b1fde106eb1b65cebbf7f32c6585c0737f6fafef6d4b3f
SHA5126af2346ccb99a11bf2031362bf442044275bc38ee441e946d21d22118b5d7d39406a31e5cfb7051c4f6c3c4ac87fc13b70116e697a74d8b25e2b5218a0832bef
-
Filesize
140KB
MD5f32cf54e9a67c7a652b0a63ebac897fe
SHA194662546b1e0b95e5fe190b268cd8370b534616b
SHA2565b4766a612825c1640cd4bfe5e32a32ec0aa88dcc050fbe3cb821ef6f81563a7
SHA51234af7d1e95c95e6624ea3b2ee39c9371e4fa41daeb76d4ba4e5f7f431033d0e93851aab509856c798208f5568acd23e58cf14aefbb1f7891185a386a8779a8fe
-
Filesize
200KB
MD57da539acbd1604bb8c0ae5f6eb990bb8
SHA11271fa42479299d5f337e03abc82af7125aa423f
SHA2560d36e743b8a12a30f0aec344ffdc0400e080af2d1a8c322930a73147703a8902
SHA5121bb62339d6a74128cfefec47fd0f360bed6dea5ccf51d9d77cf84e3e8a920790141cccddbb6810a3f9b627af7bbb0ed9a32f6ef2e92194085feaf384b763aad5