Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
submitted
05-03-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240226-en
General
-
Target
file.exe
-
Size
355KB
-
MD5
cfab6075851faadd5de2efc7078979da
-
SHA1
b430aa030c145c308e34a515600bdbba72c21332
-
SHA256
728dff0eba668befcb91c693b7e9ea49a70b4d5cc4cb0bf9460837cbf58951ba
-
SHA512
012e2a09ddc0cc6b10cbacbafa36b887a894d6c342d4a9457999f7682206e6e61acccd0df14cbdcbd8f32aaf236000ad4139a381110ff20aae83d4c65c78dc92
-
SSDEEP
6144:g2qezd2ab1/RuHk+M3k8M3W7XomjOJCqshrOlumY6DMIewgxQfqbsb:gf2R/EEkCQFYDwRqg
Malware Config
Extracted
rhadamanthys
https://www.carssell.online:443/b45c71e9ac60e42309ff71/4ku932qm.1d058
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2924 created 1204 2924 file.exe 21 -
Deletes itself 1 IoCs
pid Process 2948 dialer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2924 file.exe 2924 file.exe 2948 dialer.exe 2948 dialer.exe 2948 dialer.exe 2948 dialer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2948 2924 file.exe 28 PID 2924 wrote to memory of 2948 2924 file.exe 28 PID 2924 wrote to memory of 2948 2924 file.exe 28 PID 2924 wrote to memory of 2948 2924 file.exe 28 PID 2924 wrote to memory of 2948 2924 file.exe 28 PID 2924 wrote to memory of 2948 2924 file.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2948
-