Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 17:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
CelestialCodes.exe
Resource
win7-20240221-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
CelestialCodes.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
CelestialCodes.exe
-
Size
10.0MB
-
MD5
507048fc3e8bf91b8ea467045bc2964b
-
SHA1
e790cdea39a0f8c0644425e762488f9fbdea66ee
-
SHA256
bea1d58d168b267c27b1028b47bd6ad19e249630abb7c03cfffede8568749203
-
SHA512
50a8a1a574b815b8899e09f4e83f526d2bda50f122e71afc246e2877b004aa488991c7c6a975edfc42e5ac22c2aba6c7c3b63556680fc73216f9da20bcb72f9b
-
SSDEEP
49152:ooUwF2D7Ah9uRoSouISQFcd2fRMEhax30H5YeFQZc3jg7RaOa1mRI0oet8HOgrbF:ohshoqSPBk2ba14oodw5f9UEHz5QMjOy
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2136 created 2512 2136 BitLockerToGo.exe 42 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 2136 1632 CelestialCodes.exe 99 -
Program crash 2 IoCs
pid pid_target Process procid_target 4340 2136 WerFault.exe 99 1588 2136 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2136 BitLockerToGo.exe 2136 BitLockerToGo.exe 1484 dialer.exe 1484 dialer.exe 1484 dialer.exe 1484 dialer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2136 1632 CelestialCodes.exe 99 PID 1632 wrote to memory of 2136 1632 CelestialCodes.exe 99 PID 1632 wrote to memory of 2136 1632 CelestialCodes.exe 99 PID 1632 wrote to memory of 2136 1632 CelestialCodes.exe 99 PID 1632 wrote to memory of 2136 1632 CelestialCodes.exe 99 PID 2136 wrote to memory of 1484 2136 BitLockerToGo.exe 100 PID 2136 wrote to memory of 1484 2136 BitLockerToGo.exe 100 PID 2136 wrote to memory of 1484 2136 BitLockerToGo.exe 100 PID 2136 wrote to memory of 1484 2136 BitLockerToGo.exe 100 PID 2136 wrote to memory of 1484 2136 BitLockerToGo.exe 100
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2512
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\CelestialCodes.exe"C:\Users\Admin\AppData\Local\Temp\CelestialCodes.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 4403⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 4323⤵
- Program crash
PID:1588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2136 -ip 21361⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2136 -ip 21361⤵PID:808