Resubmissions

01-10-2024 17:52

241001-wf4lzawfjd 10

10-04-2024 01:21

240410-bqys9abd98 10

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 01:21

General

  • Target

    29f8b50f737feef9ec7439780daead395bf2bf278a4540ddffe64ca70aa9f462.exe

  • Size

    353KB

  • MD5

    4a78707180195f7584386470809e4aec

  • SHA1

    0bc190b0cbb3983ce1b0bf7f5efa4a6f14955a78

  • SHA256

    29f8b50f737feef9ec7439780daead395bf2bf278a4540ddffe64ca70aa9f462

  • SHA512

    785a0635bd215c67eefd23ad57b2193745220646bb58434d0d526e34d10560b6e8b43fbd23641d1632995ce311d820a439fc0733048e55c04baab2dbb8981b7a

  • SSDEEP

    6144:Iu4ypBt/6bC6p/8jJkJaVnQUKRnazBrRYJs3mb2stMK39V8s98ix2p:Iu1t/6+6pWG8aRna9RYSQTXtV8s98E2

Score
10/10

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2636
      • C:\Windows\system32\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4176
    • C:\Users\Admin\AppData\Local\Temp\29f8b50f737feef9ec7439780daead395bf2bf278a4540ddffe64ca70aa9f462.exe
      "C:\Users\Admin\AppData\Local\Temp\29f8b50f737feef9ec7439780daead395bf2bf278a4540ddffe64ca70aa9f462.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1864

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1864-10-0x00007FF871EC0000-0x00007FF872189000-memory.dmp

      Filesize

      2.8MB

    • memory/1864-16-0x00007FF8561B0000-0x00007FF856C71000-memory.dmp

      Filesize

      10.8MB

    • memory/1864-3-0x000000001B860000-0x000000001BC60000-memory.dmp

      Filesize

      4.0MB

    • memory/1864-5-0x000000001B860000-0x000000001BC60000-memory.dmp

      Filesize

      4.0MB

    • memory/1864-4-0x0000000002B80000-0x0000000002B90000-memory.dmp

      Filesize

      64KB

    • memory/1864-1-0x0000000002B80000-0x0000000002B90000-memory.dmp

      Filesize

      64KB

    • memory/1864-7-0x00007FF8741D0000-0x00007FF8743C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1864-0-0x0000000000AD0000-0x0000000000B2E000-memory.dmp

      Filesize

      376KB

    • memory/1864-8-0x000000001B860000-0x000000001BC60000-memory.dmp

      Filesize

      4.0MB

    • memory/1864-2-0x00007FF8561B0000-0x00007FF856C71000-memory.dmp

      Filesize

      10.8MB

    • memory/1864-6-0x000000001B850000-0x000000001B860000-memory.dmp

      Filesize

      64KB

    • memory/1864-9-0x00007FF872460000-0x00007FF87251E000-memory.dmp

      Filesize

      760KB

    • memory/1864-14-0x000000001B860000-0x000000001BC60000-memory.dmp

      Filesize

      4.0MB

    • memory/4176-21-0x00007FF871EC0000-0x00007FF872189000-memory.dmp

      Filesize

      2.8MB

    • memory/4176-17-0x0000026C97DC0000-0x0000026C981C0000-memory.dmp

      Filesize

      4.0MB

    • memory/4176-18-0x00007FF8741D0000-0x00007FF8743C5000-memory.dmp

      Filesize

      2.0MB

    • memory/4176-20-0x0000026C97DC0000-0x0000026C981C0000-memory.dmp

      Filesize

      4.0MB

    • memory/4176-11-0x0000026C96300000-0x0000026C96309000-memory.dmp

      Filesize

      36KB

    • memory/4176-19-0x00007FF872460000-0x00007FF87251E000-memory.dmp

      Filesize

      760KB

    • memory/4176-22-0x0000026C97DC0000-0x0000026C981C0000-memory.dmp

      Filesize

      4.0MB