Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 06:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240419-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240426-en
8 signatures
150 seconds
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
4363d52fe7027df2212ad2b3333ebaf9
-
SHA1
beac1fc8c012a28cb9f38f6e4296278543048fcf
-
SHA256
ff7284f443ac1839a20dff816f93f2f7e09a3c3e50cf9b8d479c620fc282ddcc
-
SHA512
bb5bcb9f7b42d370b86ad7d4c16605d9bf755fd2291a70716facc2aa62baf45aabf068882c413334332af5819a97c9c4d7703edb9ec84edd8e87c57bab36acee
-
SSDEEP
24576:ZMm5SH6MIl3LkGDhsmD/U0wA77v+M0yYvh3J9oeVaEJyqH2ai519He:ZMm5Lnl7kSUEXvAyUh3J9oeVaEk5rHe
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 432 created 2928 432 AddInProcess32.exe 49 -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2848 set thread context of 1964 2848 file.exe 89 PID 2848 set thread context of 432 2848 file.exe 92 PID 1964 set thread context of 1852 1964 AddInProcess32.exe 95 -
Program crash 2 IoCs
pid pid_target Process procid_target 4524 432 WerFault.exe 92 4996 432 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2848 file.exe 2848 file.exe 1964 AddInProcess32.exe 2848 file.exe 2848 file.exe 1964 AddInProcess32.exe 1964 AddInProcess32.exe 1964 AddInProcess32.exe 1964 AddInProcess32.exe 1964 AddInProcess32.exe 432 AddInProcess32.exe 432 AddInProcess32.exe 2584 dialer.exe 2584 dialer.exe 2584 dialer.exe 2584 dialer.exe 1852 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2848 file.exe Token: SeDebugPrivilege 1964 AddInProcess32.exe Token: SeDebugPrivilege 1852 InstallUtil.exe Token: SeBackupPrivilege 1852 InstallUtil.exe Token: SeSecurityPrivilege 1852 InstallUtil.exe Token: SeSecurityPrivilege 1852 InstallUtil.exe Token: SeSecurityPrivilege 1852 InstallUtil.exe Token: SeSecurityPrivilege 1852 InstallUtil.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1964 2848 file.exe 89 PID 2848 wrote to memory of 1964 2848 file.exe 89 PID 2848 wrote to memory of 1964 2848 file.exe 89 PID 2848 wrote to memory of 1964 2848 file.exe 89 PID 2848 wrote to memory of 1964 2848 file.exe 89 PID 2848 wrote to memory of 1964 2848 file.exe 89 PID 2848 wrote to memory of 1964 2848 file.exe 89 PID 2848 wrote to memory of 1964 2848 file.exe 89 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 4864 2848 file.exe 91 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 2848 wrote to memory of 432 2848 file.exe 92 PID 1964 wrote to memory of 4412 1964 AddInProcess32.exe 93 PID 1964 wrote to memory of 4412 1964 AddInProcess32.exe 93 PID 1964 wrote to memory of 4412 1964 AddInProcess32.exe 93 PID 1964 wrote to memory of 4412 1964 AddInProcess32.exe 93 PID 1964 wrote to memory of 4412 1964 AddInProcess32.exe 93 PID 1964 wrote to memory of 4412 1964 AddInProcess32.exe 93 PID 1964 wrote to memory of 4412 1964 AddInProcess32.exe 93 PID 1964 wrote to memory of 4412 1964 AddInProcess32.exe 93 PID 1964 wrote to memory of 2424 1964 AddInProcess32.exe 94 PID 1964 wrote to memory of 2424 1964 AddInProcess32.exe 94 PID 1964 wrote to memory of 2424 1964 AddInProcess32.exe 94 PID 1964 wrote to memory of 2424 1964 AddInProcess32.exe 94 PID 1964 wrote to memory of 2424 1964 AddInProcess32.exe 94 PID 1964 wrote to memory of 2424 1964 AddInProcess32.exe 94 PID 1964 wrote to memory of 2424 1964 AddInProcess32.exe 94 PID 1964 wrote to memory of 2424 1964 AddInProcess32.exe 94 PID 1964 wrote to memory of 1852 1964 AddInProcess32.exe 95 PID 1964 wrote to memory of 1852 1964 AddInProcess32.exe 95 PID 1964 wrote to memory of 1852 1964 AddInProcess32.exe 95 PID 1964 wrote to memory of 1852 1964 AddInProcess32.exe 95 PID 1964 wrote to memory of 1852 1964 AddInProcess32.exe 95 PID 1964 wrote to memory of 1852 1964 AddInProcess32.exe 95 PID 1964 wrote to memory of 1852 1964 AddInProcess32.exe 95 PID 1964 wrote to memory of 1852 1964 AddInProcess32.exe 95 PID 432 wrote to memory of 2584 432 AddInProcess32.exe 96 PID 432 wrote to memory of 2584 432 AddInProcess32.exe 96 PID 432 wrote to memory of 2584 432 AddInProcess32.exe 96 PID 432 wrote to memory of 2584 432 AddInProcess32.exe 96 PID 432 wrote to memory of 2584 432 AddInProcess32.exe 96
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2928
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:4412
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:2424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4864
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 4523⤵
- Program crash
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 4483⤵
- Program crash
PID:4996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 432 -ip 4321⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 432 -ip 4321⤵PID:3448