Analysis
-
max time kernel
16s -
max time network
20s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/06/2024, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
Additional/bdfilters.dll
Resource
win11-20240508-en
Behavioral task
behavioral2
Sample
Additional/libGLESV2.dll
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
Software_Setup.exe
Resource
win11-20240611-en
General
-
Target
Software_Setup.exe
-
Size
63.9MB
-
MD5
9ff7e52416b7d3ca8b7e035d4b15f60d
-
SHA1
ecf06e8679da62922f3d52d2b9e756ba311e4203
-
SHA256
ec4cd02feeae2e57341cb7ff396fac7d635c914775357b95a0ae3bb73ced8703
-
SHA512
974b9d2d21ffc0d780fb5bb531db3f4edf979e032e2b0fa9048310885fa7cac06fc138b4aa5a9d6bb19a7fc7676c72e98a9ba9c60b35428a699774b34af474af
-
SSDEEP
1572864:jDkFLa2/bDkFLa2/bDkFLa2/bDkFLa2/bDkFLa2/z:j6/6/6/6/6f
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2032 created 2872 2032 winhlp32.exe 49 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 raw.githubusercontent.com 2 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4988 set thread context of 2032 4988 Software_Setup.exe 80 -
Program crash 2 IoCs
pid pid_target Process procid_target 468 2032 WerFault.exe 80 5040 2032 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2032 winhlp32.exe 2032 winhlp32.exe 3336 openwith.exe 3336 openwith.exe 3336 openwith.exe 3336 openwith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 4988 wrote to memory of 2032 4988 Software_Setup.exe 80 PID 2032 wrote to memory of 3336 2032 winhlp32.exe 81 PID 2032 wrote to memory of 3336 2032 winhlp32.exe 81 PID 2032 wrote to memory of 3336 2032 winhlp32.exe 81 PID 2032 wrote to memory of 3336 2032 winhlp32.exe 81 PID 2032 wrote to memory of 3336 2032 winhlp32.exe 81
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2872
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\Software_Setup.exe"C:\Users\Admin\AppData\Local\Temp\Software_Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 4563⤵
- Program crash
PID:468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 3523⤵
- Program crash
PID:5040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2032 -ip 20321⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2032 -ip 20321⤵PID:2712