Analysis
-
max time kernel
357s -
max time network
358s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 08:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
IMAGE COPYRIGHTED.exe
Resource
win7-20240611-en
5 signatures
600 seconds
Behavioral task
behavioral2
Sample
IMAGE COPYRIGHTED.exe
Resource
win10v2004-20240611-en
6 signatures
600 seconds
General
-
Target
IMAGE COPYRIGHTED.exe
-
Size
1.7MB
-
MD5
baed25327435936f235a3bb732090e3a
-
SHA1
b4ee26136d12288f873fea5e93e2dff2e2be8f0b
-
SHA256
8d782d769de826212ae7519aae41877acf2a4f35d97067cc996b06c148cc218e
-
SHA512
08f24157e613351ffdedf25520792ed66ec2e159c00ca5693d76ab04aba1d066b4f1392c2e976e627e930c48fc6de8c132aa9fc076063e33ed22fb9d447d7525
-
SSDEEP
24576:ADxSsqA4BP85DgJrivY05+QaHLOZRykgezVRQdr6WDi3jzyD1qf:ADxSsuBQ6Qe2pgrdel
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2004 created 1144 2004 IMAGE COPYRIGHTED.exe 20 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\sausageLoop = "C:\\Users\\Admin\\Documents\\lumuiUpdater\\ffUpdaar.exe" IMAGE COPYRIGHTED.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2004 IMAGE COPYRIGHTED.exe 2004 IMAGE COPYRIGHTED.exe 2988 dialer.exe 2988 dialer.exe 2988 dialer.exe 2988 dialer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2004 1960 IMAGE COPYRIGHTED.exe 28 PID 1960 wrote to memory of 2004 1960 IMAGE COPYRIGHTED.exe 28 PID 1960 wrote to memory of 2004 1960 IMAGE COPYRIGHTED.exe 28 PID 1960 wrote to memory of 2004 1960 IMAGE COPYRIGHTED.exe 28 PID 1960 wrote to memory of 2004 1960 IMAGE COPYRIGHTED.exe 28 PID 1960 wrote to memory of 2004 1960 IMAGE COPYRIGHTED.exe 28 PID 1960 wrote to memory of 2004 1960 IMAGE COPYRIGHTED.exe 28 PID 1960 wrote to memory of 2004 1960 IMAGE COPYRIGHTED.exe 28 PID 1960 wrote to memory of 2004 1960 IMAGE COPYRIGHTED.exe 28 PID 2004 wrote to memory of 2988 2004 IMAGE COPYRIGHTED.exe 29 PID 2004 wrote to memory of 2988 2004 IMAGE COPYRIGHTED.exe 29 PID 2004 wrote to memory of 2988 2004 IMAGE COPYRIGHTED.exe 29 PID 2004 wrote to memory of 2988 2004 IMAGE COPYRIGHTED.exe 29 PID 2004 wrote to memory of 2988 2004 IMAGE COPYRIGHTED.exe 29 PID 2004 wrote to memory of 2988 2004 IMAGE COPYRIGHTED.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\IMAGE COPYRIGHTED.exe"C:\Users\Admin\AppData\Local\Temp\IMAGE COPYRIGHTED.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IMAGE COPYRIGHTED.exe"C:\Users\Admin\AppData\Local\Temp\IMAGE COPYRIGHTED.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-