Analysis
-
max time kernel
571s -
max time network
456s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 08:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
IMAGE COPYRIGHTED.exe
Resource
win7-20240611-en
5 signatures
600 seconds
Behavioral task
behavioral2
Sample
IMAGE COPYRIGHTED.exe
Resource
win10v2004-20240611-en
6 signatures
600 seconds
General
-
Target
IMAGE COPYRIGHTED.exe
-
Size
1.7MB
-
MD5
baed25327435936f235a3bb732090e3a
-
SHA1
b4ee26136d12288f873fea5e93e2dff2e2be8f0b
-
SHA256
8d782d769de826212ae7519aae41877acf2a4f35d97067cc996b06c148cc218e
-
SHA512
08f24157e613351ffdedf25520792ed66ec2e159c00ca5693d76ab04aba1d066b4f1392c2e976e627e930c48fc6de8c132aa9fc076063e33ed22fb9d447d7525
-
SSDEEP
24576:ADxSsqA4BP85DgJrivY05+QaHLOZRykgezVRQdr6WDi3jzyD1qf:ADxSsuBQ6Qe2pgrdel
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3988 created 2952 3988 IMAGE COPYRIGHTED.exe 50 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sausageLoop = "C:\\Users\\Admin\\Documents\\lumuiUpdater\\ffUpdaar.exe" IMAGE COPYRIGHTED.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1548 3988 WerFault.exe 92 3152 3988 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3988 IMAGE COPYRIGHTED.exe 3988 IMAGE COPYRIGHTED.exe 4948 openwith.exe 4948 openwith.exe 4948 openwith.exe 4948 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3876 wrote to memory of 3988 3876 IMAGE COPYRIGHTED.exe 92 PID 3876 wrote to memory of 3988 3876 IMAGE COPYRIGHTED.exe 92 PID 3876 wrote to memory of 3988 3876 IMAGE COPYRIGHTED.exe 92 PID 3876 wrote to memory of 3988 3876 IMAGE COPYRIGHTED.exe 92 PID 3876 wrote to memory of 3988 3876 IMAGE COPYRIGHTED.exe 92 PID 3988 wrote to memory of 4948 3988 IMAGE COPYRIGHTED.exe 93 PID 3988 wrote to memory of 4948 3988 IMAGE COPYRIGHTED.exe 93 PID 3988 wrote to memory of 4948 3988 IMAGE COPYRIGHTED.exe 93 PID 3988 wrote to memory of 4948 3988 IMAGE COPYRIGHTED.exe 93 PID 3988 wrote to memory of 4948 3988 IMAGE COPYRIGHTED.exe 93
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2952
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\IMAGE COPYRIGHTED.exe"C:\Users\Admin\AppData\Local\Temp\IMAGE COPYRIGHTED.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\IMAGE COPYRIGHTED.exe"C:\Users\Admin\AppData\Local\Temp\IMAGE COPYRIGHTED.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 4363⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 4323⤵
- Program crash
PID:3152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3988 -ip 39881⤵PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3988 -ip 39881⤵PID:1740