Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe
Resource
win10v2004-20240709-en
General
-
Target
8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe
-
Size
2.2MB
-
MD5
0234bff4bd4e6dd7a80d3fde4f12fc09
-
SHA1
7fb0e3bc8c71759028b30c1b2a45362ccdb14fd8
-
SHA256
8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946
-
SHA512
ee100be2cbdc3f3a87e0510958a63ff0d8f0346ddf24d724417bcacf443cc675a051ca0b8c2a8c3b4fd9dc5e443c18fdebb60a5967aa8a0f29a42a901bfd0b84
-
SSDEEP
49152:ileMKip5GL0peV5i38S1y16Bxase11gPSBajGWtA2ZHALmem:dW9g16haIjGz2ZHHem
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 112 created 2672 112 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 44 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4744 set thread context of 112 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 112 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 112 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 3196 openwith.exe 3196 openwith.exe 3196 openwith.exe 3196 openwith.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe Token: SeDebugPrivilege 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4744 wrote to memory of 112 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 84 PID 4744 wrote to memory of 112 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 84 PID 4744 wrote to memory of 112 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 84 PID 4744 wrote to memory of 112 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 84 PID 4744 wrote to memory of 112 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 84 PID 4744 wrote to memory of 112 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 84 PID 4744 wrote to memory of 112 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 84 PID 4744 wrote to memory of 112 4744 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 84 PID 112 wrote to memory of 3196 112 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 85 PID 112 wrote to memory of 3196 112 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 85 PID 112 wrote to memory of 3196 112 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 85 PID 112 wrote to memory of 3196 112 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 85 PID 112 wrote to memory of 3196 112 8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe 85
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2672
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Users\Admin\AppData\Local\Temp\8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe"C:\Users\Admin\AppData\Local\Temp\8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe"C:\Users\Admin\AppData\Local\Temp\8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:112
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8c415f6e9e4ddc4df9433b33035ee3c9750283cc9306cdf97d4f9b9df1036946.exe.log
Filesize958B
MD52653ec7e43bfbe52024d5bf4ec27a515
SHA1a08848300075d1c0b385532d840a43e1fd7251fa
SHA2565d7f555a970cc34988aac2e5deaccfc12ef69b5d9ea55fd8d31a9b4b8377f4f2
SHA512b3caeb925a71e99121b34cd1644f199e33a9b73b435cafb47bba0ffb7156d71b3b3ac424076cf0a600eeb422cb358420915a29b97c974937ebf9186bea05938d