Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
Full_Set_up.exe
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Full_Set_up.exe
Resource
win10v2004-20240709-en
4 signatures
150 seconds
General
-
Target
Full_Set_up.exe
-
Size
7.7MB
-
MD5
3de78a79444a5258ee168e2da6b7b7d1
-
SHA1
884d5a20d4da7d3229bdda5f5bacb51d06a8d121
-
SHA256
354679c17ca0de4db1b0362d7bb3f814e106aa5032886fd60c2c21c9bc066927
-
SHA512
52e3595eb71129f84a2d7208bf57f1d86f35001f6c111b33a741e7bff0155e4e19296fdaabff5f9740f4b4c56c8a5030f1166b149b73a9c70cdccc6e3c25d2f1
-
SSDEEP
98304:anrZtEflEbVlkew5n0iH961svNIXRBS6KwysAyyrznkeqJUiB7Qmi5mm4jO:SrZtEflEc5n0iH90svNIVYHkeI7jmqO
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2440 created 2556 2440 Full_Set_up.exe 44 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2440 Full_Set_up.exe 2440 Full_Set_up.exe 2440 Full_Set_up.exe 2440 Full_Set_up.exe 2192 openwith.exe 2192 openwith.exe 2192 openwith.exe 2192 openwith.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2192 2440 Full_Set_up.exe 86 PID 2440 wrote to memory of 2192 2440 Full_Set_up.exe 86 PID 2440 wrote to memory of 2192 2440 Full_Set_up.exe 86 PID 2440 wrote to memory of 2192 2440 Full_Set_up.exe 86 PID 2440 wrote to memory of 2192 2440 Full_Set_up.exe 86
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2556
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\Full_Set_up.exe"C:\Users\Admin\AppData\Local\Temp\Full_Set_up.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3568