Analysis

  • max time kernel
    145s
  • max time network
    157s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16/07/2024, 11:46

General

  • Target

    launcher/Launcher8.exe

  • Size

    715.8MB

  • MD5

    1187832294ddeda23092997a27453027

  • SHA1

    83a1108cc62779cfbf55a14258a2596210ed3633

  • SHA256

    b9ca36c66cdc58639961531aec9fd6270c20a4b7fcf4dd7d80e2a68d2d571ada

  • SHA512

    574d9d47226998588d3f76af915f430a3379f080cf6e7994c9a52f8332bce518a1057119578c38b2e0b1917fd7ccc87512f63e6a9b881ce1d25846bbb04c560f

  • SSDEEP

    12288:gYpYPSWYEiKCukSqnnUiZgLqHX0SBCCsKr:fl920toSXfBp

Score
10/10

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:728
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2908
    • C:\Users\Admin\AppData\Local\Temp\launcher\Launcher8.exe
      "C:\Users\Admin\AppData\Local\Temp\launcher\Launcher8.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3356
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 520
          3⤵
          • Program crash
          PID:2892
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 516
          3⤵
          • Program crash
          PID:3384
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1044 -ip 1044
      1⤵
        PID:3112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1044 -ip 1044
        1⤵
          PID:1212

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1044-15-0x00000000035F0000-0x00000000039F0000-memory.dmp

          Filesize

          4.0MB

        • memory/1044-16-0x00007FF8150C0000-0x00007FF8152C9000-memory.dmp

          Filesize

          2.0MB

        • memory/1044-28-0x00000000035F0000-0x00000000039F0000-memory.dmp

          Filesize

          4.0MB

        • memory/1044-5-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/1044-20-0x00000000035F0000-0x00000000039F0000-memory.dmp

          Filesize

          4.0MB

        • memory/1044-10-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/1044-8-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/1044-21-0x00007FF8150C1000-0x00007FF8151EA000-memory.dmp

          Filesize

          1.2MB

        • memory/1044-13-0x00000000035F0000-0x00000000039F0000-memory.dmp

          Filesize

          4.0MB

        • memory/1044-18-0x0000000075A20000-0x0000000075C72000-memory.dmp

          Filesize

          2.3MB

        • memory/1044-14-0x00000000035F0000-0x00000000039F0000-memory.dmp

          Filesize

          4.0MB

        • memory/2908-19-0x00000000008C0000-0x00000000008C9000-memory.dmp

          Filesize

          36KB

        • memory/2908-24-0x00007FF8150C0000-0x00007FF8152C9000-memory.dmp

          Filesize

          2.0MB

        • memory/2908-26-0x00007FF8150C0000-0x00007FF8152C9000-memory.dmp

          Filesize

          2.0MB

        • memory/2908-23-0x00000000027B0000-0x0000000002BB0000-memory.dmp

          Filesize

          4.0MB

        • memory/2908-27-0x0000000075A20000-0x0000000075C72000-memory.dmp

          Filesize

          2.3MB

        • memory/2908-29-0x00007FF8150C0000-0x00007FF8152C9000-memory.dmp

          Filesize

          2.0MB

        • memory/3356-0-0x0000000074DAE000-0x0000000074DAF000-memory.dmp

          Filesize

          4KB

        • memory/3356-1-0x0000000000630000-0x00000000006BA000-memory.dmp

          Filesize

          552KB

        • memory/3356-12-0x0000000074DA0000-0x0000000075551000-memory.dmp

          Filesize

          7.7MB

        • memory/3356-9-0x0000000074DA0000-0x0000000075551000-memory.dmp

          Filesize

          7.7MB

        • memory/3356-2-0x0000000074DA0000-0x0000000075551000-memory.dmp

          Filesize

          7.7MB