Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
submitted
19/07/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe
Resource
win10v2004-20240709-en
General
-
Target
b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe
-
Size
2.5MB
-
MD5
135a429806034bd99cf913a3d6c19aa5
-
SHA1
3d801912d0d61535764506962e0e8f248319a3cd
-
SHA256
b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186
-
SHA512
fdebb8556baa1bb273fc04532e6594005a7c1c972e501b1f5e95046c2252363f2b81c0948d42c535fd1cc4e42ae6ef176a8d5bbe9b792de38babab6eedf37cd3
-
SSDEEP
49152:XOO2EZtuoHjBw65ivfPxFY/WcuMjy+4vDI:XOO7nGRMWnMjE8
Malware Config
Extracted
rhadamanthys
https://77.221.154.49/68c8ee7d3c216cd1fa3c/en3cccbn.s7sw2
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4856 created 3024 4856 katA5A6.tmp 50 -
Executes dropped EXE 1 IoCs
pid Process 4856 katA5A6.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language katA5A6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4856 katA5A6.tmp 4856 katA5A6.tmp 1948 dialer.exe 1948 dialer.exe 1948 dialer.exe 1948 dialer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1584 wrote to memory of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 PID 1584 wrote to memory of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 PID 1584 wrote to memory of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 PID 1584 wrote to memory of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 PID 1584 wrote to memory of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 PID 1584 wrote to memory of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 PID 1584 wrote to memory of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 PID 1584 wrote to memory of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 PID 1584 wrote to memory of 4856 1584 b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe 91 PID 4856 wrote to memory of 1948 4856 katA5A6.tmp 93 PID 4856 wrote to memory of 1948 4856 katA5A6.tmp 93 PID 4856 wrote to memory of 1948 4856 katA5A6.tmp 93 PID 4856 wrote to memory of 1948 4856 katA5A6.tmp 93 PID 4856 wrote to memory of 1948 4856 katA5A6.tmp 93
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3024
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe"C:\Users\Admin\AppData\Local\Temp\b423e08d83060bea5f6a75a8cbfe6d7084db89ef9deb8602c264293601873186.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\katA5A6.tmpC:\Users\Admin\AppData\Local\Temp\katA5A6.tmp2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861KB
MD566064dbdb70a5eb15ebf3bf65aba254b
SHA10284fd320f99f62aca800fb1251eff4c31ec4ed7
SHA2566a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795
SHA512b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f