Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 00:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
driver1.exe
Resource
win10v2004-20240709-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
driver1.exe
Resource
win11-20240709-en
6 signatures
150 seconds
General
-
Target
driver1.exe
-
Size
10.8MB
-
MD5
0d96801162f9328e93406310ce13dcd8
-
SHA1
1dd705c9eca5bf057ed1ae1d00df266b8d2ee446
-
SHA256
36bfb2c2ee18a261428200382979de5bf383aba6a8e21e3803f206f4a04ca334
-
SHA512
4f4235b8d3b61edf6ee5a8a9170b9f18fa9bc077896b4d54a668bea46763f322bd2fb7924292092b85bf46d69f10d7146863205e6f84e19d540149510e2d27dd
-
SSDEEP
98304:qd9qQ34+7AhdAOHlfY88KC/EFLvcOXhHd/0h+5:qj4+7AhdHHlppFLn9
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3172 created 2656 3172 BitLockerToGo.exe 44 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4584 set thread context of 3172 4584 driver1.exe 92 -
Program crash 2 IoCs
pid pid_target Process procid_target 3896 3172 WerFault.exe 92 1328 3172 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3172 BitLockerToGo.exe 3172 BitLockerToGo.exe 2240 openwith.exe 2240 openwith.exe 2240 openwith.exe 2240 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4584 wrote to memory of 3172 4584 driver1.exe 92 PID 4584 wrote to memory of 3172 4584 driver1.exe 92 PID 4584 wrote to memory of 3172 4584 driver1.exe 92 PID 4584 wrote to memory of 3172 4584 driver1.exe 92 PID 4584 wrote to memory of 3172 4584 driver1.exe 92 PID 3172 wrote to memory of 2240 3172 BitLockerToGo.exe 94 PID 3172 wrote to memory of 2240 3172 BitLockerToGo.exe 94 PID 3172 wrote to memory of 2240 3172 BitLockerToGo.exe 94 PID 3172 wrote to memory of 2240 3172 BitLockerToGo.exe 94 PID 3172 wrote to memory of 2240 3172 BitLockerToGo.exe 94
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2656
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\driver1.exe"C:\Users\Admin\AppData\Local\Temp\driver1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 3403⤵
- Program crash
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 4323⤵
- Program crash
PID:3896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3172 -ip 31721⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3172 -ip 31721⤵PID:4780