Analysis
-
max time kernel
24s -
max time network
41s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/07/2024, 00:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
driver1.exe
Resource
win10v2004-20240709-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
driver1.exe
Resource
win11-20240709-en
6 signatures
150 seconds
General
-
Target
driver1.exe
-
Size
10.8MB
-
MD5
0d96801162f9328e93406310ce13dcd8
-
SHA1
1dd705c9eca5bf057ed1ae1d00df266b8d2ee446
-
SHA256
36bfb2c2ee18a261428200382979de5bf383aba6a8e21e3803f206f4a04ca334
-
SHA512
4f4235b8d3b61edf6ee5a8a9170b9f18fa9bc077896b4d54a668bea46763f322bd2fb7924292092b85bf46d69f10d7146863205e6f84e19d540149510e2d27dd
-
SSDEEP
98304:qd9qQ34+7AhdAOHlfY88KC/EFLvcOXhHd/0h+5:qj4+7AhdHHlppFLn9
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3472 created 3036 3472 BitLockerToGo.exe 49 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4092 set thread context of 3472 4092 driver1.exe 83 -
Program crash 2 IoCs
pid pid_target Process procid_target 1056 3472 WerFault.exe 83 2900 3472 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3472 BitLockerToGo.exe 3472 BitLockerToGo.exe 1404 openwith.exe 1404 openwith.exe 1404 openwith.exe 1404 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4092 wrote to memory of 3472 4092 driver1.exe 83 PID 4092 wrote to memory of 3472 4092 driver1.exe 83 PID 4092 wrote to memory of 3472 4092 driver1.exe 83 PID 4092 wrote to memory of 3472 4092 driver1.exe 83 PID 4092 wrote to memory of 3472 4092 driver1.exe 83 PID 3472 wrote to memory of 1404 3472 BitLockerToGo.exe 84 PID 3472 wrote to memory of 1404 3472 BitLockerToGo.exe 84 PID 3472 wrote to memory of 1404 3472 BitLockerToGo.exe 84 PID 3472 wrote to memory of 1404 3472 BitLockerToGo.exe 84 PID 3472 wrote to memory of 1404 3472 BitLockerToGo.exe 84
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3036
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\driver1.exe"C:\Users\Admin\AppData\Local\Temp\driver1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 4523⤵
- Program crash
PID:1056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 4563⤵
- Program crash
PID:2900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3472 -ip 34721⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3472 -ip 34721⤵PID:1132