Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/07/2024, 17:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Fluxus V7.exe
Resource
win11-20240709-en
8 signatures
150 seconds
General
-
Target
Fluxus V7.exe
-
Size
1.8MB
-
MD5
a272524ac1346c75297adcedc18ceeac
-
SHA1
03c16f27c8380c31a6808114ab46cf9d5701fbf8
-
SHA256
241c2f04b954e016a35dad08f22d53f5365c551f5f25a801cf91f6c99de8f9b9
-
SHA512
1ec4aaa837ec866dd3fa7ff134493a8a6df079990307507a49c70f3a2932385c7b921f53f47b3518288dcc20e3907db537cef2c783f9d59d31256ab30491253c
-
SSDEEP
24576:VFqcy+sJQBlZZo8YiAGZi2GMxPfkk6BgGf2DCYrcF1GTziPfIC:VwlQBlZZosM1MxPfkCObXGTwQC
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/1144-12-0x0000000002DD0000-0x00000000031D0000-memory.dmp family_rhadamanthys behavioral1/memory/1144-13-0x0000000002DD0000-0x00000000031D0000-memory.dmp family_rhadamanthys behavioral1/memory/1144-14-0x0000000002DD0000-0x00000000031D0000-memory.dmp family_rhadamanthys behavioral1/memory/1144-15-0x0000000002DD0000-0x00000000031D0000-memory.dmp family_rhadamanthys behavioral1/memory/1144-23-0x0000000002DD0000-0x00000000031D0000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1144 created 3272 1144 AppLaunch.exe 52 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Software.exe Fluxus V7.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Software.exe Fluxus V7.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4324 set thread context of 1144 4324 Fluxus V7.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 2788 4324 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1144 AppLaunch.exe 1144 AppLaunch.exe 1144 AppLaunch.exe 1144 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4324 wrote to memory of 1144 4324 Fluxus V7.exe 83 PID 4324 wrote to memory of 1144 4324 Fluxus V7.exe 83 PID 4324 wrote to memory of 1144 4324 Fluxus V7.exe 83 PID 4324 wrote to memory of 1144 4324 Fluxus V7.exe 83 PID 4324 wrote to memory of 1144 4324 Fluxus V7.exe 83 PID 1144 wrote to memory of 1408 1144 AppLaunch.exe 88 PID 1144 wrote to memory of 1408 1144 AppLaunch.exe 88 PID 1144 wrote to memory of 1408 1144 AppLaunch.exe 88 PID 1144 wrote to memory of 1408 1144 AppLaunch.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\Fluxus V7.exe"C:\Users\Admin\AppData\Local\Temp\Fluxus V7.exe"2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 3163⤵
- Program crash
PID:2788
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4324 -ip 43241⤵PID:2488