Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 20:03

General

  • Target

    gugjUpdater.exe

  • Size

    679.3MB

  • MD5

    110338c7214276a2f7eba4a9d43621a8

  • SHA1

    849817945ff02ace87ee7ac5f6eb6f66a4cfe33c

  • SHA256

    9cafa33cd3dafee4f4a02a2ad8d1a9121cfaeae6cde95f3da647cff7d3e4914d

  • SHA512

    f41e0dd2268492cf672cffbcf88a4b8575fd8cf1ef8d938fa5a6cb8d5bfba28f994b42adb1863c70ac3cde112cf8e488cf2e04b0abe48bdae066e33616c5ac9c

  • SSDEEP

    393216:tkfZ+0tsgG1a+OA0vBUJg+pw4Osi1FKT69NeBV8opaOm5TdhxJNKSYkL6nFn:4QpJMTJKr

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\gugjUpdater.exe
        "C:\Users\Admin\AppData\Local\Temp\gugjUpdater.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1424
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1424-1-0x000000000041B000-0x0000000000435000-memory.dmp

      Filesize

      104KB

    • memory/1424-2-0x0000000000160000-0x000000000016A000-memory.dmp

      Filesize

      40KB

    • memory/1424-4-0x0000000000400000-0x00000000017D3000-memory.dmp

      Filesize

      19.8MB

    • memory/1424-3-0x0000000000160000-0x000000000016A000-memory.dmp

      Filesize

      40KB

    • memory/1424-10-0x00000000001D0000-0x00000000001F8000-memory.dmp

      Filesize

      160KB

    • memory/1424-9-0x00000000001D0000-0x00000000001F8000-memory.dmp

      Filesize

      160KB

    • memory/1424-8-0x00000000001C0000-0x00000000001C4000-memory.dmp

      Filesize

      16KB

    • memory/1424-7-0x00000000001C0000-0x00000000001C4000-memory.dmp

      Filesize

      16KB

    • memory/1424-6-0x0000000000170000-0x0000000000177000-memory.dmp

      Filesize

      28KB

    • memory/1424-5-0x0000000000170000-0x0000000000177000-memory.dmp

      Filesize

      28KB

    • memory/1424-11-0x000000002F8E0000-0x000000002FCE0000-memory.dmp

      Filesize

      4.0MB

    • memory/1424-12-0x000000002F8E0000-0x000000002FCE0000-memory.dmp

      Filesize

      4.0MB

    • memory/1424-15-0x0000000076C10000-0x0000000076C57000-memory.dmp

      Filesize

      284KB

    • memory/1424-13-0x0000000077440000-0x00000000775E9000-memory.dmp

      Filesize

      1.7MB

    • memory/2772-16-0x0000000000080000-0x0000000000089000-memory.dmp

      Filesize

      36KB

    • memory/2772-18-0x0000000001B30000-0x0000000001F30000-memory.dmp

      Filesize

      4.0MB

    • memory/2772-19-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2772-22-0x0000000076C10000-0x0000000076C57000-memory.dmp

      Filesize

      284KB

    • memory/2772-20-0x0000000077440000-0x00000000775E9000-memory.dmp

      Filesize

      1.7MB