Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/07/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe
-
Size
2.1MB
-
MD5
8f355039fd3d9395f974e0982c13a458
-
SHA1
725df56eba3b235f996132057e3ef94d4cc39843
-
SHA256
ba4e57be7998467a7fb5471ea6e6d5ee9d6233de96bf2699efe9e8c45b21b039
-
SHA512
7d6d3b445b7d39d054a37f0c33845fdb0f936e48252e46bfe405ab4d2bbb00554dcaea24283f56ce4c5b7b64a7daef0929994405b0706b7937b3b42f6b24dfe8
-
SSDEEP
24576:p22vSU1RUol7JFZUEHAlPPT7CP02yVYk8YzlRGaDEW4/oUxvCUD61CCQbKxvDUQa:bJUol1Fy+SPTey6IGqH4x5DeEKtUw9
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2988 created 1236 2988 csc.exe 21 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\DellUpdater = "C:\\Users\\Admin\\Pictures\\Dell\\DellUpdater.exe" 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 2988 2372 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2988 csc.exe 2988 csc.exe 2652 dialer.exe 2652 dialer.exe 2652 dialer.exe 2652 dialer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2988 2372 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 31 PID 2372 wrote to memory of 2988 2372 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 31 PID 2372 wrote to memory of 2988 2372 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 31 PID 2372 wrote to memory of 2988 2372 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 31 PID 2372 wrote to memory of 2988 2372 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 31 PID 2372 wrote to memory of 2988 2372 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 31 PID 2988 wrote to memory of 2652 2988 csc.exe 32 PID 2988 wrote to memory of 2652 2988 csc.exe 32 PID 2988 wrote to memory of 2652 2988 csc.exe 32 PID 2988 wrote to memory of 2652 2988 csc.exe 32 PID 2988 wrote to memory of 2652 2988 csc.exe 32 PID 2988 wrote to memory of 2652 2988 csc.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2652
-