Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28/07/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe
-
Size
2.1MB
-
MD5
8f355039fd3d9395f974e0982c13a458
-
SHA1
725df56eba3b235f996132057e3ef94d4cc39843
-
SHA256
ba4e57be7998467a7fb5471ea6e6d5ee9d6233de96bf2699efe9e8c45b21b039
-
SHA512
7d6d3b445b7d39d054a37f0c33845fdb0f936e48252e46bfe405ab4d2bbb00554dcaea24283f56ce4c5b7b64a7daef0929994405b0706b7937b3b42f6b24dfe8
-
SSDEEP
24576:p22vSU1RUol7JFZUEHAlPPT7CP02yVYk8YzlRGaDEW4/oUxvCUD61CCQbKxvDUQa:bJUol1Fy+SPTey6IGqH4x5DeEKtUw9
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2564 created 2544 2564 csc.exe 42 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DellUpdater = "C:\\Users\\Admin\\Pictures\\Dell\\DellUpdater.exe" 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4300 set thread context of 2564 4300 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2564 csc.exe 2564 csc.exe 2332 openwith.exe 2332 openwith.exe 2332 openwith.exe 2332 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4300 wrote to memory of 2564 4300 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 94 PID 4300 wrote to memory of 2564 4300 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 94 PID 4300 wrote to memory of 2564 4300 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 94 PID 4300 wrote to memory of 2564 4300 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 94 PID 4300 wrote to memory of 2564 4300 2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe 94 PID 2564 wrote to memory of 2332 2564 csc.exe 95 PID 2564 wrote to memory of 2332 2564 csc.exe 95 PID 2564 wrote to memory of 2332 2564 csc.exe 95 PID 2564 wrote to memory of 2332 2564 csc.exe 95 PID 2564 wrote to memory of 2332 2564 csc.exe 95
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2544
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-28_8f355039fd3d9395f974e0982c13a458_avoslocker.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564
-