Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
31/07/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe
Resource
win10v2004-20240730-en
General
-
Target
bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe
-
Size
1.9MB
-
MD5
c607e5a15a55a85f0fd6339c75dbe769
-
SHA1
36e24f54dd93166a2d42ebb222d4c15eefe7239b
-
SHA256
bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461
-
SHA512
db157472ad89553b0a9578da6b5a5b07abe30741509f097f359fb1c40db3818e94f8134513d52627f0e889731dbdf4fc0bf4375ff3a0bdbb0892ca6e108391a6
-
SSDEEP
49152:IebOsgxw8eSymL1zO69MOpJjyTVKueFU4NXJ:P+N1K+luelXJ
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2700 created 1204 2700 2FC8.exe 21 -
Executes dropped EXE 1 IoCs
pid Process 2700 2FC8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2FC8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2700 2FC8.exe 2700 2FC8.exe 2772 dialer.exe 2772 dialer.exe 2772 dialer.exe 2772 dialer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2700 2480 bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe 32 PID 2480 wrote to memory of 2700 2480 bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe 32 PID 2480 wrote to memory of 2700 2480 bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe 32 PID 2480 wrote to memory of 2700 2480 bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe 32 PID 2700 wrote to memory of 2772 2700 2FC8.exe 33 PID 2700 wrote to memory of 2772 2700 2FC8.exe 33 PID 2700 wrote to memory of 2772 2700 2FC8.exe 33 PID 2700 wrote to memory of 2772 2700 2FC8.exe 33 PID 2700 wrote to memory of 2772 2700 2FC8.exe 33 PID 2700 wrote to memory of 2772 2700 2FC8.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe"C:\Users\Admin\AppData\Local\Temp\bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461.exe"2⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\dat2FC7.tmp\2FC8.exe"C:\Users\Admin\AppData\Local\Temp\dat2FC7.tmp\2FC8.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD59a9e54e2c0b5076ebbddd676c45a7c6e
SHA129969d8d71dd863088190dfcabb7713ffc8484ae
SHA2564a802496f5171c7f9d8862a579795c346489d7ab0b0b1b0df7da6621911e6b91
SHA512fc0d7f50c36b969bdb2af43834f947129ea1710599054100a01964b63a3541d06df6e3eeb8c782041ede182be3c9a7c16dbe498f4acac14c8a2646dc26510401