Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
04/08/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
1.bin.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1.bin.exe
Resource
win10v2004-20240802-en
General
-
Target
1.bin.exe
-
Size
16.4MB
-
MD5
d2380577442b3055fd0d4b2be4e4259f
-
SHA1
d778af872b91fdde771ebe2256ed198eb4bf17ac
-
SHA256
1d10f02be531cac852c559a9fcf4c5b09866e793c3ea6b3b43bce7d850ed198f
-
SHA512
4a8d836bab6f91244c40334de9042ea060eb268d72d63694d21c5ca8e16476b69e8310922f242e4879e5388d8823aa0c95ead767be281823e37864fa0d3b38ab
-
SSDEEP
98304:05oxEumHAeIFxfCUnzuTeTUla91+2WjEV5xJlAKgy0by/HtHH3g:7xEc7zuTeTUlaD+gXxJUt
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1160 created 2532 1160 BitLockerToGo.exe 42 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1912 set thread context of 1160 1912 1.bin.exe 86 -
Program crash 2 IoCs
pid pid_target Process procid_target 3016 1160 WerFault.exe 86 976 1160 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1160 BitLockerToGo.exe 1160 BitLockerToGo.exe 1244 openwith.exe 1244 openwith.exe 1244 openwith.exe 1244 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1160 1912 1.bin.exe 86 PID 1912 wrote to memory of 1160 1912 1.bin.exe 86 PID 1912 wrote to memory of 1160 1912 1.bin.exe 86 PID 1912 wrote to memory of 1160 1912 1.bin.exe 86 PID 1912 wrote to memory of 1160 1912 1.bin.exe 86 PID 1160 wrote to memory of 1244 1160 BitLockerToGo.exe 87 PID 1160 wrote to memory of 1244 1160 BitLockerToGo.exe 87 PID 1160 wrote to memory of 1244 1160 BitLockerToGo.exe 87 PID 1160 wrote to memory of 1244 1160 BitLockerToGo.exe 87 PID 1160 wrote to memory of 1244 1160 BitLockerToGo.exe 87
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2532
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\1.bin.exe"C:\Users\Admin\AppData\Local\Temp\1.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 4363⤵
- Program crash
PID:3016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 4323⤵
- Program crash
PID:976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1160 -ip 11601⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1160 -ip 11601⤵PID:368