Analysis
-
max time kernel
90s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
05/08/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240802-en
General
-
Target
1.exe
-
Size
13.5MB
-
MD5
2d49f4f1c9964d0f735c46fc0750561e
-
SHA1
69fbd91314fb0543b627df7a3688fcf067111846
-
SHA256
95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d
-
SHA512
f4230ac53e6a23a330ab2cb2189504c50f10597c50fead263d6d48eb2c671ea2d5c18b19c0dca99f39e9915258da3f4ac174a6a739f8f16eac786c4480494327
-
SSDEEP
98304:FIblLdzWste0R8lsJdf0EMVTZvWYOht+GZQ1Iod5f:4LtWstKlsJdfNhtHZQL5f
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1864 created 3036 1864 BitLockerToGo.exe 50 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4912 set thread context of 1864 4912 1.exe 86 -
Program crash 2 IoCs
pid pid_target Process procid_target 112 1864 WerFault.exe 86 2016 1864 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1864 BitLockerToGo.exe 1864 BitLockerToGo.exe 868 openwith.exe 868 openwith.exe 868 openwith.exe 868 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4912 wrote to memory of 1864 4912 1.exe 86 PID 4912 wrote to memory of 1864 4912 1.exe 86 PID 4912 wrote to memory of 1864 4912 1.exe 86 PID 4912 wrote to memory of 1864 4912 1.exe 86 PID 4912 wrote to memory of 1864 4912 1.exe 86 PID 1864 wrote to memory of 868 1864 BitLockerToGo.exe 87 PID 1864 wrote to memory of 868 1864 BitLockerToGo.exe 87 PID 1864 wrote to memory of 868 1864 BitLockerToGo.exe 87 PID 1864 wrote to memory of 868 1864 BitLockerToGo.exe 87 PID 1864 wrote to memory of 868 1864 BitLockerToGo.exe 87
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3036
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 4403⤵
- Program crash
PID:112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 4323⤵
- Program crash
PID:2016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1864 -ip 18641⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1864 -ip 18641⤵PID:1936