Analysis
-
max time kernel
92s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240802-en
General
-
Target
1.exe
-
Size
13.5MB
-
MD5
2d49f4f1c9964d0f735c46fc0750561e
-
SHA1
69fbd91314fb0543b627df7a3688fcf067111846
-
SHA256
95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d
-
SHA512
f4230ac53e6a23a330ab2cb2189504c50f10597c50fead263d6d48eb2c671ea2d5c18b19c0dca99f39e9915258da3f4ac174a6a739f8f16eac786c4480494327
-
SSDEEP
98304:FIblLdzWste0R8lsJdf0EMVTZvWYOht+GZQ1Iod5f:4LtWstKlsJdfNhtHZQL5f
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
BitLockerToGo.exedescription pid Process procid_target PID 2312 created 2652 2312 BitLockerToGo.exe 44 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1.exedescription pid Process procid_target PID 3304 set thread context of 2312 3304 1.exe 86 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 2160 2312 WerFault.exe 86 3076 2312 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
BitLockerToGo.exeopenwith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
BitLockerToGo.exeopenwith.exepid Process 2312 BitLockerToGo.exe 2312 BitLockerToGo.exe 3552 openwith.exe 3552 openwith.exe 3552 openwith.exe 3552 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1.exeBitLockerToGo.exedescription pid Process procid_target PID 3304 wrote to memory of 2312 3304 1.exe 86 PID 3304 wrote to memory of 2312 3304 1.exe 86 PID 3304 wrote to memory of 2312 3304 1.exe 86 PID 3304 wrote to memory of 2312 3304 1.exe 86 PID 3304 wrote to memory of 2312 3304 1.exe 86 PID 2312 wrote to memory of 3552 2312 BitLockerToGo.exe 87 PID 2312 wrote to memory of 3552 2312 BitLockerToGo.exe 87 PID 2312 wrote to memory of 3552 2312 BitLockerToGo.exe 87 PID 2312 wrote to memory of 3552 2312 BitLockerToGo.exe 87 PID 2312 wrote to memory of 3552 2312 BitLockerToGo.exe 87
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2652
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 4363⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 4323⤵
- Program crash
PID:3076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2312 -ip 23121⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2312 -ip 23121⤵PID:3012