Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240802-en
General
-
Target
1.exe
-
Size
13.5MB
-
MD5
2d49f4f1c9964d0f735c46fc0750561e
-
SHA1
69fbd91314fb0543b627df7a3688fcf067111846
-
SHA256
95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d
-
SHA512
f4230ac53e6a23a330ab2cb2189504c50f10597c50fead263d6d48eb2c671ea2d5c18b19c0dca99f39e9915258da3f4ac174a6a739f8f16eac786c4480494327
-
SSDEEP
98304:FIblLdzWste0R8lsJdf0EMVTZvWYOht+GZQ1Iod5f:4LtWstKlsJdfNhtHZQL5f
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
BitLockerToGo.exedescription pid Process procid_target PID 4760 created 2952 4760 BitLockerToGo.exe 50 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1.exedescription pid Process procid_target PID 3932 set thread context of 4760 3932 1.exe 86 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 4356 4760 WerFault.exe 86 1684 4760 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
BitLockerToGo.exeopenwith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
BitLockerToGo.exeopenwith.exepid Process 4760 BitLockerToGo.exe 4760 BitLockerToGo.exe 1264 openwith.exe 1264 openwith.exe 1264 openwith.exe 1264 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1.exeBitLockerToGo.exedescription pid Process procid_target PID 3932 wrote to memory of 4760 3932 1.exe 86 PID 3932 wrote to memory of 4760 3932 1.exe 86 PID 3932 wrote to memory of 4760 3932 1.exe 86 PID 3932 wrote to memory of 4760 3932 1.exe 86 PID 3932 wrote to memory of 4760 3932 1.exe 86 PID 4760 wrote to memory of 1264 4760 BitLockerToGo.exe 87 PID 4760 wrote to memory of 1264 4760 BitLockerToGo.exe 87 PID 4760 wrote to memory of 1264 4760 BitLockerToGo.exe 87 PID 4760 wrote to memory of 1264 4760 BitLockerToGo.exe 87 PID 4760 wrote to memory of 1264 4760 BitLockerToGo.exe 87
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2952
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 4683⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 4763⤵
- Program crash
PID:1684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4760 -ip 47601⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4760 -ip 47601⤵PID:1864