Analysis
-
max time kernel
71s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe
Resource
win10v2004-20240802-en
General
-
Target
95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe
-
Size
13.5MB
-
MD5
2d49f4f1c9964d0f735c46fc0750561e
-
SHA1
69fbd91314fb0543b627df7a3688fcf067111846
-
SHA256
95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d
-
SHA512
f4230ac53e6a23a330ab2cb2189504c50f10597c50fead263d6d48eb2c671ea2d5c18b19c0dca99f39e9915258da3f4ac174a6a739f8f16eac786c4480494327
-
SSDEEP
98304:FIblLdzWste0R8lsJdf0EMVTZvWYOht+GZQ1Iod5f:4LtWstKlsJdfNhtHZQL5f
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5056 created 2552 5056 BitLockerToGo.exe 44 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4824 set thread context of 5056 4824 95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe 86 -
Program crash 2 IoCs
pid pid_target Process procid_target 1636 5056 WerFault.exe 86 412 5056 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5056 BitLockerToGo.exe 5056 BitLockerToGo.exe 2728 openwith.exe 2728 openwith.exe 2728 openwith.exe 2728 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4824 wrote to memory of 5056 4824 95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe 86 PID 4824 wrote to memory of 5056 4824 95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe 86 PID 4824 wrote to memory of 5056 4824 95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe 86 PID 4824 wrote to memory of 5056 4824 95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe 86 PID 4824 wrote to memory of 5056 4824 95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe 86 PID 5056 wrote to memory of 2728 5056 BitLockerToGo.exe 87 PID 5056 wrote to memory of 2728 5056 BitLockerToGo.exe 87 PID 5056 wrote to memory of 2728 5056 BitLockerToGo.exe 87 PID 5056 wrote to memory of 2728 5056 BitLockerToGo.exe 87 PID 5056 wrote to memory of 2728 5056 BitLockerToGo.exe 87
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2552
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe"C:\Users\Admin\AppData\Local\Temp\95e31ee2a74f11c0705e9eec34cd2707986f5c962eb751cfd3abdcb6b98cf19d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 4363⤵
- Program crash
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 4323⤵
- Program crash
PID:412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5056 -ip 50561⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5056 -ip 50561⤵PID:1460