Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-08-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe
Resource
win10v2004-20240802-en
General
-
Target
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe
-
Size
5.9MB
-
MD5
cfb3626fc1ef7ad447d4c6a603d8ee93
-
SHA1
52c14e0953ed22f7340aa2e7a503e85a0780f1e8
-
SHA256
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c
-
SHA512
1bc502ce85a4dd74dd9e4fc0742ec2d61626535162095c4765782221fe09ac3d1f2b9b314829fcd81aa84add80616741988b5f942c93c6980beb733506d77a11
-
SSDEEP
98304:SIqyrlEfrYvsggIauNNFoAgrS43doVFXMxGXdnxiHO3tyuSvK0xlBKmXe4w98L+c:HEDTgg7uHFoVrT3iVFtxiHO3kuGlEKMx
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
AddInProcess32.exedescription pid Process procid_target PID 2580 created 1192 2580 AddInProcess32.exe 21 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exedescription pid Process procid_target PID 2740 set thread context of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exeAddInProcess32.exedialer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exeAddInProcess32.exedialer.exepid Process 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 2580 AddInProcess32.exe 2580 AddInProcess32.exe 1976 dialer.exe 1976 dialer.exe 1976 dialer.exe 1976 dialer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exedescription pid Process Token: SeDebugPrivilege 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exeAddInProcess32.exedescription pid Process procid_target PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2740 wrote to memory of 2580 2740 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 30 PID 2580 wrote to memory of 1976 2580 AddInProcess32.exe 31 PID 2580 wrote to memory of 1976 2580 AddInProcess32.exe 31 PID 2580 wrote to memory of 1976 2580 AddInProcess32.exe 31 PID 2580 wrote to memory of 1976 2580 AddInProcess32.exe 31 PID 2580 wrote to memory of 1976 2580 AddInProcess32.exe 31 PID 2580 wrote to memory of 1976 2580 AddInProcess32.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe"C:\Users\Admin\AppData\Local\Temp\f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976
-