Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe
Resource
win10v2004-20240802-en
General
-
Target
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe
-
Size
5.9MB
-
MD5
cfb3626fc1ef7ad447d4c6a603d8ee93
-
SHA1
52c14e0953ed22f7340aa2e7a503e85a0780f1e8
-
SHA256
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c
-
SHA512
1bc502ce85a4dd74dd9e4fc0742ec2d61626535162095c4765782221fe09ac3d1f2b9b314829fcd81aa84add80616741988b5f942c93c6980beb733506d77a11
-
SSDEEP
98304:SIqyrlEfrYvsggIauNNFoAgrS43doVFXMxGXdnxiHO3tyuSvK0xlBKmXe4w98L+c:HEDTgg7uHFoVrT3iVFtxiHO3kuGlEKMx
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
AddInProcess32.exedescription pid Process procid_target PID 3652 created 2640 3652 AddInProcess32.exe 44 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exedescription pid Process procid_target PID 2168 set thread context of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 3860 3652 WerFault.exe 88 5024 3652 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exeAddInProcess32.exedialer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exeAddInProcess32.exedialer.exepid Process 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 3652 AddInProcess32.exe 3652 AddInProcess32.exe 3180 dialer.exe 3180 dialer.exe 3180 dialer.exe 3180 dialer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exedescription pid Process Token: SeDebugPrivilege 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exeAddInProcess32.exedescription pid Process procid_target PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 2168 wrote to memory of 3652 2168 f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe 88 PID 3652 wrote to memory of 3180 3652 AddInProcess32.exe 91 PID 3652 wrote to memory of 3180 3652 AddInProcess32.exe 91 PID 3652 wrote to memory of 3180 3652 AddInProcess32.exe 91 PID 3652 wrote to memory of 3180 3652 AddInProcess32.exe 91 PID 3652 wrote to memory of 3180 3652 AddInProcess32.exe 91
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2640
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe"C:\Users\Admin\AppData\Local\Temp\f3cecb104527871238a34a24cd8dad012a2a435605193ed8f8d27087d2503d5c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 4443⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 4403⤵
- Program crash
PID:5024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3652 -ip 36521⤵PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3652 -ip 36521⤵PID:4064