Resubmissions
20-08-2024 14:12
240820-rjb9nswdmd 1017-08-2024 19:49
240817-yjs1ratbnf 1015-08-2024 17:38
240815-v7zlnavale 1030-06-2023 12:04
230630-n8y8yshh95 10Analysis
-
max time kernel
131s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
cc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cc.exe
Resource
win10v2004-20240802-en
General
-
Target
cc.exe
-
Size
501KB
-
MD5
f73e68f4995b58c9a1e47d67da9372ca
-
SHA1
0760b6b12d99915182bee3e3fa0e9aabd7a830c0
-
SHA256
ea741d942926073191df32a404977cc4afa3b17bcd34871faafbf7f61be71c26
-
SHA512
a419e78a385ad5e11224dad96b508e7bb01209a21fad338722e68d1d92cd78b92267af13f037126d04e49451fa62f089edb6ee77f7d2ce1cb9e26d56473b02af
-
SSDEEP
6144:HoR7YSOIypGIyGYdqfCwgKo74ERmvOJUlARI7hJEftv99J:yTPMlyldqfCwTE/QmJUlAO7hJElv9L
Malware Config
Extracted
rhadamanthys
https://179.43.162.23:8509/c29db42cd4cdbbd4077/favicon.png
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2372-5-0x00000000039B0000-0x0000000003DB0000-memory.dmp family_rhadamanthys behavioral2/memory/2372-6-0x00000000039B0000-0x0000000003DB0000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
cc.exedescription pid Process procid_target PID 2372 created 3448 2372 cc.exe 56 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2840 2372 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
cc.exepid Process 2372 cc.exe 2372 cc.exe 2372 cc.exe 2372 cc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cc.exedescription pid Process procid_target PID 2372 wrote to memory of 852 2372 cc.exe 92 PID 2372 wrote to memory of 852 2372 cc.exe 92 PID 2372 wrote to memory of 852 2372 cc.exe 92 PID 2372 wrote to memory of 852 2372 cc.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\cc.exe"C:\Users\Admin\AppData\Local\Temp\cc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 9163⤵
- Program crash
PID:2840
-
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2372 -ip 23721⤵PID:2708