Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe
Resource
win10v2004-20240802-en
General
-
Target
7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe
-
Size
443KB
-
MD5
2b1106b098715cdfb812022093fd72d9
-
SHA1
a296d6de40d7b1b4ff881ad95c45d769516b49f5
-
SHA256
7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e
-
SHA512
0d9b0b690ca887115c54953fdfb546a0c395afa79dd15b7638b1d08381a439dfa9c24e914f946f8ee92cd90d8e19d30ea06715ed1c6406d8c0e2535ec5196935
-
SSDEEP
12288:kueVM4mtaswkUJBK1ZEU+QI2Dk+sK2bEm724Z5:kuCqaYgQrIOkW2Im72a
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/ir9791e2.fw01k
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exedescription pid Process procid_target PID 2060 set thread context of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2316 3060 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exeRegAsm.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exeRegAsm.exedescription pid Process procid_target PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 2060 wrote to memory of 3060 2060 7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe 31 PID 3060 wrote to memory of 2316 3060 RegAsm.exe 32 PID 3060 wrote to memory of 2316 3060 RegAsm.exe 32 PID 3060 wrote to memory of 2316 3060 RegAsm.exe 32 PID 3060 wrote to memory of 2316 3060 RegAsm.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe"C:\Users\Admin\AppData\Local\Temp\7b4a0714d5b8c42fd15f030ba1562a1e17b65330514e523ad7be50f8df1a508e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 2523⤵
- Program crash
PID:2316
-
-