Analysis
-
max time kernel
101s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 12:18
Behavioral task
behavioral1
Sample
8Ball-Pool-CHETO-Hack-main/CHETO.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
8Ball-Pool-CHETO-Hack-main/license.dll
Resource
win10v2004-20240802-en
General
-
Target
8Ball-Pool-CHETO-Hack-main/license.dll
-
Size
1.2MB
-
MD5
36dea25d49b9dff21acebface8ea2044
-
SHA1
5bd97162bc98e36c124811c360dbf29c6233405e
-
SHA256
d960a2eac5e7f1aa04e9f8d0da4eb9bb0b097ca58d0ce83ea1bb8351baf26301
-
SHA512
64f06db24297e30d7ec91d3cf9ccc33f28eb9041e463933866b09de0d138d964505aa38f32158be5e5491e4aa68d8ae77bccce9c068e5980d2281a24294bccf8
-
SSDEEP
24576:1iE0l9oS0Cl/9qZPcYJZEiDO3ytIPMunHuGKFufrrH1:YE0l1ZlVsPc06i63aIPZnBX
Malware Config
Extracted
rhadamanthys
https://185.125.50.38:3034/739bd3e91cd40ca83/lem.api
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
CHETO.exeCHETO.exedescription pid Process procid_target PID 2524 created 2652 2524 CHETO.exe 44 PID 2952 created 2652 2952 CHETO.exe 44 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
CHETO.exedialer.exeCHETO.exedialer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CHETO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CHETO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
CHETO.exedialer.exeCHETO.exedialer.exepid Process 2524 CHETO.exe 2524 CHETO.exe 3960 dialer.exe 3960 dialer.exe 3960 dialer.exe 3960 dialer.exe 2952 CHETO.exe 2952 CHETO.exe 2212 dialer.exe 2212 dialer.exe 2212 dialer.exe 2212 dialer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
CHETO.exeCHETO.exedescription pid Process procid_target PID 2524 wrote to memory of 3960 2524 CHETO.exe 105 PID 2524 wrote to memory of 3960 2524 CHETO.exe 105 PID 2524 wrote to memory of 3960 2524 CHETO.exe 105 PID 2524 wrote to memory of 3960 2524 CHETO.exe 105 PID 2524 wrote to memory of 3960 2524 CHETO.exe 105 PID 2952 wrote to memory of 2212 2952 CHETO.exe 112 PID 2952 wrote to memory of 2212 2952 CHETO.exe 112 PID 2952 wrote to memory of 2212 2952 CHETO.exe 112 PID 2952 wrote to memory of 2212 2952 CHETO.exe 112 PID 2952 wrote to memory of 2212 2952 CHETO.exe 112
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2652
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8Ball-Pool-CHETO-Hack-main\license.dll,#11⤵PID:5020
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4836
-
C:\Users\Admin\Desktop\8Ball-Pool-CHETO-Hack-main\CHETO.exe"C:\Users\Admin\Desktop\8Ball-Pool-CHETO-Hack-main\CHETO.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524
-
C:\Users\Admin\Desktop\8Ball-Pool-CHETO-Hack-main\CHETO.exe"C:\Users\Admin\Desktop\8Ball-Pool-CHETO-Hack-main\CHETO.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952