Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe
Resource
win10v2004-20240802-en
General
-
Target
d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe
-
Size
10.0MB
-
MD5
04bb2ad01b3eadfef8c562ec75f30912
-
SHA1
12a8014a9492660ca49d6ce463df2e49360b02ba
-
SHA256
d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772
-
SHA512
97818da55414b5cbe749cc2f6b93096d5c8e97e246ce2d1893143a6ef2827929e91b574fe1576cec41f59405c56c485929c9803c0b72950023eb071930fa5f06
-
SSDEEP
49152:Ek6ufMjhnCBj5I+IOTAwj6E9vOzf6Y7Xrl8:EkRfMN+Jibl8
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2876 created 1232 2876 csc.exe 21 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\FortiClientRemoval = "C:\\Users\\Admin\\Pictures\\FortiClient\\FortiClientRemoval.exe" d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2876 2752 d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2876 csc.exe 2876 csc.exe 2620 dialer.exe 2620 dialer.exe 2620 dialer.exe 2620 dialer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2876 2752 d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe 30 PID 2752 wrote to memory of 2876 2752 d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe 30 PID 2752 wrote to memory of 2876 2752 d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe 30 PID 2752 wrote to memory of 2876 2752 d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe 30 PID 2752 wrote to memory of 2876 2752 d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe 30 PID 2752 wrote to memory of 2876 2752 d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe 30 PID 2876 wrote to memory of 2620 2876 csc.exe 31 PID 2876 wrote to memory of 2620 2876 csc.exe 31 PID 2876 wrote to memory of 2620 2876 csc.exe 31 PID 2876 wrote to memory of 2620 2876 csc.exe 31 PID 2876 wrote to memory of 2620 2876 csc.exe 31 PID 2876 wrote to memory of 2620 2876 csc.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe"C:\Users\Admin\AppData\Local\Temp\d61285779379c5e28500c6aa42431db345f36e1297246974cf5bd113913fd772.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620
-