Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-08-2024 16:16
Behavioral task
behavioral1
Sample
0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe
Resource
win11-20240802-en
General
-
Target
0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe
-
Size
7.0MB
-
MD5
14462f8ec7a645f19b10247328c22ec7
-
SHA1
6f43200e64a2ce622f0aedd77375bc2354392cad
-
SHA256
0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861
-
SHA512
86f1f7f57f3950923b39da1d2c2231b8ef28268b7c37a5352a2c8329636bc4ddc5013a750674f64572879496764eea8ed4fc2e650b86a72378caae4e4710b2dd
-
SSDEEP
196608:rHDQahBiIbZg4T4hac7p6eDcGRY9iTfh/7/Nv6Bj:rHD5h1behacQeHwibh/71vW
Malware Config
Extracted
rhadamanthys
https://147.124.222.184:7232/2ff7fa032802244/tnvi7gis.n72p2
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RegSvcs.exedescription pid process target process PID 3552 created 2992 3552 RegSvcs.exe sihost.exe -
Loads dropped DLL 9 IoCs
Processes:
0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exepid process 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exedescription pid process target process PID 4780 set thread context of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3088 3552 WerFault.exe RegSvcs.exe 3080 3552 WerFault.exe RegSvcs.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exeRegSvcs.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RegSvcs.exeopenwith.exepid process 3552 RegSvcs.exe 3552 RegSvcs.exe 2020 openwith.exe 2020 openwith.exe 2020 openwith.exe 2020 openwith.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exeRegSvcs.exedescription pid process target process PID 1992 wrote to memory of 4780 1992 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe PID 1992 wrote to memory of 4780 1992 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe PID 1992 wrote to memory of 4780 1992 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 4780 wrote to memory of 3552 4780 0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe RegSvcs.exe PID 3552 wrote to memory of 2020 3552 RegSvcs.exe openwith.exe PID 3552 wrote to memory of 2020 3552 RegSvcs.exe openwith.exe PID 3552 wrote to memory of 2020 3552 RegSvcs.exe openwith.exe PID 3552 wrote to memory of 2020 3552 RegSvcs.exe openwith.exe PID 3552 wrote to memory of 2020 3552 RegSvcs.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2992
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe"C:\Users\Admin\AppData\Local\Temp\0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe"C:\Users\Admin\AppData\Local\Temp\0cfd01603f092d5d793fdd11776c8e6ecb2bd1e48c4254d7efa3942879164861.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 4604⤵
- Program crash
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 4564⤵
- Program crash
PID:3080
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3552 -ip 35521⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3552 -ip 35521⤵PID:1288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5afa8fb684eded0d4ca6aa03aebea446f
SHA198bbb8543d4b3fbecebb952037adb0f9869a63a5
SHA25644de8d0dc9994bff357344c44f12e8bfff8150442f7ca313298b98e6c23a588e
SHA5126669eec07269002c881467d4f4af82e5510928ea32ce79a7b1f51a71ba9567e8d99605c5bc86f940a7b70231d70638aeb2f6c2397ef197bd4c28f5e9fad40312
-
Filesize
114KB
MD521e301d58c481660af1efdebc4ad63fe
SHA1ec10719afcbd6317355bbe0de04beb3d5c067651
SHA256003429b4e119dc08798aada64c13002b210507291afae8cace5eb0032754e78e
SHA512fe06fcb3f6f3f76b7de0ea92ea4fb286c6f8643cbe0f34a9df9b354434aabe3941a3bf2028f3a2e61183f4c39ee2f80ec5dfdcd9854416423142142508a71493
-
Filesize
51KB
MD5306337b62fac65f80cdff7ecde572134
SHA197bdbab0792ee3f601a49a5cc8c5659cacbbd412
SHA256b8a52b9347b2892e4309b4e7386e425a386a7ec3ab0437fa3ac9e3adf3d12d0e
SHA51264519625158d0fa1bae8e46bc70bebebcf917a1f48ce2062c21c950c5a007ea2863d5d3c126d2b7ee0dae445b8f9a09901bf9b7564c4083cb51788a1c320c926
-
Filesize
69KB
MD52df573607b053e4d8ba0eba9be96541c
SHA1d41b40c468898c9a2e4d6be434c7eea57724b546
SHA256a591d3054c741496889e1a427516d8aab89bb94636b96467213fa6449df9eb26
SHA51221fb191b49092abf5bc0ab029fdff0a63b7b77ed4edbf13b0c74eb8d3e5a9ebd5ba8314c0f8293ad5c922c5ad0849a23d1fa05e1c6e3104c23aab85dcd095e56
-
Filesize
20KB
MD557d1ce47beec7887052b7f483af087ad
SHA15700079af8e2935a15f43f83acf0c599b8d5b549
SHA25606530260df043ed6515ffdb371f797b7c2cc5e824b848a341f40691cead64ebe
SHA5127aa94e5b6664c767da054fbacb19a6386007d83db0659dd9c62fc17d3aadc2855e5421f9bf15b7b8a01e6bc93bd6ef1c9d425246f1431bda141e066bc20236f8
-
Filesize
781KB
MD5d214306a963d6db9dbe73c65d9b7c23e
SHA1e42d3786f3ecf2cffee2ca2b7821973630431231
SHA2565dd6afe3439d4eb8673de441ed980825919110abc2b1360c7a02a3cc365fcca8
SHA51276601a39f1e84eaf3257a4989a45b6e2ee8492788239bb8f42729bfdbfbd3a50949295fd459ee4d9649fd16c3815740d7bf8152c4b707432a2a480ced711473c
-
Filesize
2.2MB
MD531c2130f39942ac41f99c77273969cd7
SHA1540edcfcfa75d0769c94877b451f5d0133b1826c
SHA256dd55258272eeb8f2b91a85082887463d0596e992614213730000b2dbc164bcad
SHA512cb4e0b90ea86076bd5c904b46f6389d0fd4afffe0bd3a903c7ff0338c542797063870498e674f86d58764cdbb73b444d1df4b4aa64f69f99b224e86ddaf74bb5
-
Filesize
28KB
MD5bc20614744ebf4c2b8acd28d1fe54174
SHA1665c0acc404e13a69800fae94efd69a41bdda901
SHA2560c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57
SHA5120c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b
-
Filesize
4.3MB
MD584741db3367d6998108d22e03eaf2a71
SHA16564ab918223d0074dfbf9bc5d062fd3a2003079
SHA2563e0c22d1451c3f3578850990f54916eb276bb45b951649d6478523566dfa8059
SHA5121a6aa94ec97df73b23b0d5079bafa92c13f9786f5c488046e95804f4701baeecb1beb9fd96824a6009355321adb7319ac643af40ff0c6b01733050dab2b648c0
-
Filesize
24KB
MD5e2642d30be324bd86d711ada36797b85
SHA1c474699a4853f0157708901213d3165530c45a69
SHA256bb87be114067ab856067dbe74ba421c21cb0f36ad1960af0f5d61bda2e753fa2
SHA512b2bb79f229d86e74d04bae5ef4813909afeaac530ce71f384c2ce1e1c690d792b413255c35e97b0ef9ff72c68d779dc044a03646d35777a40f1a427eafc14666