Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
1temp694.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
1temp694.exe
Resource
win11-20240802-en
General
-
Target
1temp694.exe
-
Size
1.2MB
-
MD5
3dee5861e10fa13a29d0ef0593b5be77
-
SHA1
a6cb12aeefca226adf4a1c223254171ad7a9890d
-
SHA256
8d5a7124097323dc0f569a95eebc185fe456fa19bdc6186cf99ee858ab557941
-
SHA512
26b1a59c56dbb36a584494de9096c5d3196771e985458b1ee3a4458b25f0ce5fab12ea4849f0c42afdeb42d10c2916120e5a264aadd5dd2b9d7fe89838c2be29
-
SSDEEP
24576:cWy4GRhwybnWS70ykL7v3N0P/Z63i44ErocTnvQRr0VMfVCzfS/GBjoe:cy2LWS7hk9LUcTyr06fVefS/MjD
Malware Config
Extracted
rhadamanthys
https://193.188.20.191:443/e0bd9c1f4515facb49/eehcla05.c4ft8
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
pipanel.exedescription pid process target process PID 2428 created 2664 2428 pipanel.exe sihost.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2552 2428 WerFault.exe pipanel.exe 3028 2428 WerFault.exe pipanel.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1temp694.exepipanel.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1temp694.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pipanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
1temp694.exepipanel.exeopenwith.exepid process 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 4568 1temp694.exe 2428 pipanel.exe 2428 pipanel.exe 1208 openwith.exe 1208 openwith.exe 1208 openwith.exe 1208 openwith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1temp694.exepid process 4568 1temp694.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
1temp694.exepipanel.exedescription pid process target process PID 4568 wrote to memory of 4588 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 4588 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 4588 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 4568 wrote to memory of 2428 4568 1temp694.exe pipanel.exe PID 2428 wrote to memory of 1208 2428 pipanel.exe openwith.exe PID 2428 wrote to memory of 1208 2428 pipanel.exe openwith.exe PID 2428 wrote to memory of 1208 2428 pipanel.exe openwith.exe PID 2428 wrote to memory of 1208 2428 pipanel.exe openwith.exe PID 2428 wrote to memory of 1208 2428 pipanel.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2664
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\1temp694.exe"C:\Users\Admin\AppData\Local\Temp\1temp694.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\1temp694.exe"2⤵PID:4588
-
-
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\1temp694.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 4323⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 4283⤵
- Program crash
PID:3028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2428 -ip 24281⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2428 -ip 24281⤵PID:4196