Analysis
-
max time kernel
91s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-09-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
1temp694.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
1temp694.exe
Resource
win11-20240802-en
General
-
Target
1temp694.exe
-
Size
1.2MB
-
MD5
3dee5861e10fa13a29d0ef0593b5be77
-
SHA1
a6cb12aeefca226adf4a1c223254171ad7a9890d
-
SHA256
8d5a7124097323dc0f569a95eebc185fe456fa19bdc6186cf99ee858ab557941
-
SHA512
26b1a59c56dbb36a584494de9096c5d3196771e985458b1ee3a4458b25f0ce5fab12ea4849f0c42afdeb42d10c2916120e5a264aadd5dd2b9d7fe89838c2be29
-
SSDEEP
24576:cWy4GRhwybnWS70ykL7v3N0P/Z63i44ErocTnvQRr0VMfVCzfS/GBjoe:cy2LWS7hk9LUcTyr06fVefS/MjD
Malware Config
Extracted
rhadamanthys
https://193.188.20.191:443/e0bd9c1f4515facb49/eehcla05.c4ft8
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
pipanel.exedescription pid process target process PID 636 created 2604 636 pipanel.exe sihost.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1448 636 WerFault.exe pipanel.exe 1252 636 WerFault.exe pipanel.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1temp694.exepipanel.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1temp694.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pipanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
1temp694.exepipanel.exeopenwith.exepid process 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 2932 1temp694.exe 636 pipanel.exe 636 pipanel.exe 4176 openwith.exe 4176 openwith.exe 4176 openwith.exe 4176 openwith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1temp694.exepid process 2932 1temp694.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
1temp694.exepipanel.exedescription pid process target process PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 2932 wrote to memory of 636 2932 1temp694.exe pipanel.exe PID 636 wrote to memory of 4176 636 pipanel.exe openwith.exe PID 636 wrote to memory of 4176 636 pipanel.exe openwith.exe PID 636 wrote to memory of 4176 636 pipanel.exe openwith.exe PID 636 wrote to memory of 4176 636 pipanel.exe openwith.exe PID 636 wrote to memory of 4176 636 pipanel.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2604
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\1temp694.exe"C:\Users\Admin\AppData\Local\Temp\1temp694.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\1temp694.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 4563⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 4523⤵
- Program crash
PID:1252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 636 -ip 6361⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 636 -ip 6361⤵PID:1516