Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
Setup_Installer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Setup_Installer.exe
Resource
win10v2004-20240802-en
General
-
Target
Setup_Installer.exe
-
Size
74.9MB
-
MD5
707c20a0de59fe418045e8cb90e4e8f9
-
SHA1
a1404eb652921a2808781cf09daecc363dbf5010
-
SHA256
589b622872cef5c5ca4af70a9bba031ee462e555e83213bd73c7511af550e417
-
SHA512
de4f99b62cd02d02cb4f4ebc65078860a6c43293f1b9f1e2e88caf7ceb8c6b690b6adcca013568e721b4986a068ac22c51a20499d6f41c1fa8ab5b3030754269
-
SSDEEP
1572864:Whw53fhw53fhw53fhw53fhw53fhw53fhw53:beeeeee
Malware Config
Extracted
rhadamanthys
https://185.184.26.10:4928/e4eb12414c95175ccfd/Other4
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
winhlp32.exedescription pid process target process PID 1944 created 2532 1944 winhlp32.exe sihost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup_Installer.exedescription pid process target process PID 3288 set thread context of 1944 3288 Setup_Installer.exe winhlp32.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4832 1944 WerFault.exe winhlp32.exe 4984 1944 WerFault.exe winhlp32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Setup_Installer.exewinhlp32.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup_Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winhlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
winhlp32.exeopenwith.exepid process 1944 winhlp32.exe 1944 winhlp32.exe 3912 openwith.exe 3912 openwith.exe 3912 openwith.exe 3912 openwith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Setup_Installer.exewinhlp32.exedescription pid process target process PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 3288 wrote to memory of 1944 3288 Setup_Installer.exe winhlp32.exe PID 1944 wrote to memory of 3912 1944 winhlp32.exe openwith.exe PID 1944 wrote to memory of 3912 1944 winhlp32.exe openwith.exe PID 1944 wrote to memory of 3912 1944 winhlp32.exe openwith.exe PID 1944 wrote to memory of 3912 1944 winhlp32.exe openwith.exe PID 1944 wrote to memory of 3912 1944 winhlp32.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2532
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\Setup_Installer.exe"C:\Users\Admin\AppData\Local\Temp\Setup_Installer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 4203⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 4363⤵
- Program crash
PID:4984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1944 -ip 19441⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1944 -ip 19441⤵PID:1620