Analysis
-
max time kernel
114s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe
-
Size
1.7MB
-
MD5
e069a1b373f66e021faef987be2c722e
-
SHA1
2ea59a8dfb60b51e2b786d71bbfcb6bb5f474744
-
SHA256
235dc83b3a2b765e12e26960b6b90a2fbc7097d4bfb991118139d53fbfd12705
-
SHA512
0ed23250b31fa506a520ac2e709f2db319b2c9d31c64f3bf5ec399a7d0345b7b30279962f3408c8f398ad89896e206d54520a9809f0569f43e4b86b941f8f4cc
-
SSDEEP
49152:fdifhbdWza1F5YeEpoAXg7Cn5BJlT+Qr/FHwf0:f4pbMO1HYeEyAjB6gQf0
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
csc.exedescription pid process target process PID 1880 created 2568 1880 csc.exe sihost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AgentLauncher = "C:\\Users\\Admin\\Pictures\\ClientAgent\\AgentLauncher.exe" 2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exedescription pid process target process PID 2052 set thread context of 1880 2052 2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe csc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.execsc.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
csc.exeopenwith.exepid process 1880 csc.exe 1880 csc.exe 1388 openwith.exe 1388 openwith.exe 1388 openwith.exe 1388 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.execsc.exedescription pid process target process PID 2052 wrote to memory of 1880 2052 2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe csc.exe PID 2052 wrote to memory of 1880 2052 2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe csc.exe PID 2052 wrote to memory of 1880 2052 2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe csc.exe PID 2052 wrote to memory of 1880 2052 2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe csc.exe PID 2052 wrote to memory of 1880 2052 2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe csc.exe PID 1880 wrote to memory of 1388 1880 csc.exe openwith.exe PID 1880 wrote to memory of 1388 1880 csc.exe openwith.exe PID 1880 wrote to memory of 1388 1880 csc.exe openwith.exe PID 1880 wrote to memory of 1388 1880 csc.exe openwith.exe PID 1880 wrote to memory of 1388 1880 csc.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2568
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-06_e069a1b373f66e021faef987be2c722e_icedid_rhadamanthys.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880
-