Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe
Resource
win10v2004-20240802-en
General
-
Target
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe
-
Size
1.7MB
-
MD5
e069a1b373f66e021faef987be2c722e
-
SHA1
2ea59a8dfb60b51e2b786d71bbfcb6bb5f474744
-
SHA256
235dc83b3a2b765e12e26960b6b90a2fbc7097d4bfb991118139d53fbfd12705
-
SHA512
0ed23250b31fa506a520ac2e709f2db319b2c9d31c64f3bf5ec399a7d0345b7b30279962f3408c8f398ad89896e206d54520a9809f0569f43e4b86b941f8f4cc
-
SSDEEP
49152:fdifhbdWza1F5YeEpoAXg7Cn5BJlT+Qr/FHwf0:f4pbMO1HYeEyAjB6gQf0
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
csc.exedescription pid process target process PID 3064 created 1212 3064 csc.exe Explorer.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\AgentLauncher = "C:\\Users\\Admin\\Pictures\\ClientAgent\\AgentLauncher.exe" 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exedescription pid process target process PID 2884 set thread context of 3064 2884 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe csc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.execsc.exedialer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
csc.exedialer.exepid process 3064 csc.exe 3064 csc.exe 2588 dialer.exe 2588 dialer.exe 2588 dialer.exe 2588 dialer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.execsc.exedescription pid process target process PID 2884 wrote to memory of 3064 2884 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe csc.exe PID 2884 wrote to memory of 3064 2884 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe csc.exe PID 2884 wrote to memory of 3064 2884 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe csc.exe PID 2884 wrote to memory of 3064 2884 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe csc.exe PID 2884 wrote to memory of 3064 2884 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe csc.exe PID 2884 wrote to memory of 3064 2884 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe csc.exe PID 3064 wrote to memory of 2588 3064 csc.exe dialer.exe PID 3064 wrote to memory of 2588 3064 csc.exe dialer.exe PID 3064 wrote to memory of 2588 3064 csc.exe dialer.exe PID 3064 wrote to memory of 2588 3064 csc.exe dialer.exe PID 3064 wrote to memory of 2588 3064 csc.exe dialer.exe PID 3064 wrote to memory of 2588 3064 csc.exe dialer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe"C:\Users\Admin\AppData\Local\Temp\20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2588
-