Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe
Resource
win10v2004-20240802-en
General
-
Target
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe
-
Size
1.7MB
-
MD5
e069a1b373f66e021faef987be2c722e
-
SHA1
2ea59a8dfb60b51e2b786d71bbfcb6bb5f474744
-
SHA256
235dc83b3a2b765e12e26960b6b90a2fbc7097d4bfb991118139d53fbfd12705
-
SHA512
0ed23250b31fa506a520ac2e709f2db319b2c9d31c64f3bf5ec399a7d0345b7b30279962f3408c8f398ad89896e206d54520a9809f0569f43e4b86b941f8f4cc
-
SSDEEP
49152:fdifhbdWza1F5YeEpoAXg7Cn5BJlT+Qr/FHwf0:f4pbMO1HYeEyAjB6gQf0
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
csc.exedescription pid Process procid_target PID 2300 created 3016 2300 csc.exe 50 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AgentLauncher = "C:\\Users\\Admin\\Pictures\\ClientAgent\\AgentLauncher.exe" 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exedescription pid Process procid_target PID 2568 set thread context of 2300 2568 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.execsc.exeopenwith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
csc.exeopenwith.exepid Process 2300 csc.exe 2300 csc.exe 2824 openwith.exe 2824 openwith.exe 2824 openwith.exe 2824 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.execsc.exedescription pid Process procid_target PID 2568 wrote to memory of 2300 2568 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe 101 PID 2568 wrote to memory of 2300 2568 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe 101 PID 2568 wrote to memory of 2300 2568 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe 101 PID 2568 wrote to memory of 2300 2568 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe 101 PID 2568 wrote to memory of 2300 2568 20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe 101 PID 2300 wrote to memory of 2824 2300 csc.exe 102 PID 2300 wrote to memory of 2824 2300 csc.exe 102 PID 2300 wrote to memory of 2824 2300 csc.exe 102 PID 2300 wrote to memory of 2824 2300 csc.exe 102 PID 2300 wrote to memory of 2824 2300 csc.exe 102
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3016
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe"C:\Users\Admin\AppData\Local\Temp\20240906e069a1b373f66e021faef987be2c722eicedidrhadamanthys.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=1320 /prefetch:81⤵PID:4472