Analysis
-
max time kernel
94s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe
Resource
win10v2004-20240802-en
General
-
Target
ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe
-
Size
3.9MB
-
MD5
46cf6b1946429c912fe569ce4b5e8a10
-
SHA1
d7e0240a1a4d021800ccc9ace9fdb310ffa63052
-
SHA256
ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a
-
SHA512
29a1f0c35f6d8beaa3941c120d01b255933edc7b4b7c6f21267ce19d2678ee868ade3e2c1e476704a22acfc0a13b627c755ad474eb960a17cd7725665adeeacf
-
SSDEEP
98304:sfUbmfIe1hxCTvblT3gbG3WfaWLUMxSZNOWfhL:sfUyzSTBgyGslhL
Malware Config
Extracted
rhadamanthys
https://89.117.152.231:443/e0bd9c1f4515facb49/gj28n35o.2n73x
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
explorer.exedescription pid process target process PID 4632 created 2608 4632 explorer.exe sihost.exe -
Executes dropped EXE 3 IoCs
Processes:
ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exepythonw.exepythonw.exepid process 3172 ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe 5008 pythonw.exe 3612 pythonw.exe -
Loads dropped DLL 5 IoCs
Processes:
ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exepythonw.exepythonw.exepid process 3172 ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe 5008 pythonw.exe 5008 pythonw.exe 3612 pythonw.exe 3612 pythonw.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
pythonw.exedescription pid process target process PID 3612 set thread context of 3908 3612 pythonw.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exeea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.execmd.exeexplorer.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
pythonw.exepythonw.execmd.exeexplorer.exeopenwith.exepid process 5008 pythonw.exe 3612 pythonw.exe 3612 pythonw.exe 3908 cmd.exe 3908 cmd.exe 4632 explorer.exe 4632 explorer.exe 4964 openwith.exe 4964 openwith.exe 4964 openwith.exe 4964 openwith.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
pythonw.execmd.exepid process 3612 pythonw.exe 3908 cmd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exeea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exepythonw.exepythonw.execmd.exeexplorer.exedescription pid process target process PID 1436 wrote to memory of 3172 1436 ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe PID 1436 wrote to memory of 3172 1436 ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe PID 1436 wrote to memory of 3172 1436 ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe PID 3172 wrote to memory of 5008 3172 ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe pythonw.exe PID 3172 wrote to memory of 5008 3172 ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe pythonw.exe PID 5008 wrote to memory of 3612 5008 pythonw.exe pythonw.exe PID 5008 wrote to memory of 3612 5008 pythonw.exe pythonw.exe PID 3612 wrote to memory of 3908 3612 pythonw.exe cmd.exe PID 3612 wrote to memory of 3908 3612 pythonw.exe cmd.exe PID 3612 wrote to memory of 3908 3612 pythonw.exe cmd.exe PID 3612 wrote to memory of 3908 3612 pythonw.exe cmd.exe PID 3908 wrote to memory of 4632 3908 cmd.exe explorer.exe PID 3908 wrote to memory of 4632 3908 cmd.exe explorer.exe PID 3908 wrote to memory of 4632 3908 cmd.exe explorer.exe PID 3908 wrote to memory of 4632 3908 cmd.exe explorer.exe PID 4632 wrote to memory of 4964 4632 explorer.exe openwith.exe PID 4632 wrote to memory of 4964 4632 explorer.exe openwith.exe PID 4632 wrote to memory of 4964 4632 explorer.exe openwith.exe PID 4632 wrote to memory of 4964 4632 explorer.exe openwith.exe PID 4632 wrote to memory of 4964 4632 explorer.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2608
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe"C:\Users\Admin\AppData\Local\Temp\ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\Temp\{A88446E4-F711-4533-8646-37B8D05292D6}\.cr\ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe"C:\Windows\Temp\{A88446E4-F711-4533-8646-37B8D05292D6}\.cr\ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe" -burn.filehandle.attached=648 -burn.filehandle.self=5362⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\Temp\{C63AA5C2-6271-4922-9B71-E77D41CF9D47}\.ba\pythonw.exe"C:\Windows\Temp\{C63AA5C2-6271-4922-9B71-E77D41CF9D47}\.ba\pythonw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Roaming\vkb_wordpad_v2\pythonw.exeC:\Users\Admin\AppData\Roaming\vkb_wordpad_v2\pythonw.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4632
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5adaf005ab537f5c197118cc50cf4e647
SHA1ae7f1581491dcfeb10c006f1db11c2c2c245fd3b
SHA256aaa138125c86703d3e565e25337fb9b65d5dbeeefc23c46bedfffc551461068d
SHA512a3e3b7b0b022af5eb3390e1b3b1e35458b6da397b0cbaff06b419bedcdfbac3c4a8ed74c7bc5ca199c1d7891660e5252dc717672c37273a83e1f81cd5f0a0865
-
C:\Windows\Temp\{A88446E4-F711-4533-8646-37B8D05292D6}\.cr\ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a.exe
Filesize3.9MB
MD546cf6b1946429c912fe569ce4b5e8a10
SHA1d7e0240a1a4d021800ccc9ace9fdb310ffa63052
SHA256ea08a3b22d711a703d4932a3f0fb693d6faadbd6ad5d87ec7938784c36fb553a
SHA51229a1f0c35f6d8beaa3941c120d01b255933edc7b4b7c6f21267ce19d2678ee868ade3e2c1e476704a22acfc0a13b627c755ad474eb960a17cd7725665adeeacf
-
Filesize
1.1MB
MD575b33115ef399463ee76b3421add1ea1
SHA11661b9acf1da0aca0c53fee71e5b2394c7c3320d
SHA25697b3113d73a62755cd99fac73eadb311d1204e6ec1034a85a585955e202e1132
SHA512fe86854113de67844fd92904ec8d9468f031ea40bbfd38df79d63ce53bc6e95a0ab5f444b4b85cd9a3c2ac264552366ef7148a8b30a09e8c1b95eb949061ddfc
-
Filesize
953KB
MD5e238ccd9fd17fb0007b0b033fcfdad41
SHA167f3a4e518be8cc306242f584197deac8cf12534
SHA256e6275bb0a6bb6fe4eb16d10dc91494535577689d68ff9301ef8471a4277dc552
SHA512fa439bcbb6956bba23cd702167ea2981dc63d7da1287b64ae8fa39606c1ade752a7e04377325d93a2b76e9c7bf4804e5c739a184fef7e906bcd98f8160436d5c
-
Filesize
4.3MB
MD5c67e805577c808d1b2e63bcc875a6e0c
SHA104405071881e4d7b9dae6a8e4f5cb94a69354ecd
SHA256c1d822a1cd0d204d782d5d5627875608a5acb2008fbfd2346af4f63243e87a40
SHA512c17febfe45642bb125b1a80a9e2447b25152ce32034b46d1e8dfa74396e51e3c83fb3f844a3814138b308131292884a104afbc5a2262816bd682d6beca142599
-
Filesize
94KB
MD59a4cc0d8e7007f7ef20ca585324e0739
SHA1f3e5a2e477cac4bab85940a2158eed78f2d74441
SHA256040d121a3179f49cd3f33f4bc998bc8f78b7f560bfd93f279224d69e76a06e92
SHA51254636a48141804112f5b4f2fc70cb7c959a041e5743aeedb5184091b51daa1d1a03f0016e8299c0d56d924c6c8ae585e4fc864021081ffdf1e6f3eab11dd43b3
-
Filesize
83KB
MD58ca8f54b226bfcfa9c2c965c25247a45
SHA1cb7950efc08e1bc279afb92a8a2173782f34deea
SHA256a9ccf11b8f6bcedff1b7d4eea4d4b2122f7e5ecac119617d0596b92c4ed5aeeb
SHA512d386e769d2a00b3344574e6a251c360d3ec8aa6d7747be19e34deeb57fcb440b24c4fe8b3c0fdc84c99fa4c6e32eb87f4d06ee756fc4e578ca1c9fc32a2e2dbe
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d