Analysis
-
max time kernel
94s -
max time network
205s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-09-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
sistercompetitive.exe
Resource
win11-20240802-en
General
-
Target
sistercompetitive.exe
-
Size
7.3MB
-
MD5
b6798b22a6a137c247daa62fe852d953
-
SHA1
597e7265d7918556c1d019d58ceadd504f48a854
-
SHA256
471c981c11df004b941dad0175bc435f9c901bcb968ba9582f1a2181443d9ef4
-
SHA512
a31b751173dbf50ec728d7f031c1d22de5e66120e8852110253071669f58a36b28c8769f9e8cebc88aa317348069bc7122842f428ccc643758a6e082218019b7
-
SSDEEP
196608:dKtszGClpkmagqf/SLC+FPTgw0DrCy+QWH6b9f5aEy:YIlpkSX/F8ayew
Malware Config
Extracted
rhadamanthys
https://45.202.35.41:2085/498d0f4cfcafbce1543c5cc/10m$
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2904 created 2680 2904 AddInProcess32.exe 46 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2052 set thread context of 2904 2052 sistercompetitive.exe 79 -
Program crash 2 IoCs
pid pid_target Process procid_target 4824 2904 WerFault.exe 79 1104 2904 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sistercompetitive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2052 sistercompetitive.exe 2052 sistercompetitive.exe 2052 sistercompetitive.exe 2904 AddInProcess32.exe 2904 AddInProcess32.exe 872 openwith.exe 872 openwith.exe 872 openwith.exe 872 openwith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2052 sistercompetitive.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe 79 PID 2904 wrote to memory of 872 2904 AddInProcess32.exe 80 PID 2904 wrote to memory of 872 2904 AddInProcess32.exe 80 PID 2904 wrote to memory of 872 2904 AddInProcess32.exe 80 PID 2904 wrote to memory of 872 2904 AddInProcess32.exe 80 PID 2904 wrote to memory of 872 2904 AddInProcess32.exe 80
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2680
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\sistercompetitive.exe"C:\Users\Admin\AppData\Local\Temp\sistercompetitive.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 4723⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 4683⤵
- Program crash
PID:1104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2904 -ip 29041⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2904 -ip 29041⤵PID:5100