Analysis
-
max time kernel
94s -
max time network
205s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-09-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
sistercompetitive.exe
Resource
win11-20240802-en
General
-
Target
sistercompetitive.exe
-
Size
7.3MB
-
MD5
b6798b22a6a137c247daa62fe852d953
-
SHA1
597e7265d7918556c1d019d58ceadd504f48a854
-
SHA256
471c981c11df004b941dad0175bc435f9c901bcb968ba9582f1a2181443d9ef4
-
SHA512
a31b751173dbf50ec728d7f031c1d22de5e66120e8852110253071669f58a36b28c8769f9e8cebc88aa317348069bc7122842f428ccc643758a6e082218019b7
-
SSDEEP
196608:dKtszGClpkmagqf/SLC+FPTgw0DrCy+QWH6b9f5aEy:YIlpkSX/F8ayew
Malware Config
Extracted
rhadamanthys
https://45.202.35.41:2085/498d0f4cfcafbce1543c5cc/10m$
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
AddInProcess32.exedescription pid process target process PID 2904 created 2680 2904 AddInProcess32.exe sihost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sistercompetitive.exedescription pid process target process PID 2052 set thread context of 2904 2052 sistercompetitive.exe AddInProcess32.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4824 2904 WerFault.exe AddInProcess32.exe 1104 2904 WerFault.exe AddInProcess32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
sistercompetitive.exeAddInProcess32.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sistercompetitive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
sistercompetitive.exeAddInProcess32.exeopenwith.exepid process 2052 sistercompetitive.exe 2052 sistercompetitive.exe 2052 sistercompetitive.exe 2904 AddInProcess32.exe 2904 AddInProcess32.exe 872 openwith.exe 872 openwith.exe 872 openwith.exe 872 openwith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
sistercompetitive.exedescription pid process Token: SeDebugPrivilege 2052 sistercompetitive.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
sistercompetitive.exeAddInProcess32.exedescription pid process target process PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2052 wrote to memory of 2904 2052 sistercompetitive.exe AddInProcess32.exe PID 2904 wrote to memory of 872 2904 AddInProcess32.exe openwith.exe PID 2904 wrote to memory of 872 2904 AddInProcess32.exe openwith.exe PID 2904 wrote to memory of 872 2904 AddInProcess32.exe openwith.exe PID 2904 wrote to memory of 872 2904 AddInProcess32.exe openwith.exe PID 2904 wrote to memory of 872 2904 AddInProcess32.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2680
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\sistercompetitive.exe"C:\Users\Admin\AppData\Local\Temp\sistercompetitive.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 4723⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 4683⤵
- Program crash
PID:1104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2904 -ip 29041⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2904 -ip 29041⤵PID:5100