Behavioral task
behavioral1
Sample
34918278f6eb6b5e3afa8da406eb3c5a4cc3b7c4a1cee55320fecdbef4e0a463.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
34918278f6eb6b5e3afa8da406eb3c5a4cc3b7c4a1cee55320fecdbef4e0a463.exe
Resource
win10v2004-20240802-en
General
-
Target
34918278f6eb6b5e3afa8da406eb3c5a4cc3b7c4a1cee55320fecdbef4e0a463.exe
-
Size
438KB
-
MD5
ec0f07cb1f1f5b4dd1bd94958c20a5ad
-
SHA1
84718efb03c2ae32aa2c5800bf135f97275f9a74
-
SHA256
34918278f6eb6b5e3afa8da406eb3c5a4cc3b7c4a1cee55320fecdbef4e0a463
-
SHA512
58af6d13d8c43970cc9e964f8418ecb054e177d40f966d2d9e318f540370d219028c4694daf09ba8b101206d54b482f66ce3a2b29ec4716119a21644a899f3d7
-
SSDEEP
12288:6uZZani4FaYkizhRpfX54K+uiE8XZzhzJ:6+ZIi4Z95/54K+uiE8Jd
Malware Config
Extracted
rhadamanthys
https://deadmunky.nl:3715/b607677f1d5be7bf651f2/q1bwmeni.33ap7
Signatures
-
Rhadamanthys family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 34918278f6eb6b5e3afa8da406eb3c5a4cc3b7c4a1cee55320fecdbef4e0a463.exe
Files
-
34918278f6eb6b5e3afa8da406eb3c5a4cc3b7c4a1cee55320fecdbef4e0a463.exe.exe windows:6 windows x64 arch:x64
d7fa2572888c8bf82e5ce063fb4df4c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LCMapStringW
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FindClose
GetModuleHandleExW
TerminateProcess
ExitProcess
GetCurrentProcess
WriteFile
GetStdHandle
RaiseException
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CreateFileW
WriteConsoleW
lstrlenW
GetModuleHandleA
GetModuleFileNameW
CreateEventA
WaitForSingleObject
GetProcessHeap
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
FindNextFileW
CloseHandle
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
RtlUnwindEx
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
user32
GetClassInfoW
DeleteMenu
DefMDIChildProcW
CharUpperBuffW
SetMenuItemInfoW
GetDlgCtrlID
DispatchMessageW
GetDCEx
GetClassInfoExW
ShowWindow
DestroyWindow
IsDialogMessageW
LoadCursorW
CreateAcceleratorTableW
PeekMessageW
CreateWindowExW
RegisterClassW
IsIconic
GetSystemMenu
EnableWindow
FrameRect
LoadStringW
IsZoomed
LoadBitmapW
GetMenuItemInfoW
MsgWaitForMultipleObjectsEx
GetCursor
ShowCaret
PostMessageW
CreateIcon
GetClientRect
GetWindowTextW
CreateMenu
DrawMenuBar
CopyImage
FillRect
DefFrameProcW
EndPaint
GetScrollPos
SetScrollPos
GetMenuStringW
DestroyIcon
DrawFocusRect
BeginPaint
ReleaseDC
KillTimer
EndMenu
InsertMenuW
DestroyCursor
SetTimer
GetScrollInfo
DestroyMenu
GetScrollRange
LoadIconW
DrawIcon
gdi32
GetEnhMetaFileHeader
CreateCompatibleBitmap
Polygon
SetAbortProc
RectVisible
SetBkMode
CreateICW
CreateSolidBrush
PolyBezierTo
RoundRect
SetTextColor
CreateDCW
GetWindowOrgEx
RestoreDC
StretchBlt
CreatePalette
MoveToEx
SetRectRgn
AngleArc
GetTextMetricsW
Pie
GetStockObject
ole32
CoTaskMemFree
IsEqualGUID
CoUninitialize
CoInitialize
OleInitialize
CoTaskMemAlloc
OleUninitialize
CoCreateInstance
oleaut32
SysFreeString
SafeArrayGetElement
SafeArrayCreate
SafeArrayPtrOfIndex
GetErrorInfo
SafeArrayGetUBound
SysAllocStringLen
VariantCopyInd
SysReAllocStringLen
SafeArrayPutElement
VariantInit
SafeArrayGetLBound
VariantClear
VariantChangeType
SafeArrayAccessData
SafeArrayUnaccessData
VariantCopy
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 384KB - Virtual size: 383KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ