Behavioral task
behavioral1
Sample
528f6c8f0c5d2399ea77e134bb4b4ab72883b4a8abe45e51dcef0e4abce0ce7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
528f6c8f0c5d2399ea77e134bb4b4ab72883b4a8abe45e51dcef0e4abce0ce7e.exe
Resource
win10v2004-20240802-en
General
-
Target
528f6c8f0c5d2399ea77e134bb4b4ab72883b4a8abe45e51dcef0e4abce0ce7e.exe
-
Size
448KB
-
MD5
3b2ed8806b436e170c3576b528635a46
-
SHA1
64ff3f68fd0d657cd8bd4a8088d211f58c32a96d
-
SHA256
528f6c8f0c5d2399ea77e134bb4b4ab72883b4a8abe45e51dcef0e4abce0ce7e
-
SHA512
9a9995d92211969e54b93b013c282c51022cfdba25fb0b583730c662d254fdf29767dee8da28026a5f75ac0e9975e5c7389e6437b464217623a9dc28aa9f0bb9
-
SSDEEP
6144:nC5hyUR+MhyfUj6qfoEXYfIrvQ/zabJzYbLkBWBXpMcwLbjJgSqtUg83T36XE24r:v+BoEmID/mQmpMcmSSIU16XE2e5L
Malware Config
Extracted
rhadamanthys
https://deadmunky.nl:5403/68efc67ee981034e6b329438/4erkxm8j.nrqet
Signatures
-
Rhadamanthys family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 528f6c8f0c5d2399ea77e134bb4b4ab72883b4a8abe45e51dcef0e4abce0ce7e.exe
Files
-
528f6c8f0c5d2399ea77e134bb4b4ab72883b4a8abe45e51dcef0e4abce0ce7e.exe.exe windows:5 windows x86 arch:x86
55ad6bfe47219bd08f4db9b7b6e7d559
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetModuleHandleA
CreateEventA
WaitForSingleObject
CloseHandle
HeapDestroy
GetModuleFileNameW
lstrlenW
HeapFree
MulDiv
GetProcessHeap
HeapAlloc
GetStartupInfoA
user32
GetScrollRange
GetClassInfoExW
GetClassInfoW
FillRect
CharUpperBuffW
DispatchMessageW
KillTimer
EndMenu
PeekMessageW
EndPaint
FrameRect
IsIconic
LoadBitmapW
GetWindowTextW
DestroyWindow
SetScrollPos
DrawMenuBar
GetMenuStringW
DrawIcon
GetClientRect
BeginPaint
DeleteMenu
LoadIconW
CopyImage
ShowCaret
DefFrameProcW
LoadCursorW
RegisterClassW
SetTimer
GetDCEx
CreateMenu
IsZoomed
DrawFocusRect
GetSystemMenu
GetScrollPos
CreateWindowExW
GetMenuItemInfoW
DestroyMenu
GetCursor
DefMDIChildProcW
ReleaseDC
GetScrollInfo
DestroyCursor
EnableWindow
ShowWindow
CreateAcceleratorTableW
InsertMenuW
GetDlgCtrlID
SetMenuItemInfoW
CreateIcon
gdi32
RestoreDC
Polygon
MoveToEx
CreateICW
RectVisible
CreatePalette
GetTextMetricsW
PolyBezierTo
SetRectRgn
CreateDCW
GetWindowOrgEx
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
oleaut32
SafeArrayCreate
SafeArrayAccessData
VariantChangeType
SysFreeString
SysAllocStringLen
SafeArrayGetUBound
SafeArrayUnaccessData
SafeArrayGetElement
GetErrorInfo
VariantInit
SysReAllocStringLen
VariantCopy
SafeArrayPtrOfIndex
SafeArrayGetLBound
VariantCopyInd
SafeArrayPutElement
VariantClear
msvcrt
__p__fmode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
memcpy
qsort
wcsrchr
memset
wcschr
__set_app_type
_except_handler3
_controlfp
__p__commode
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 385KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ