Analysis
-
max time kernel
92s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
Software_Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Software_Setup.exe
Resource
win10v2004-20240802-en
General
-
Target
Software_Setup.exe
-
Size
74.9MB
-
MD5
707c20a0de59fe418045e8cb90e4e8f9
-
SHA1
a1404eb652921a2808781cf09daecc363dbf5010
-
SHA256
589b622872cef5c5ca4af70a9bba031ee462e555e83213bd73c7511af550e417
-
SHA512
de4f99b62cd02d02cb4f4ebc65078860a6c43293f1b9f1e2e88caf7ceb8c6b690b6adcca013568e721b4986a068ac22c51a20499d6f41c1fa8ab5b3030754269
-
SSDEEP
1572864:Whw53fhw53fhw53fhw53fhw53fhw53fhw53:beeeeee
Malware Config
Extracted
rhadamanthys
https://185.184.26.10:4928/e4eb12414c95175ccfd/Other4
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
winhlp32.exedescription pid Process procid_target PID 4200 created 2636 4200 winhlp32.exe 44 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Software_Setup.exedescription pid Process procid_target PID 748 set thread context of 4200 748 Software_Setup.exe 86 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 2692 4200 WerFault.exe 86 1912 4200 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Software_Setup.exewinhlp32.exeopenwith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Software_Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winhlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
winhlp32.exeopenwith.exepid Process 4200 winhlp32.exe 4200 winhlp32.exe 828 openwith.exe 828 openwith.exe 828 openwith.exe 828 openwith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Software_Setup.exewinhlp32.exedescription pid Process procid_target PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 748 wrote to memory of 4200 748 Software_Setup.exe 86 PID 4200 wrote to memory of 828 4200 winhlp32.exe 91 PID 4200 wrote to memory of 828 4200 winhlp32.exe 91 PID 4200 wrote to memory of 828 4200 winhlp32.exe 91 PID 4200 wrote to memory of 828 4200 winhlp32.exe 91 PID 4200 wrote to memory of 828 4200 winhlp32.exe 91
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2636
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\Software_Setup.exe"C:\Users\Admin\AppData\Local\Temp\Software_Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 4363⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 4683⤵
- Program crash
PID:1912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4200 -ip 42001⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4200 -ip 42001⤵PID:4040