Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 18:34
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
355KB
-
MD5
8da6d3f4326ca248d0a99d21d2d8b135
-
SHA1
45872803f6ccfb405b4383d079c79eff87a3c9c0
-
SHA256
95897f8814e4c651671799af51c40fbe0a2334827683c82640627e270c57d9d7
-
SHA512
f1a3f3c3dd87694bd0792e3325887fba197f73f3eaf51bd94ddfc86582eba8539177797fca4d7a7701e2baa541f98043e37925fed08c6de70401d6cad9d69eb2
-
SSDEEP
6144:g2qezd2ab1/RuHk+M3k8M3W7XomjOJCqshrOlumY6DMIewgxQfq1sb:gf2R/EEkCQFYDwRqa
Malware Config
Extracted
rhadamanthys
https://94.131.99.108:8899/e2eb98731b48eb55a/b8fkfuft.w7s34
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
file.exedescription pid process target process PID 2356 created 1212 2356 file.exe Explorer.EXE -
Deletes itself 1 IoCs
Processes:
dialer.exepid process 2424 dialer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dialer.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
file.exedialer.exepid process 2356 file.exe 2356 file.exe 2424 dialer.exe 2424 dialer.exe 2424 dialer.exe 2424 dialer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
file.exedescription pid process target process PID 2356 wrote to memory of 2424 2356 file.exe dialer.exe PID 2356 wrote to memory of 2424 2356 file.exe dialer.exe PID 2356 wrote to memory of 2424 2356 file.exe dialer.exe PID 2356 wrote to memory of 2424 2356 file.exe dialer.exe PID 2356 wrote to memory of 2424 2356 file.exe dialer.exe PID 2356 wrote to memory of 2424 2356 file.exe dialer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2424
-