Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 09:29
Static task
static1
Behavioral task
behavioral1
Sample
SetLoader.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
SetLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
SetLoader.exe
-
Size
5.1MB
-
MD5
53c7101148e18f8d51a0951367d685af
-
SHA1
c402d153e5aaab6f29c5b272e38947b17c30da13
-
SHA256
5e4c3ede27f4b698191b7d8e27c58c5e23e15acaf97fc1c18f8a94208ff8d837
-
SHA512
e3df50a26d593d99387cfa367ac84d651198ab3a13a299484fe5354561723f8b97a1658636990bfd68785a809722c5bd14ac32917b1669204f6621a55ad3ea86
-
SSDEEP
98304:bjlp/LZZcJZn+EDfx0Ew1SWuiBdOpNT4ggxwzwIPFiAOZBv15HWLZOVK73wuB0is:bjnenPf/sBfdOptexYnCZD52L+9EI1
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
SetLoader.exedescription pid process target process PID 2304 created 1180 2304 SetLoader.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
SetLoader.exedialer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
SetLoader.exedialer.exepid process 2304 SetLoader.exe 2304 SetLoader.exe 2304 SetLoader.exe 1176 dialer.exe 1176 dialer.exe 1176 dialer.exe 1176 dialer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SetLoader.exedescription pid process target process PID 2304 wrote to memory of 1176 2304 SetLoader.exe dialer.exe PID 2304 wrote to memory of 1176 2304 SetLoader.exe dialer.exe PID 2304 wrote to memory of 1176 2304 SetLoader.exe dialer.exe PID 2304 wrote to memory of 1176 2304 SetLoader.exe dialer.exe PID 2304 wrote to memory of 1176 2304 SetLoader.exe dialer.exe PID 2304 wrote to memory of 1176 2304 SetLoader.exe dialer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\SetLoader.exe"C:\Users\Admin\AppData\Local\Temp\SetLoader.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1176
-