Analysis

  • max time kernel
    132s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-09-2024 09:12

General

  • Target

    exe_unpacked.exe

  • Size

    355KB

  • MD5

    5f54a6ca1c53aa63bd083c3a5e24569b

  • SHA1

    7b0e3f1b7572569a0f5473cc3bbdbe0122a9616c

  • SHA256

    cc8b0af0cd9c2a09c33e266729d526f64e147901710140596942726c68ca820f

  • SHA512

    80c97da20b7ff87460973a2dac8ab8b4d44fea1c26f81ad48936bfdb72c30a0c6174154aff1533ad4d2d806d7adcd06d164bea67ffdeb0c39978131841efe39b

  • SSDEEP

    6144:g2qezd2ab1/RuHk+M3k8M3W7XomjOJCqshrOlumY6DMIewgxQfqJsb:gf2R/EEkCQFYDwRq+

Malware Config

Extracted

Family

rhadamanthys

C2

https://deadmunky.nl:5403/68efc67ee981034e6b329438/h7bgh43h.758up

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • c:\windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3136
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:224
    • C:\Users\Admin\AppData\Local\Temp\exe_unpacked.exe
      "C:\Users\Admin\AppData\Local\Temp\exe_unpacked.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:60

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/60-6-0x00007FFC61BA1000-0x00007FFC61CAF000-memory.dmp

      Filesize

      1.1MB

    • memory/60-0-0x0000000001220000-0x000000000128D000-memory.dmp

      Filesize

      436KB

    • memory/60-3-0x0000000004130000-0x0000000004530000-memory.dmp

      Filesize

      4.0MB

    • memory/60-2-0x0000000004130000-0x0000000004530000-memory.dmp

      Filesize

      4.0MB

    • memory/60-4-0x00007FFC61BA0000-0x00007FFC61D7B000-memory.dmp

      Filesize

      1.9MB

    • memory/60-5-0x0000000004130000-0x0000000004530000-memory.dmp

      Filesize

      4.0MB

    • memory/60-1-0x0000000004130000-0x0000000004530000-memory.dmp

      Filesize

      4.0MB

    • memory/60-8-0x0000000076030000-0x00000000761F2000-memory.dmp

      Filesize

      1.8MB

    • memory/60-10-0x0000000001220000-0x000000000128D000-memory.dmp

      Filesize

      436KB

    • memory/224-12-0x0000000003FE0000-0x00000000043E0000-memory.dmp

      Filesize

      4.0MB

    • memory/224-9-0x00000000003A0000-0x00000000003A9000-memory.dmp

      Filesize

      36KB

    • memory/224-16-0x0000000076030000-0x00000000761F2000-memory.dmp

      Filesize

      1.8MB

    • memory/224-17-0x00007FFC61BA0000-0x00007FFC61D7B000-memory.dmp

      Filesize

      1.9MB

    • memory/224-13-0x00007FFC61BA0000-0x00007FFC61D7B000-memory.dmp

      Filesize

      1.9MB