Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe
Resource
win10v2004-20240910-en
General
-
Target
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe
-
Size
728KB
-
MD5
60651e87f3bd6f784d3bf664db97cbc0
-
SHA1
f204f9211e3cda4466da91df4c140651f5d8e8ea
-
SHA256
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2
-
SHA512
b1606ffa239d4f8122fa65c4a2fa6de7565fc9e94227e6c064bbf8fca0ef1aca96857de27e02b341f40437c278ab70b52fb6d013b467e9dd1a03e3c35596c936
-
SSDEEP
12288:kAHV6q6VzPbFqd/dpdxblSteyD9gL4NSAo00VUYZhPdzWzThyrnS/mbD/HT:/V67VTbFodp/xSbgT2Oh1zWzcrnS/
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exedescription pid Process procid_target PID 840 created 1192 840 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe 21 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exedialer.exepid Process 840 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe 840 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe 2964 dialer.exe 2964 dialer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exedescription pid Process procid_target PID 840 wrote to memory of 2964 840 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe 30 PID 840 wrote to memory of 2964 840 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe 30 PID 840 wrote to memory of 2964 840 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe 30 PID 840 wrote to memory of 2964 840 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe 30 PID 840 wrote to memory of 2964 840 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe"C:\Users\Admin\AppData\Local\Temp\06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:840
-
-
C:\Windows\system32\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-