Analysis
-
max time kernel
90s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
Installer/Installer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Installer/Installer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Installer/msvcp140.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Installer/msvcp140.dll
Resource
win10v2004-20240802-en
General
-
Target
Installer/Installer.exe
-
Size
227KB
-
MD5
b588f677ab42fdf4fb540d399e0c822d
-
SHA1
8a23270696d6dc4e92c3afd515ba19fe8fc4bd3e
-
SHA256
6c5af52675bd86c04c858774dfaecb12d67cbb492b5835ccfb6a41f7e594e3c0
-
SHA512
3b7ae452c5f7f203135ff382b5d6e8790221538c086934a5857b1819e1aec19d5955a916ea3fbfaa1925b58ac0584412c050c618c5f63171547d4af0c9a27bd7
-
SSDEEP
3072:PNGh0Mfkarr8cMvFBRqAlvdfcVfw6r4OlqJslIFdATelkIZch+5rixPZad:PN5Mf3pMvRvl0VfLtiF9lzZcU
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/0frouaxb.8xg7f
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4364 created 2116 4364 aspnet_regiis.exe 51 -
Loads dropped DLL 1 IoCs
pid Process 4868 Installer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4868 set thread context of 4364 4868 Installer.exe 85 -
Program crash 2 IoCs
pid pid_target Process procid_target 2424 4364 WerFault.exe 85 5036 4364 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4364 aspnet_regiis.exe 4364 aspnet_regiis.exe 1760 openwith.exe 1760 openwith.exe 1760 openwith.exe 1760 openwith.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4868 wrote to memory of 4364 4868 Installer.exe 85 PID 4364 wrote to memory of 1760 4364 aspnet_regiis.exe 86 PID 4364 wrote to memory of 1760 4364 aspnet_regiis.exe 86 PID 4364 wrote to memory of 1760 4364 aspnet_regiis.exe 86 PID 4364 wrote to memory of 1760 4364 aspnet_regiis.exe 86 PID 4364 wrote to memory of 1760 4364 aspnet_regiis.exe 86
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2116
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\Installer\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer\Installer.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 4243⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 4403⤵
- Program crash
PID:5036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4364 -ip 43641⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4364 -ip 43641⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
729KB
MD5351c51206a136e8e3224579b50d5ff3c
SHA18683cef48ad78e150dfb290c65188f4b9a5100a8
SHA256a14e7251adaa163f527e4f45471b4649af25856ecce2f90d2544e69773b69a8a
SHA51253e9e6c02d0f7370ca0743783b933936825ea7a690aaf40c64a0b2b6f7983dd196053c06c94470eac11f6ede50204c80d448edf42877722936338cfc98122b5d