Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe
Resource
win10v2004-20240802-en
General
-
Target
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe
-
Size
728KB
-
MD5
60651e87f3bd6f784d3bf664db97cbc0
-
SHA1
f204f9211e3cda4466da91df4c140651f5d8e8ea
-
SHA256
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2
-
SHA512
b1606ffa239d4f8122fa65c4a2fa6de7565fc9e94227e6c064bbf8fca0ef1aca96857de27e02b341f40437c278ab70b52fb6d013b467e9dd1a03e3c35596c936
-
SSDEEP
12288:kAHV6q6VzPbFqd/dpdxblSteyD9gL4NSAo00VUYZhPdzWzThyrnS/mbD/HT:/V67VTbFodp/xSbgT2Oh1zWzcrnS/
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exedescription pid Process procid_target PID 1680 created 1284 1680 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe 21 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exedialer.exepid Process 1680 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe 1680 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe 2552 dialer.exe 2552 dialer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exedescription pid Process procid_target PID 1680 wrote to memory of 2552 1680 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe 30 PID 1680 wrote to memory of 2552 1680 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe 30 PID 1680 wrote to memory of 2552 1680 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe 30 PID 1680 wrote to memory of 2552 1680 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe 30 PID 1680 wrote to memory of 2552 1680 06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe"C:\Users\Admin\AppData\Local\Temp\06d660e97abae29a8e53ef539f0a88250e647899e1baf5a09cec3fe51dfdb7b2N.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680
-
-
C:\Windows\system32\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-