Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe
Resource
win10v2004-20240802-en
General
-
Target
7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe
-
Size
433KB
-
MD5
349b89ff3521783e73e6a295f8a71390
-
SHA1
20467d6394a5dd6434821eedccad864aa99e1920
-
SHA256
7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527d
-
SHA512
99c13a479b6c7de56edb261d0e4e3dd0600744b58efd5ee63e05233b37b32d52c131747d6db90f6e1a49f2d8449a1b8cc038cfcda41e3207dfe05edeb881cebb
-
SSDEEP
12288:QUjHlz/bcPwpRa//b1lgtYSXKbP5MHZRTpE/JZu:njH5/APwpQDQ+S6b5EMa
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/q4cs18w4.g9muv
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exedescription pid process target process PID 2660 set thread context of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2560 2772 WerFault.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RegAsm.exe7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exeRegAsm.exedescription pid process target process PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2660 wrote to memory of 2772 2660 7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe RegAsm.exe PID 2772 wrote to memory of 2560 2772 RegAsm.exe WerFault.exe PID 2772 wrote to memory of 2560 2772 RegAsm.exe WerFault.exe PID 2772 wrote to memory of 2560 2772 RegAsm.exe WerFault.exe PID 2772 wrote to memory of 2560 2772 RegAsm.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe"C:\Users\Admin\AppData\Local\Temp\7797043f27b315e0f46bc060b79ffa53c6e16c625112437f06e21e1514a1527dN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 2523⤵
- Program crash
PID:2560
-
-