Analysis
-
max time kernel
14s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
submitted
03-10-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
Oxfvbxp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Oxfvbxp.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Oxfvbxp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Oxfvbxp.exe
Resource
win11-20240802-en
General
-
Target
Oxfvbxp.exe
-
Size
2.9MB
-
MD5
53218d44298f406baefb2fd052eeb0ef
-
SHA1
afc422b48b829f29ee2cb95eb9d5139b788a1727
-
SHA256
11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b
-
SHA512
88b81da7e8d3665b0a41cd272c50318b8090dc3240d88020255f079df1373e2cf5fb9f0249320fb7346a52a29d20de42a4385f75e1cf91a12aa40786eae1a12a
-
SSDEEP
49152:zT8+dJPn7Vud6KGavAZXJgfx1HmwPKtWKbF1mIgZ+wau1CObHeIp3hPI4OH+Mfsk:38ROupbHeI7gf+MfA
Malware Config
Extracted
rhadamanthys
https://185.209.161.207:2421/44194499adc4d2b753ee/bduh0f2e.ee92s
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3952 created 692 3952 Oxfvbxp.exe 50 -
Program crash 2 IoCs
pid pid_target Process procid_target 3224 3952 WerFault.exe 78 4948 3952 WerFault.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oxfvbxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oxfvbxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3952 Oxfvbxp.exe 3952 Oxfvbxp.exe 4664 openwith.exe 4664 openwith.exe 4664 openwith.exe 4664 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2684 wrote to memory of 3952 2684 Oxfvbxp.exe 78 PID 2684 wrote to memory of 3952 2684 Oxfvbxp.exe 78 PID 2684 wrote to memory of 3952 2684 Oxfvbxp.exe 78 PID 2684 wrote to memory of 3952 2684 Oxfvbxp.exe 78 PID 2684 wrote to memory of 3952 2684 Oxfvbxp.exe 78 PID 3952 wrote to memory of 4664 3952 Oxfvbxp.exe 79 PID 3952 wrote to memory of 4664 3952 Oxfvbxp.exe 79 PID 3952 wrote to memory of 4664 3952 Oxfvbxp.exe 79 PID 3952 wrote to memory of 4664 3952 Oxfvbxp.exe 79 PID 3952 wrote to memory of 4664 3952 Oxfvbxp.exe 79
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:692
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\Oxfvbxp.exe"C:\Users\Admin\AppData\Local\Temp\Oxfvbxp.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Oxfvbxp.exe"C:\Users\Admin\AppData\Local\Temp\Oxfvbxp.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 4483⤵
- Program crash
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 4643⤵
- Program crash
PID:4948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3952 -ip 39521⤵PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3952 -ip 39521⤵PID:2696