Analysis
-
max time kernel
95s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe
Resource
win10v2004-20240802-en
General
-
Target
11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe
-
Size
2.9MB
-
MD5
53218d44298f406baefb2fd052eeb0ef
-
SHA1
afc422b48b829f29ee2cb95eb9d5139b788a1727
-
SHA256
11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b
-
SHA512
88b81da7e8d3665b0a41cd272c50318b8090dc3240d88020255f079df1373e2cf5fb9f0249320fb7346a52a29d20de42a4385f75e1cf91a12aa40786eae1a12a
-
SSDEEP
49152:zT8+dJPn7Vud6KGavAZXJgfx1HmwPKtWKbF1mIgZ+wau1CObHeIp3hPI4OH+Mfsk:38ROupbHeI7gf+MfA
Malware Config
Extracted
rhadamanthys
https://185.209.161.207:2421/44194499adc4d2b753ee/bduh0f2e.ee92s
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exedescription pid process target process PID 5116 wrote to memory of 1500 5116 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe PID 5116 wrote to memory of 1500 5116 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe PID 5116 wrote to memory of 1500 5116 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe PID 5116 wrote to memory of 1500 5116 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe PID 5116 wrote to memory of 1500 5116 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe 11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe"C:\Users\Admin\AppData\Local\Temp\11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe"C:\Users\Admin\AppData\Local\Temp\11892dbe32cebd618deb6dc36477829ef9fb8181d7ec887408f44c08bb5f675b.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1500
-