Analysis
-
max time kernel
97s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 04:43
Behavioral task
behavioral1
Sample
test.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
test.exe
-
Size
437KB
-
MD5
0cfc0309bcf83d589d9ebdb1a84fe2f1
-
SHA1
f6cd1d5e7390de8a24398a79209d1a8ce2726647
-
SHA256
b1be23345dbd3740f9ef660fe23471ee12889cf341c12b1067a2edcac2f74fef
-
SHA512
ca1a702bf8b46cf07ddf3aa89f8c96208093bfd2bb56b9d87db6fca3bda416bcad14262fbcb6e228763fd64a8d162422afa2010d14b723fd37f4479096ab0b40
-
SSDEEP
12288:BuZZani4FaYkizhRpfX54K+uiE8fZzhzJA:B+ZIi4Z95/54K+uiE8hd
Score
10/10
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
test.exedescription pid process target process PID 4112 created 2608 4112 test.exe sihost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
test.exeopenwith.exepid process 4112 test.exe 4112 test.exe 4560 openwith.exe 4560 openwith.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
test.exedescription pid process target process PID 4112 wrote to memory of 4560 4112 test.exe openwith.exe PID 4112 wrote to memory of 4560 4112 test.exe openwith.exe PID 4112 wrote to memory of 4560 4112 test.exe openwith.exe PID 4112 wrote to memory of 4560 4112 test.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2608
-
C:\Windows\system32\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4112