Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
d3d11.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3d11.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
s-etup.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
s-etup.exe
Resource
win10v2004-20241007-en
General
-
Target
s-etup.exe
-
Size
678KB
-
MD5
fd57b4457b9c453bf563559c53b9071b
-
SHA1
08eb3a76af5c337b73f50efe5a27c43b68edce88
-
SHA256
995bf2a06730050f99f6e5ff53d641e1e98f022e7d7c376d91d65959aa79a70e
-
SHA512
ba9518440625fef53101440c976951b5c8e2b07f946a975da77b8a7ab2cbfc795cd20a264f61ff1fc4a7c0b77ea9b75ed8a9c9e69b9d22ae65d10163a510c5a7
-
SSDEEP
12288:PoZ5cyP2UluWW7hvraWyE/7bQGLnkQzeD6lHCMfm7HUb3s9a40:PoHhP2YW7hzak7bQ8HCM+4QI40
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
s-etup.exedescription pid process target process PID 2056 created 2504 2056 s-etup.exe sihost.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4436 2056 WerFault.exe s-etup.exe 3708 2056 WerFault.exe s-etup.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
s-etup.exes-etup.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s-etup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s-etup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
s-etup.exeopenwith.exepid process 2056 s-etup.exe 2056 s-etup.exe 3600 openwith.exe 3600 openwith.exe 3600 openwith.exe 3600 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
s-etup.exes-etup.exedescription pid process target process PID 2352 wrote to memory of 2056 2352 s-etup.exe s-etup.exe PID 2352 wrote to memory of 2056 2352 s-etup.exe s-etup.exe PID 2352 wrote to memory of 2056 2352 s-etup.exe s-etup.exe PID 2352 wrote to memory of 2056 2352 s-etup.exe s-etup.exe PID 2352 wrote to memory of 2056 2352 s-etup.exe s-etup.exe PID 2056 wrote to memory of 3600 2056 s-etup.exe openwith.exe PID 2056 wrote to memory of 3600 2056 s-etup.exe openwith.exe PID 2056 wrote to memory of 3600 2056 s-etup.exe openwith.exe PID 2056 wrote to memory of 3600 2056 s-etup.exe openwith.exe PID 2056 wrote to memory of 3600 2056 s-etup.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2504
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\s-etup.exe"C:\Users\Admin\AppData\Local\Temp\s-etup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\s-etup.exe"C:\Users\Admin\AppData\Local\Temp\s-etup.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 4323⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 4483⤵
- Program crash
PID:3708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2056 -ip 20561⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2056 -ip 20561⤵PID:4468