Analysis
-
max time kernel
42s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
9QENHrOITU.exe
Resource
win10v2004-20241007-en
General
-
Target
9QENHrOITU.exe
-
Size
2.5MB
-
MD5
0ec4b9b5f2c28fbf2492589a344b8664
-
SHA1
ec46f875687fbddf48290fd117a40750d510c837
-
SHA256
eb8966926eb86c0b7207bcbeb56a8540c88f3b4c002e8778405fb16c645ef286
-
SHA512
95e047410b7ba7a8f929e9d9bec1b7da87c863094651f65b5940d7217faa0101316d019e1965f82ee2cdd7d4004b08f2169a5bf5d9e42df57dfe344f4f24e7f2
-
SSDEEP
49152:8qlpNm4Bp2nYepwO931BH779cAvWodI2AezUBTwkVZi9QyLdmeDR2sbP+u+S9G+:ZbNzp2RlXveIwNEeypB95Cu+S9G+
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
9QENHrOITU.exedescription pid Process procid_target PID 1376 created 2864 1376 9QENHrOITU.exe 50 -
Deletes itself 1 IoCs
Processes:
openwith.exepid Process 4032 openwith.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9QENHrOITU.exeopenwith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9QENHrOITU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
9QENHrOITU.exeopenwith.exepid Process 1376 9QENHrOITU.exe 1376 9QENHrOITU.exe 4032 openwith.exe 4032 openwith.exe 4032 openwith.exe 4032 openwith.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
9QENHrOITU.exedescription pid Process procid_target PID 1376 wrote to memory of 4032 1376 9QENHrOITU.exe 86 PID 1376 wrote to memory of 4032 1376 9QENHrOITU.exe 86 PID 1376 wrote to memory of 4032 1376 9QENHrOITU.exe 86 PID 1376 wrote to memory of 4032 1376 9QENHrOITU.exe 86 PID 1376 wrote to memory of 4032 1376 9QENHrOITU.exe 86
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2864
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\9QENHrOITU.exe"C:\Users\Admin\AppData\Local\Temp\9QENHrOITU.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376