Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 10:07
Static task
static1
Behavioral task
behavioral1
Sample
9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe
Resource
win10v2004-20241007-en
General
-
Target
9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe
-
Size
678KB
-
MD5
7286d3201342805034fb07a07675a630
-
SHA1
9bbd895e887afe9b5a2fa320ecc695189df9cc5e
-
SHA256
9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d
-
SHA512
64c549d4666704e604f7ce8d78deb848cefed34680f5b9e32a7ee009ff5c3d6505197132b97039e8842aa1836f2bddc0af95f4dd9e47aff340f620b48a85d55f
-
SSDEEP
12288:Af/1RgkVxftfwpdXO95bR0xJdur3P5tbM7YRX4pjERUho2s9Ca7ItJ:G1Rgkzlfwrsd0xJa3xu7YRX4pjMcsk9
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exedescription pid process target process PID 2880 created 1188 2880 9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exedialer.exepid process 2880 9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe 2880 9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe 2896 dialer.exe 2896 dialer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exedescription pid process target process PID 2880 wrote to memory of 2896 2880 9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe dialer.exe PID 2880 wrote to memory of 2896 2880 9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe dialer.exe PID 2880 wrote to memory of 2896 2880 9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe dialer.exe PID 2880 wrote to memory of 2896 2880 9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe dialer.exe PID 2880 wrote to memory of 2896 2880 9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe dialer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe"C:\Users\Admin\AppData\Local\Temp\9722d6334bdc365eadebe9e8ddac2eb0fe01fe1c82cf059f32e2e9e91948fc0d.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880
-
-
C:\Windows\system32\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-