Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20241007-en
General
-
Target
setup.exe
-
Size
656KB
-
MD5
858e4999365508f9f4b31e6f57830776
-
SHA1
e438f9977e8bf397b0acf3ec29e2e687a6175579
-
SHA256
c10b5ee78d7ca90b5c21f72c945312419ea69ea77e29b7bec668fcc81a3fbd14
-
SHA512
31ad09c4151948fbee6949327a3ef7e2e42584fdaf3b7bf94d253a96ecdd1ba01feed86098f3d1613166afb5c36507405300d4bae59796beb71e9b83f8e17221
-
SSDEEP
12288:GkBfu9pYUBK+1T+W2UqHyyHGLOfrUDsK8EV4QWzcRukpk9Jcmlr7v:GkA9p7s+1T++qH1DrUlV+6KLr7v
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/rt8egk5u.wu267
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
setup.exedescription pid Process procid_target PID 1636 set thread context of 2548 1636 setup.exe 31 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 2108 2548 WerFault.exe 31 2444 1636 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
setup.exesetup.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
setup.exesetup.exedescription pid Process procid_target PID 1636 wrote to memory of 2544 1636 setup.exe 30 PID 1636 wrote to memory of 2544 1636 setup.exe 30 PID 1636 wrote to memory of 2544 1636 setup.exe 30 PID 1636 wrote to memory of 2544 1636 setup.exe 30 PID 1636 wrote to memory of 2544 1636 setup.exe 30 PID 1636 wrote to memory of 2544 1636 setup.exe 30 PID 1636 wrote to memory of 2544 1636 setup.exe 30 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 1636 wrote to memory of 2548 1636 setup.exe 31 PID 2548 wrote to memory of 2108 2548 setup.exe 32 PID 2548 wrote to memory of 2108 2548 setup.exe 32 PID 2548 wrote to memory of 2108 2548 setup.exe 32 PID 2548 wrote to memory of 2108 2548 setup.exe 32 PID 1636 wrote to memory of 2444 1636 setup.exe 33 PID 1636 wrote to memory of 2444 1636 setup.exe 33 PID 1636 wrote to memory of 2444 1636 setup.exe 33 PID 1636 wrote to memory of 2444 1636 setup.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 2523⤵
- Program crash
PID:2108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 2802⤵
- Program crash
PID:2444
-