Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20241007-en
General
-
Target
setup.exe
-
Size
656KB
-
MD5
858e4999365508f9f4b31e6f57830776
-
SHA1
e438f9977e8bf397b0acf3ec29e2e687a6175579
-
SHA256
c10b5ee78d7ca90b5c21f72c945312419ea69ea77e29b7bec668fcc81a3fbd14
-
SHA512
31ad09c4151948fbee6949327a3ef7e2e42584fdaf3b7bf94d253a96ecdd1ba01feed86098f3d1613166afb5c36507405300d4bae59796beb71e9b83f8e17221
-
SSDEEP
12288:GkBfu9pYUBK+1T+W2UqHyyHGLOfrUDsK8EV4QWzcRukpk9Jcmlr7v:GkA9p7s+1T++qH1DrUlV+6KLr7v
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/rt8egk5u.wu267
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
setup.exedescription pid process target process PID 208 created 2940 208 setup.exe sihost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
setup.exedescription pid process target process PID 2128 set thread context of 208 2128 setup.exe setup.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3608 2128 WerFault.exe setup.exe 3444 208 WerFault.exe setup.exe 4200 208 WerFault.exe setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
setup.exesetup.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
setup.exeopenwith.exepid process 208 setup.exe 208 setup.exe 928 openwith.exe 928 openwith.exe 928 openwith.exe 928 openwith.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
setup.exesetup.exedescription pid process target process PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 2128 wrote to memory of 208 2128 setup.exe setup.exe PID 208 wrote to memory of 928 208 setup.exe openwith.exe PID 208 wrote to memory of 928 208 setup.exe openwith.exe PID 208 wrote to memory of 928 208 setup.exe openwith.exe PID 208 wrote to memory of 928 208 setup.exe openwith.exe PID 208 wrote to memory of 928 208 setup.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2940
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 6283⤵
- Program crash
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 6203⤵
- Program crash
PID:4200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 6282⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2128 -ip 21281⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 208 -ip 2081⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 208 -ip 2081⤵PID:2356