Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20241007-en
General
-
Target
setup.exe
-
Size
656KB
-
MD5
858e4999365508f9f4b31e6f57830776
-
SHA1
e438f9977e8bf397b0acf3ec29e2e687a6175579
-
SHA256
c10b5ee78d7ca90b5c21f72c945312419ea69ea77e29b7bec668fcc81a3fbd14
-
SHA512
31ad09c4151948fbee6949327a3ef7e2e42584fdaf3b7bf94d253a96ecdd1ba01feed86098f3d1613166afb5c36507405300d4bae59796beb71e9b83f8e17221
-
SSDEEP
12288:GkBfu9pYUBK+1T+W2UqHyyHGLOfrUDsK8EV4QWzcRukpk9Jcmlr7v:GkA9p7s+1T++qH1DrUlV+6KLr7v
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/rt8egk5u.wu267
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 208 created 2940 208 setup.exe 50 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2128 set thread context of 208 2128 setup.exe 87 -
Program crash 3 IoCs
pid pid_target Process procid_target 3608 2128 WerFault.exe 85 3444 208 WerFault.exe 87 4200 208 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 208 setup.exe 208 setup.exe 928 openwith.exe 928 openwith.exe 928 openwith.exe 928 openwith.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 2128 wrote to memory of 208 2128 setup.exe 87 PID 208 wrote to memory of 928 208 setup.exe 92 PID 208 wrote to memory of 928 208 setup.exe 92 PID 208 wrote to memory of 928 208 setup.exe 92 PID 208 wrote to memory of 928 208 setup.exe 92 PID 208 wrote to memory of 928 208 setup.exe 92
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2940
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 6283⤵
- Program crash
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 6203⤵
- Program crash
PID:4200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 6282⤵
- Program crash
PID:3608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2128 -ip 21281⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 208 -ip 2081⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 208 -ip 2081⤵PID:2356