Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 13:53
Behavioral task
behavioral1
Sample
2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe
-
Size
504KB
-
MD5
d5f39498188a2251909e1f9c077d91f5
-
SHA1
2d7f772a5a2672e134c36304c6a8917696f5f70c
-
SHA256
283fedebfbf62afe874afbc8d223b879113cbf568da0124337257cc9d2fcf5ba
-
SHA512
60b9f840af077ad7239214424a8825deb4f1c11c1178aa5a0ce7186f0a3092158febb69daa5f757a1087f7181abb9d4ba32688f3e844bc7598af36d0bd0eedfa
-
SSDEEP
6144:YAYM3ZEWqf/qwPF7LR5W8ZJ74zmRiOFBbMh9q/JSc3ChNeK06iiRzm:YWBqf/qq3R5W8ZB4zmRzbazsViR
Malware Config
Extracted
rhadamanthys
https://172.236.107.96/5502b8a765a7d7349/0d2mumm6.wcnlc
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2340 1116 WerFault.exe 2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exedescription pid process target process PID 1116 wrote to memory of 2340 1116 2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe WerFault.exe PID 1116 wrote to memory of 2340 1116 2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe WerFault.exe PID 1116 wrote to memory of 2340 1116 2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe WerFault.exe PID 1116 wrote to memory of 2340 1116 2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe"C:\Users\Admin\AppData\Local\Temp\2924-43-0x00000000039D0000-0x0000000003A4E000-memory.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 362⤵
- Program crash
PID:2340
-