Analysis
-
max time kernel
11s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
github/setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
github/setup.exe
Resource
win11-20241007-en
General
-
Target
github/setup.exe
-
Size
386KB
-
MD5
e8b9cdee9161158dddb56f95de383e45
-
SHA1
afd22ccb83824b9fc77d9b6c5863a8db38174ee1
-
SHA256
d2ff960faa177b580fe8105e67aaa9fa8c0077768d685d47a54420f28cd053c2
-
SHA512
eefa3489f755a85e951d50508004a500bc49cec13b505927653cc261b75567d11f4fa35003a283050d9d9e51ca6d56099e5976b453557fe908dcf96e75fb1635
-
SSDEEP
6144:pwY0C52EIPbosrauPYskgsxLNizYv1voD4cW/3xs0TtxGFjH88Pew8DyofjP8:E7raqrkdv1vW4cW/x9txsjHbP04
Malware Config
Extracted
rhadamanthys
https://185.216.70.103:3951/23fa5e4c813bef61/v5q3ew4d.nnx7b
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 932 created 2832 932 RegAsm.exe 50 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1912 set thread context of 932 1912 setup.exe 89 -
Program crash 3 IoCs
pid pid_target Process procid_target 536 1912 WerFault.exe 85 4856 932 WerFault.exe 89 3552 932 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 932 RegAsm.exe 932 RegAsm.exe 1796 dialer.exe 1796 dialer.exe 1796 dialer.exe 1796 dialer.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1912 wrote to memory of 828 1912 setup.exe 87 PID 1912 wrote to memory of 828 1912 setup.exe 87 PID 1912 wrote to memory of 828 1912 setup.exe 87 PID 1912 wrote to memory of 1560 1912 setup.exe 88 PID 1912 wrote to memory of 1560 1912 setup.exe 88 PID 1912 wrote to memory of 1560 1912 setup.exe 88 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 1912 wrote to memory of 932 1912 setup.exe 89 PID 932 wrote to memory of 1796 932 RegAsm.exe 96 PID 932 wrote to memory of 1796 932 RegAsm.exe 96 PID 932 wrote to memory of 1796 932 RegAsm.exe 96 PID 932 wrote to memory of 1796 932 RegAsm.exe 96 PID 932 wrote to memory of 1796 932 RegAsm.exe 96
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2832
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\github\setup.exe"C:\Users\Admin\AppData\Local\Temp\github\setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6123⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6043⤵
- Program crash
PID:3552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 10922⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1912 -ip 19121⤵PID:3732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 932 -ip 9321⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 932 -ip 9321⤵PID:3976