Analysis
-
max time kernel
3s -
max time network
7s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-11-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
github/setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
github/setup.exe
Resource
win11-20241007-en
General
-
Target
github/setup.exe
-
Size
386KB
-
MD5
e8b9cdee9161158dddb56f95de383e45
-
SHA1
afd22ccb83824b9fc77d9b6c5863a8db38174ee1
-
SHA256
d2ff960faa177b580fe8105e67aaa9fa8c0077768d685d47a54420f28cd053c2
-
SHA512
eefa3489f755a85e951d50508004a500bc49cec13b505927653cc261b75567d11f4fa35003a283050d9d9e51ca6d56099e5976b453557fe908dcf96e75fb1635
-
SSDEEP
6144:pwY0C52EIPbosrauPYskgsxLNizYv1voD4cW/3xs0TtxGFjH88Pew8DyofjP8:E7raqrkdv1vW4cW/x9txsjHbP04
Malware Config
Extracted
rhadamanthys
https://185.216.70.103:3951/23fa5e4c813bef61/v5q3ew4d.nnx7b
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1564 set thread context of 4812 1564 setup.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 1168 1564 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82 PID 1564 wrote to memory of 4812 1564 setup.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\github\setup.exe"C:\Users\Admin\AppData\Local\Temp\github\setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 10722⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1564 -ip 15641⤵PID:4080