Overview
overview
10Static
static
3github/SDL3.dll
windows7-x64
3github/SDL3.dll
windows10-2004-x64
3github/SDL3_image.dll
windows7-x64
3github/SDL3_image.dll
windows10-2004-x64
3github/SDL3_ttf.dll
windows7-x64
3github/SDL3_ttf.dll
windows10-2004-x64
3github/cra...er.dll
windows7-x64
3github/cra...er.dll
windows10-2004-x64
3github/cra...64.dll
windows7-x64
1github/cra...64.dll
windows10-2004-x64
1github/setup.exe
windows7-x64
10github/setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
github/SDL3.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
github/SDL3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
github/SDL3_image.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
github/SDL3_image.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
github/SDL3_ttf.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
github/SDL3_ttf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
github/crashhandler.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
github/crashhandler.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
github/crashhandler64.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
github/crashhandler64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
github/setup.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
github/setup.exe
Resource
win10v2004-20241007-en
General
-
Target
github/setup.exe
-
Size
386KB
-
MD5
e8b9cdee9161158dddb56f95de383e45
-
SHA1
afd22ccb83824b9fc77d9b6c5863a8db38174ee1
-
SHA256
d2ff960faa177b580fe8105e67aaa9fa8c0077768d685d47a54420f28cd053c2
-
SHA512
eefa3489f755a85e951d50508004a500bc49cec13b505927653cc261b75567d11f4fa35003a283050d9d9e51ca6d56099e5976b453557fe908dcf96e75fb1635
-
SSDEEP
6144:pwY0C52EIPbosrauPYskgsxLNizYv1voD4cW/3xs0TtxGFjH88Pew8DyofjP8:E7raqrkdv1vW4cW/x9txsjHbP04
Malware Config
Extracted
rhadamanthys
https://185.216.70.103:3951/23fa5e4c813bef61/v5q3ew4d.nnx7b
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RegAsm.exedescription pid process target process PID 2076 created 2684 2076 RegAsm.exe sihost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
setup.exedescription pid process target process PID 1248 set thread context of 2076 1248 setup.exe RegAsm.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 712 1248 WerFault.exe setup.exe 4876 2076 WerFault.exe RegAsm.exe 1568 2076 WerFault.exe RegAsm.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
setup.exeRegAsm.exedialer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RegAsm.exedialer.exepid process 2076 RegAsm.exe 2076 RegAsm.exe 2904 dialer.exe 2904 dialer.exe 2904 dialer.exe 2904 dialer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
setup.exeRegAsm.exedescription pid process target process PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 1248 wrote to memory of 2076 1248 setup.exe RegAsm.exe PID 2076 wrote to memory of 2904 2076 RegAsm.exe dialer.exe PID 2076 wrote to memory of 2904 2076 RegAsm.exe dialer.exe PID 2076 wrote to memory of 2904 2076 RegAsm.exe dialer.exe PID 2076 wrote to memory of 2904 2076 RegAsm.exe dialer.exe PID 2076 wrote to memory of 2904 2076 RegAsm.exe dialer.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2684
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\github\setup.exe"C:\Users\Admin\AppData\Local\Temp\github\setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 6003⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 6243⤵
- Program crash
PID:1568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 10602⤵
- Program crash
PID:712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1248 -ip 12481⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2076 -ip 20761⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2076 -ip 20761⤵PID:3828