Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe
Resource
win10v2004-20241007-en
General
-
Target
8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe
-
Size
446KB
-
MD5
e0787750551ff5613f2e8834abd05ea4
-
SHA1
2d3befa9bdb75062f1857a514f8acfa9b681f531
-
SHA256
8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519
-
SHA512
e5c44d7524b9b96dcce41196f393672eb54adb925ee3d82846385087256dc07c111a9a990795687eb0e14aab9985e00b2c661d48a5508a291a731e5dc5defbae
-
SSDEEP
12288:AtQgEYr14nB0cha/7p/p26sk2lWlQZIwR5i/LvwW:AzEgrP/HrglWlQZ
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/x513cq6t.dbeo8
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
aspnet_regiis.exedescription pid process target process PID 732 created 2660 732 aspnet_regiis.exe sihost.exe -
Loads dropped DLL 1 IoCs
Processes:
8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exepid process 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exedescription pid process target process PID 3616 set thread context of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2472 732 WerFault.exe aspnet_regiis.exe 2816 732 WerFault.exe aspnet_regiis.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
openwith.exe8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exeaspnet_regiis.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
aspnet_regiis.exeopenwith.exepid process 732 aspnet_regiis.exe 732 aspnet_regiis.exe 556 openwith.exe 556 openwith.exe 556 openwith.exe 556 openwith.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exeaspnet_regiis.exedescription pid process target process PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 3616 wrote to memory of 732 3616 8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe aspnet_regiis.exe PID 732 wrote to memory of 556 732 aspnet_regiis.exe openwith.exe PID 732 wrote to memory of 556 732 aspnet_regiis.exe openwith.exe PID 732 wrote to memory of 556 732 aspnet_regiis.exe openwith.exe PID 732 wrote to memory of 556 732 aspnet_regiis.exe openwith.exe PID 732 wrote to memory of 556 732 aspnet_regiis.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2660
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe"C:\Users\Admin\AppData\Local\Temp\8d59ab8245f380aa60471522eea024f4336e791b676b30196995783cbe8a4519.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 4363⤵
- Program crash
PID:2472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 4323⤵
- Program crash
PID:2816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 732 -ip 7321⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 732 -ip 7321⤵PID:1824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
622KB
MD5a91ea405d77ddbcd0516c533cf16bc82
SHA1cb8011380d17074671a164b58975abffbf0f0daf
SHA256385640a86350eac4b8a5ec83b75fb5bcb6f5de12a9338b1d1296e3ba09f7ad41
SHA5124390584749bf06a685bcdb9e16a9c700de396e6c183a7ceebe622f84d241af93d363fa15a80e072b61472f8d5cb4f783208b81a5668bbd8cefae483d395d35f0