Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
builder.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
builder.exe
Resource
win10v2004-20241007-en
General
-
Target
builder.exe
-
Size
702KB
-
MD5
5e8eefdad5b8ab9b1b47f269ca27d8f7
-
SHA1
ba66cf53cfe996d904e57b9409b349da62bb5d27
-
SHA256
e915dccc9e65da534932476e8cec4b7e5446dbd022f242e9302ac18d2a041df5
-
SHA512
3f353dd053e4cd18cb7c56237230d026404a8c217084e740b152ff3e9e3c8ecf0649dbdc5e98617d82086f2b340588741c7afdf4326e1f6bf56242bf7a8c58a8
-
SSDEEP
12288:uQjtwieaRtNsy+vMyX/A8MAnz8gCWxjijlLRjPrDuTsu3WfRme3I:uQjtQatuVY8MAnzCM2RjziTsuERmoI
Malware Config
Extracted
rhadamanthys
https://195.3.223.126:4287/9d0dc091285eb9fbf2e/o8f3c8oj.8rdif
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/2788-12-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys behavioral1/memory/2788-11-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys behavioral1/memory/2788-14-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys behavioral1/memory/2788-13-0x0000000002180000-0x0000000002580000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2680 set thread context of 2788 2680 builder.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2776 2680 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2788 AppLaunch.exe 2788 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2788 AppLaunch.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2788 2680 builder.exe 30 PID 2680 wrote to memory of 2776 2680 builder.exe 31 PID 2680 wrote to memory of 2776 2680 builder.exe 31 PID 2680 wrote to memory of 2776 2680 builder.exe 31 PID 2680 wrote to memory of 2776 2680 builder.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\builder.exe"C:\Users\Admin\AppData\Local\Temp\builder.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 922⤵
- Program crash
PID:2776
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1732