Analysis
-
max time kernel
117s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
builder.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
builder.exe
Resource
win10v2004-20241007-en
General
-
Target
builder.exe
-
Size
702KB
-
MD5
5e8eefdad5b8ab9b1b47f269ca27d8f7
-
SHA1
ba66cf53cfe996d904e57b9409b349da62bb5d27
-
SHA256
e915dccc9e65da534932476e8cec4b7e5446dbd022f242e9302ac18d2a041df5
-
SHA512
3f353dd053e4cd18cb7c56237230d026404a8c217084e740b152ff3e9e3c8ecf0649dbdc5e98617d82086f2b340588741c7afdf4326e1f6bf56242bf7a8c58a8
-
SSDEEP
12288:uQjtwieaRtNsy+vMyX/A8MAnz8gCWxjijlLRjPrDuTsu3WfRme3I:uQjtQatuVY8MAnzCM2RjziTsuERmoI
Malware Config
Extracted
rhadamanthys
https://195.3.223.126:4287/9d0dc091285eb9fbf2e/o8f3c8oj.8rdif
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral2/memory/1368-5-0x00000000028D0000-0x0000000002CD0000-memory.dmp family_rhadamanthys behavioral2/memory/1368-6-0x00000000028D0000-0x0000000002CD0000-memory.dmp family_rhadamanthys behavioral2/memory/1368-7-0x00000000028D0000-0x0000000002CD0000-memory.dmp family_rhadamanthys behavioral2/memory/1368-8-0x00000000028D0000-0x0000000002CD0000-memory.dmp family_rhadamanthys behavioral2/memory/1368-10-0x00000000028D0000-0x0000000002CD0000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 680 set thread context of 1368 680 builder.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 5008 680 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 AppLaunch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4192 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1368 AppLaunch.exe 1368 AppLaunch.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4192 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1368 AppLaunch.exe Token: SeCreatePagefilePrivilege 1368 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4192 vlc.exe 4192 vlc.exe 4192 vlc.exe 4192 vlc.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4192 vlc.exe 4192 vlc.exe 4192 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4192 vlc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 680 wrote to memory of 1368 680 builder.exe 83 PID 680 wrote to memory of 1368 680 builder.exe 83 PID 680 wrote to memory of 1368 680 builder.exe 83 PID 680 wrote to memory of 1368 680 builder.exe 83 PID 680 wrote to memory of 1368 680 builder.exe 83 PID 680 wrote to memory of 1368 680 builder.exe 83 PID 680 wrote to memory of 1368 680 builder.exe 83 PID 680 wrote to memory of 1368 680 builder.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\builder.exe"C:\Users\Admin\AppData\Local\Temp\builder.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 2842⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 680 -ip 6801⤵PID:4708
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4192