Analysis
-
max time kernel
30s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 09:59
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
7 signatures
30 seconds
General
-
Target
file.exe
-
Size
448KB
-
MD5
f5a4e48c469d899bf882475b36dff8d9
-
SHA1
b1845ec95f2837038461a04dc266bcb48a052fcb
-
SHA256
d850df618ed03fd518cb4c52bb09657a2eda865702a0498b965b0279ea73b362
-
SHA512
8be14d34d360537a82532b8172d5ad4c257ac703f0ecbc021871d521723ff942101ba84c53ccbd3148808f2f7a3748bd478e7e1e89cb53e1d95a32907b81b003
-
SSDEEP
6144:L/E8DIpjK28t4snQxlp3z/pSZ+pDKpf9EkQbKxVK+PXItNOapG8RuzRiRh3Zi:dEpj7snqv/cgu4VGn6OaM+ucj
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/5016-1-0x0000000002420000-0x0000000002820000-memory.dmp family_rhadamanthys behavioral1/memory/5016-3-0x0000000002420000-0x0000000002820000-memory.dmp family_rhadamanthys behavioral1/memory/5016-2-0x0000000002420000-0x0000000002820000-memory.dmp family_rhadamanthys behavioral1/memory/5016-4-0x0000000002420000-0x0000000002820000-memory.dmp family_rhadamanthys behavioral1/memory/5016-12-0x0000000002420000-0x0000000002820000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5016 created 3528 5016 file.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5016 file.exe 5016 file.exe 5016 file.exe 5016 file.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5016 wrote to memory of 512 5016 file.exe 89 PID 5016 wrote to memory of 512 5016 file.exe 89 PID 5016 wrote to memory of 512 5016 file.exe 89 PID 5016 wrote to memory of 512 5016 file.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5016
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵PID:512
-