Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 10:02
Behavioral task
behavioral1
Sample
836dfa8ecf57ce861f4cacfe4a85572d.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
7 signatures
30 seconds
General
-
Target
836dfa8ecf57ce861f4cacfe4a85572d.exe
-
Size
448KB
-
MD5
836dfa8ecf57ce861f4cacfe4a85572d
-
SHA1
ab1d13d733ce513953143c64440323b1969925a9
-
SHA256
8af7fadc968927f6d8a4056e3d15808c254bbee4080985d03d377c361e467357
-
SHA512
32f5c37ca495589c7d31f79c987f2f420e3ead46f09a008c2a8107ff81523986dc993b47a0425ff96be0e761177edeea79d272982e818c4935f087bb4e86ca98
-
SSDEEP
6144:qlE8DIpjK28t4sL4wlp3z/pSZ+pDKpf9EkQbKxVK+PXItNOapG8RuzRiRh3Zc:SEpj7sLLv/cgu4VGn6OaM+ucj
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/4832-1-0x00000000023B0000-0x00000000027B0000-memory.dmp family_rhadamanthys behavioral1/memory/4832-2-0x00000000023B0000-0x00000000027B0000-memory.dmp family_rhadamanthys behavioral1/memory/4832-3-0x00000000023B0000-0x00000000027B0000-memory.dmp family_rhadamanthys behavioral1/memory/4832-4-0x00000000023B0000-0x00000000027B0000-memory.dmp family_rhadamanthys behavioral1/memory/4832-12-0x00000000023B0000-0x00000000027B0000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4832 created 3396 4832 836dfa8ecf57ce861f4cacfe4a85572d.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 836dfa8ecf57ce861f4cacfe4a85572d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4832 836dfa8ecf57ce861f4cacfe4a85572d.exe 4832 836dfa8ecf57ce861f4cacfe4a85572d.exe 4832 836dfa8ecf57ce861f4cacfe4a85572d.exe 4832 836dfa8ecf57ce861f4cacfe4a85572d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4832 wrote to memory of 2720 4832 836dfa8ecf57ce861f4cacfe4a85572d.exe 92 PID 4832 wrote to memory of 2720 4832 836dfa8ecf57ce861f4cacfe4a85572d.exe 92 PID 4832 wrote to memory of 2720 4832 836dfa8ecf57ce861f4cacfe4a85572d.exe 92 PID 4832 wrote to memory of 2720 4832 836dfa8ecf57ce861f4cacfe4a85572d.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\836dfa8ecf57ce861f4cacfe4a85572d.exe"C:\Users\Admin\AppData\Local\Temp\836dfa8ecf57ce861f4cacfe4a85572d.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4832
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵PID:2720
-