Analysis
-
max time kernel
30s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 10:02
Behavioral task
behavioral1
Sample
aef5c6fec5ea5f20f0e71f34d3777919.exe
Resource
win10v2004-20241007-en
General
-
Target
aef5c6fec5ea5f20f0e71f34d3777919.exe
-
Size
448KB
-
MD5
aef5c6fec5ea5f20f0e71f34d3777919
-
SHA1
013c70c60334495904fa1e83a129dd3c369e6acf
-
SHA256
01c7c28d8fcbded6bb906af11b34e65e19a71bc433fa3c8b5e615130f78028d5
-
SHA512
bd48e8ec604e074b759b1c08c9d1e6adb90da902b4f23b9f37210ec32183c22a53d0a571d3c46bf43c32f47debc47313c0c98136ac6bc55bf1004b41c19f2774
-
SSDEEP
6144:L/E8DIpjK28t4snQTlp3z/pSZ+pDKpf9EkQbKxVK+PXItNOapG8RuzRiRh3Zi:dEpj7snAv/cgu4VGn6OaM+ucj
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2164-1-0x0000000002400000-0x0000000002800000-memory.dmp family_rhadamanthys behavioral1/memory/2164-2-0x0000000002400000-0x0000000002800000-memory.dmp family_rhadamanthys behavioral1/memory/2164-3-0x0000000002400000-0x0000000002800000-memory.dmp family_rhadamanthys behavioral1/memory/2164-4-0x0000000002400000-0x0000000002800000-memory.dmp family_rhadamanthys behavioral1/memory/2164-12-0x0000000002400000-0x0000000002800000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
aef5c6fec5ea5f20f0e71f34d3777919.exedescription pid Process procid_target PID 2164 created 3576 2164 aef5c6fec5ea5f20f0e71f34d3777919.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
aef5c6fec5ea5f20f0e71f34d3777919.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aef5c6fec5ea5f20f0e71f34d3777919.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
aef5c6fec5ea5f20f0e71f34d3777919.exepid Process 2164 aef5c6fec5ea5f20f0e71f34d3777919.exe 2164 aef5c6fec5ea5f20f0e71f34d3777919.exe 2164 aef5c6fec5ea5f20f0e71f34d3777919.exe 2164 aef5c6fec5ea5f20f0e71f34d3777919.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
aef5c6fec5ea5f20f0e71f34d3777919.exedescription pid Process procid_target PID 2164 wrote to memory of 5048 2164 aef5c6fec5ea5f20f0e71f34d3777919.exe 85 PID 2164 wrote to memory of 5048 2164 aef5c6fec5ea5f20f0e71f34d3777919.exe 85 PID 2164 wrote to memory of 5048 2164 aef5c6fec5ea5f20f0e71f34d3777919.exe 85 PID 2164 wrote to memory of 5048 2164 aef5c6fec5ea5f20f0e71f34d3777919.exe 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\aef5c6fec5ea5f20f0e71f34d3777919.exe"C:\Users\Admin\AppData\Local\Temp\aef5c6fec5ea5f20f0e71f34d3777919.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵PID:5048
-