Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 10:01
Behavioral task
behavioral1
Sample
af1efddb3afaf3bf4d121a9d4c7e7d68.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
7 signatures
30 seconds
General
-
Target
af1efddb3afaf3bf4d121a9d4c7e7d68.exe
-
Size
444KB
-
MD5
af1efddb3afaf3bf4d121a9d4c7e7d68
-
SHA1
f9943a72ca72fd7a7a3495d039cf37a0decb3998
-
SHA256
7d2102bb62f4eb41eac647e66f4f37eabce90eece6e0589603108b03ebfe300c
-
SHA512
efe933bb51b5abc0a8799dc0dd28f35c9ccaa7a8d09083649645640eb8015e594a46bc6cf2c721787e47b6239fafebb766832de98b770f087005a3f50612f710
-
SSDEEP
6144:IjKvnAzRPqkroWhcrTIhB1uA2dOJhhgWbMbitWGFNuldsfiy3NiGA:Ijzgk06oIuA6ahE+F0/y36
Score
10/10
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
resource yara_rule behavioral1/memory/4932-1-0x0000000002250000-0x0000000002650000-memory.dmp family_rhadamanthys behavioral1/memory/4932-2-0x0000000002250000-0x0000000002650000-memory.dmp family_rhadamanthys behavioral1/memory/4932-3-0x0000000002250000-0x0000000002650000-memory.dmp family_rhadamanthys behavioral1/memory/4932-4-0x0000000002250000-0x0000000002650000-memory.dmp family_rhadamanthys behavioral1/memory/4932-12-0x0000000002250000-0x0000000002650000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4932 created 3556 4932 af1efddb3afaf3bf4d121a9d4c7e7d68.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af1efddb3afaf3bf4d121a9d4c7e7d68.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4932 af1efddb3afaf3bf4d121a9d4c7e7d68.exe 4932 af1efddb3afaf3bf4d121a9d4c7e7d68.exe 4932 af1efddb3afaf3bf4d121a9d4c7e7d68.exe 4932 af1efddb3afaf3bf4d121a9d4c7e7d68.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4932 wrote to memory of 4400 4932 af1efddb3afaf3bf4d121a9d4c7e7d68.exe 91 PID 4932 wrote to memory of 4400 4932 af1efddb3afaf3bf4d121a9d4c7e7d68.exe 91 PID 4932 wrote to memory of 4400 4932 af1efddb3afaf3bf4d121a9d4c7e7d68.exe 91 PID 4932 wrote to memory of 4400 4932 af1efddb3afaf3bf4d121a9d4c7e7d68.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\af1efddb3afaf3bf4d121a9d4c7e7d68.exe"C:\Users\Admin\AppData\Local\Temp\af1efddb3afaf3bf4d121a9d4c7e7d68.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4932
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵PID:4400
-