Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe
Resource
win10v2004-20241007-en
General
-
Target
3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe
-
Size
710KB
-
MD5
30b29d956704a931e56be6900ec39ad2
-
SHA1
7b975f9127622d3de0afb8cd09ee5ab4e595baa4
-
SHA256
3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98
-
SHA512
b7708fce36eee7988b721b3e1717b398b6d0fa0b42ca91b64dd2251095404daedab28bb1e770b56759b4f6aadb1ecfaf3dbc524888f99d4410fa8f305c0691fa
-
SSDEEP
12288:wOtozf4SeAFyONyWumxNVkH93El+NKCOOjBW/klVuPwrhEyYIObOscDG2:ZgfxFjNOGyKCOOjBwk3u4rkIOb
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exedescription pid Process procid_target PID 2096 created 1188 2096 3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe 21 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exedialer.exepid Process 2096 3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe 2096 3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe 2528 dialer.exe 2528 dialer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exedescription pid Process procid_target PID 2096 wrote to memory of 2528 2096 3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe 30 PID 2096 wrote to memory of 2528 2096 3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe 30 PID 2096 wrote to memory of 2528 2096 3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe 30 PID 2096 wrote to memory of 2528 2096 3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe 30 PID 2096 wrote to memory of 2528 2096 3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe"C:\Users\Admin\AppData\Local\Temp\3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096
-
-
C:\Windows\system32\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-