Analysis

  • max time kernel
    148s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 12:54

General

  • Target

    rhadamanthys_00650000.bin

  • Size

    116KB

  • MD5

    e8633684abeaa4c9d135109ba69b08fe

  • SHA1

    fb107ff9b69d5eb374daac4a6a67bd6bab02ef2d

  • SHA256

    ee3fe7d514c1c8612015a0a9b6a4b504c2bedbd7050b401636f8c0eaef4ac0b3

  • SHA512

    9407133a890898b1e5149772c6d2f71157a3be78b79dcbcc43190f460cd9e376db6f6ad11243bbbe50495eec9e5e5abf47a355a8e394e042dce3e9cfc1e80f2e

  • SSDEEP

    1536:+QcCWwc3GI0nIeSBlaJ+/orjPYeMVBwDRHetDfbX26Li+gJE3YJ:GCYyIedJ+GjweMnkS2h+gC3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\rhadamanthys_00650000.bin
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\rhadamanthys_00650000.bin
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rhadamanthys_00650000.bin"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fda1ca7d5d7502fcaef4bbeb93d3a2f5

    SHA1

    4ddf47b9909695908d0e4fcdef405b288dbc8566

    SHA256

    6e2ea5ec214d99c4f796dd249b676ccfe1176cd58e5f47ef9d82d1e0a9d4b437

    SHA512

    83dfb27968046fcc7ea52140cd12d334f965bc9de5bac3b1190730c86347abfa95ae7c2507fad877e4815c4a05393d57eefea9466a4681a4d1f385a3d200f477