Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 02:55

General

  • Target

    3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe

  • Size

    710KB

  • MD5

    30b29d956704a931e56be6900ec39ad2

  • SHA1

    7b975f9127622d3de0afb8cd09ee5ab4e595baa4

  • SHA256

    3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98

  • SHA512

    b7708fce36eee7988b721b3e1717b398b6d0fa0b42ca91b64dd2251095404daedab28bb1e770b56759b4f6aadb1ecfaf3dbc524888f99d4410fa8f305c0691fa

  • SSDEEP

    12288:wOtozf4SeAFyONyWumxNVkH93El+NKCOOjBW/klVuPwrhEyYIObOscDG2:ZgfxFjNOGyKCOOjBwk3u4rkIOb

Score
10/10

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe
        "C:\Users\Admin\AppData\Local\Temp\3369e82f4fabd069ac3f0be325ea691a61a450902b699becf6fd93ab52516e98.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2872
      • C:\Windows\system32\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2840

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2840-12-0x0000000000060000-0x000000000006A000-memory.dmp

      Filesize

      40KB

    • memory/2840-23-0x0000000001C60000-0x0000000002060000-memory.dmp

      Filesize

      4.0MB

    • memory/2840-24-0x00000000771F1000-0x00000000772F2000-memory.dmp

      Filesize

      1.0MB

    • memory/2840-18-0x0000000001C60000-0x0000000002060000-memory.dmp

      Filesize

      4.0MB

    • memory/2840-19-0x00000000771F1000-0x00000000772F2000-memory.dmp

      Filesize

      1.0MB

    • memory/2840-20-0x00000000771F0000-0x0000000077399000-memory.dmp

      Filesize

      1.7MB

    • memory/2840-22-0x000007FEFD290000-0x000007FEFD2FC000-memory.dmp

      Filesize

      432KB

    • memory/2840-21-0x00000000770D0000-0x00000000771EF000-memory.dmp

      Filesize

      1.1MB

    • memory/2840-16-0x0000000001C60000-0x0000000002060000-memory.dmp

      Filesize

      4.0MB

    • memory/2872-5-0x0000000000910000-0x0000000000920000-memory.dmp

      Filesize

      64KB

    • memory/2872-11-0x000007FEFD290000-0x000007FEFD2FC000-memory.dmp

      Filesize

      432KB

    • memory/2872-8-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2872-7-0x000000001B7B0000-0x000000001BBB0000-memory.dmp

      Filesize

      4.0MB

    • memory/2872-9-0x00000000771F0000-0x0000000077399000-memory.dmp

      Filesize

      1.7MB

    • memory/2872-15-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2872-10-0x00000000770D0000-0x00000000771EF000-memory.dmp

      Filesize

      1.1MB

    • memory/2872-6-0x000000001B7B0000-0x000000001BBB0000-memory.dmp

      Filesize

      4.0MB

    • memory/2872-0-0x000007FEF57C3000-0x000007FEF57C4000-memory.dmp

      Filesize

      4KB

    • memory/2872-4-0x00000000004F0000-0x00000000004F8000-memory.dmp

      Filesize

      32KB

    • memory/2872-3-0x000000001A760000-0x000000001A806000-memory.dmp

      Filesize

      664KB

    • memory/2872-17-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2872-2-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2872-1-0x0000000000930000-0x00000000009E8000-memory.dmp

      Filesize

      736KB