Behavioral task
behavioral1
Sample
builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
builder.exe
Resource
win10v2004-20241007-en
General
-
Target
builder.exe
-
Size
456KB
-
MD5
515a0c8be21a5ba836e5687fc2d73333
-
SHA1
c52be9d0d37ac1b8d6bc09860e68e9e0615255ab
-
SHA256
9950788284df125c7359aeb91435ed24d59359fac6a74ed73774ca31561cc7ae
-
SHA512
4e2bd7ce844bba25aff12e2607c4281b59f7579b9407139ef6136ef09282c7afac1c702adebc42f8bd7703fac047fd8b5add34df334bfc04d3518ea483225522
-
SSDEEP
6144:2uWP/BtSnurUylcrGYlnIttxv8HbcLgsd1Gus5psdrvV44dixP+MHDkBYdxtG9+V:2uWP/BZUyoLu8Agsmxwrvejkd2
Malware Config
Extracted
rhadamanthys
https://195.3.223.126:4287/9d0dc091285eb9fbf2e/o8f3c8oj.8rdif
Signatures
-
Rhadamanthys family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource builder.exe
Files
-
builder.exe.exe windows:4 windows x86 arch:x86
eca0c30b65294d02a6c6180a6b323b58
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
HeapSize
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LCMapStringW
LCMapStringA
InterlockedExchange
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
LoadLibraryA
GetCPInfo
GetSystemInfo
GetACP
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
TerminateProcess
TlsGetValue
TlsSetValue
TlsFree
GetLastError
GetCurrentThreadId
SetLastError
TlsAlloc
GetProcAddress
HeapCreate
VirtualQuery
WaitForSingleObject
HeapDestroy
CreateEventW
ExitProcess
WideCharToMultiByte
OutputDebugStringW
CreateFileW
ReadFile
CloseHandle
GetCurrentProcess
MultiByteToWideChar
GetModuleHandleW
InterlockedIncrement
GetModuleFileNameW
lstrlenW
HeapFree
OutputDebugStringA
MulDiv
GetProcessHeap
HeapAlloc
GetOEMCP
GetVersionExA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
user32
GetClassInfoW
FrameRect
CharUpperBuffW
IsIconic
EnableWindow
DrawIcon
DeleteMenu
SetTimer
CreateAcceleratorTableW
GetSystemMenu
DrawMenuBar
SetMenuItemInfoW
GetWindowTextW
GetDCEx
RegisterClassW
GetMenuItemInfoW
SetScrollPos
FillRect
GetSystemMetrics
GetDC
MsgWaitForMultipleObjectsEx
EndMenu
DestroyCursor
IsZoomed
GetCursor
GetScrollPos
DispatchMessageW
DefFrameProcW
DestroyMenu
ReleaseDC
IsDialogMessageW
GetScrollRange
DefMDIChildProcW
GetMenuStringW
PeekMessageW
CopyImage
ShowCaret
LoadIconW
DrawFocusRect
LoadBitmapW
GetDlgCtrlID
LoadStringW
GetClassInfoExW
DestroyIcon
ShowWindow
EndPaint
PostMessageW
CreateWindowExW
BeginPaint
LoadCursorW
GetClientRect
InsertMenuW
CreateIcon
DestroyWindow
KillTimer
GetScrollInfo
CreateMenu
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
gdi32
Pie
AngleArc
Polygon
CreateSolidBrush
RectVisible
CreateICW
CreatePalette
PolyBezierTo
RoundRect
RestoreDC
GetWindowOrgEx
CreateCompatibleBitmap
MoveToEx
GetTextMetricsW
GetStockObject
SetTextColor
SetAbortProc
SetBkMode
StretchBlt
CreateDCW
GetDeviceCaps
SetRectRgn
GetEnhMetaFileHeader
ole32
OleInitialize
CoUninitialize
OleUninitialize
CoTaskMemFree
CoTaskMemAlloc
IsEqualGUID
CoInitialize
CoCreateInstance
oleaut32
VariantChangeType
SafeArrayPutElement
VariantCopy
VariantClear
SafeArrayGetElement
SafeArrayGetUBound
SysFreeString
GetErrorInfo
VariantInit
SafeArrayPtrOfIndex
SysAllocStringLen
SafeArrayGetLBound
SafeArrayAccessData
VariantCopyInd
SysReAllocStringLen
SafeArrayCreate
SafeArrayUnaccessData
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
winspool.drv
EnumPrintersW
ord203
OpenPrinterW
ClosePrinter
DocumentPropertiesW
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 324KB - Virtual size: 322KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE