Analysis
-
max time kernel
95s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 13:50
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20241007-en
General
-
Target
random.exe
-
Size
762KB
-
MD5
1df12b67dbeaffa74bba4936ec4730c2
-
SHA1
4bb7c9af058f6b3701c7fc2afb37ea71c1a96b5d
-
SHA256
a5bc3dc0c69ff4fafa4bc2a4cf06f5911a64cd8ee670046d3ee62716026ca5a5
-
SHA512
c41b16813afebe2cff4fb818a58205ccee78dc5c90a9b94e50d96facfa38e57c5dcac32c9eb9068e3d68e8af7943c8edf3c8712d5551ae614f4142c2ba238a1d
-
SSDEEP
12288:OhTLoo2MYhal8iLMMX/g1jtiF4mPmBu7Iv5ou:OdLp2MYsrmwPSusF
Malware Config
Extracted
rhadamanthys
https://185.184.26.10:4928/e4eb12414c95175ccfd/INSTALLS
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4612 created 2540 4612 winhlp32.exe 42 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 raw.githubusercontent.com 15 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 4612 2336 random.exe 91 -
Program crash 2 IoCs
pid pid_target Process procid_target 4708 4612 WerFault.exe 91 1008 4612 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winhlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4612 winhlp32.exe 4612 winhlp32.exe 1940 openwith.exe 1940 openwith.exe 1940 openwith.exe 1940 openwith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 2336 wrote to memory of 4612 2336 random.exe 91 PID 4612 wrote to memory of 1940 4612 winhlp32.exe 92 PID 4612 wrote to memory of 1940 4612 winhlp32.exe 92 PID 4612 wrote to memory of 1940 4612 winhlp32.exe 92 PID 4612 wrote to memory of 1940 4612 winhlp32.exe 92 PID 4612 wrote to memory of 1940 4612 winhlp32.exe 92
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2540
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 4323⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 4283⤵
- Program crash
PID:1008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4612 -ip 46121⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4612 -ip 46121⤵PID:1068