Analysis
-
max time kernel
103s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 14:13
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20241007-en
General
-
Target
random.exe
-
Size
762KB
-
MD5
1df12b67dbeaffa74bba4936ec4730c2
-
SHA1
4bb7c9af058f6b3701c7fc2afb37ea71c1a96b5d
-
SHA256
a5bc3dc0c69ff4fafa4bc2a4cf06f5911a64cd8ee670046d3ee62716026ca5a5
-
SHA512
c41b16813afebe2cff4fb818a58205ccee78dc5c90a9b94e50d96facfa38e57c5dcac32c9eb9068e3d68e8af7943c8edf3c8712d5551ae614f4142c2ba238a1d
-
SSDEEP
12288:OhTLoo2MYhal8iLMMX/g1jtiF4mPmBu7Iv5ou:OdLp2MYsrmwPSusF
Malware Config
Extracted
rhadamanthys
https://185.184.26.10:4928/e4eb12414c95175ccfd/INSTALLS
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2164 created 2680 2164 winhlp32.exe 44 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 18 raw.githubusercontent.com 19 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4216 set thread context of 2164 4216 random.exe 87 -
Program crash 2 IoCs
pid pid_target Process procid_target 748 2164 WerFault.exe 87 4828 2164 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winhlp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2164 winhlp32.exe 2164 winhlp32.exe 3632 openwith.exe 3632 openwith.exe 3632 openwith.exe 3632 openwith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 4216 wrote to memory of 2164 4216 random.exe 87 PID 2164 wrote to memory of 3632 2164 winhlp32.exe 90 PID 2164 wrote to memory of 3632 2164 winhlp32.exe 90 PID 2164 wrote to memory of 3632 2164 winhlp32.exe 90 PID 2164 wrote to memory of 3632 2164 winhlp32.exe 90 PID 2164 wrote to memory of 3632 2164 winhlp32.exe 90
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2680
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 3403⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 4323⤵
- Program crash
PID:4828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2164 -ip 21641⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2164 -ip 21641⤵PID:2608