Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 04:14
Static task
static1
Behavioral task
behavioral1
Sample
8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll
Resource
win10v2004-20250129-en
General
-
Target
8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll
-
Size
62.0MB
-
MD5
c878951a604018f259ac092ff2251a98
-
SHA1
b5a1a4cd2b88ed67adcb6293e54c1b13953c6f19
-
SHA256
8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553
-
SHA512
c827468238bea1de6fabcd46f45a62accdaba62d4f3506f4baba15b846d47fcd1a21134700639f55ee532a6b38fa769df0c12e5f568b49ab8d7e8a2628068a05
-
SSDEEP
1572864:9YsjkeZwu3B4RHLqyzWZvbYF8WNLKUnBDUpG5FQ:vIfzW6xBK
Malware Config
Signatures
-
Detects Rhadamanthys payload 3 IoCs
resource yara_rule behavioral1/memory/2808-3-0x0000000000170000-0x00000000001F1000-memory.dmp Rhadamanthys_v8 behavioral1/memory/2808-6-0x0000000000170000-0x00000000001F1000-memory.dmp Rhadamanthys_v8 behavioral1/memory/2808-4-0x0000000000170000-0x00000000001F1000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2808 created 1192 2808 rundll32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe 2736 dialer.exe 2736 dialer.exe 2736 dialer.exe 2736 dialer.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2716 2400 rundll32.exe 30 PID 2400 wrote to memory of 2716 2400 rundll32.exe 30 PID 2400 wrote to memory of 2716 2400 rundll32.exe 30 PID 2400 wrote to memory of 2716 2400 rundll32.exe 30 PID 2400 wrote to memory of 2716 2400 rundll32.exe 30 PID 2400 wrote to memory of 2716 2400 rundll32.exe 30 PID 2400 wrote to memory of 2716 2400 rundll32.exe 30 PID 2716 wrote to memory of 2808 2716 rundll32.exe 31 PID 2716 wrote to memory of 2808 2716 rundll32.exe 31 PID 2716 wrote to memory of 2808 2716 rundll32.exe 31 PID 2716 wrote to memory of 2808 2716 rundll32.exe 31 PID 2716 wrote to memory of 2808 2716 rundll32.exe 31 PID 2716 wrote to memory of 2808 2716 rundll32.exe 31 PID 2716 wrote to memory of 2808 2716 rundll32.exe 31 PID 2716 wrote to memory of 2808 2716 rundll32.exe 31 PID 2716 wrote to memory of 2808 2716 rundll32.exe 31 PID 2808 wrote to memory of 2736 2808 rundll32.exe 32 PID 2808 wrote to memory of 2736 2808 rundll32.exe 32 PID 2808 wrote to memory of 2736 2808 rundll32.exe 32 PID 2808 wrote to memory of 2736 2808 rundll32.exe 32 PID 2808 wrote to memory of 2736 2808 rundll32.exe 32 PID 2808 wrote to memory of 2736 2808 rundll32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8eb3f7a87e9f33f64793dde4bbe4c63d97b600fdecc00cf77341abbe27d69553.dll,#13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736
-