Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
05-02-2025 10:58
Behavioral task
behavioral1
Sample
install.exe
Resource
win10ltsc2021-20250128-en
7 signatures
120 seconds
General
-
Target
install.exe
-
Size
439KB
-
MD5
e1d10be0d41ba9e8dbad2a53876b3a00
-
SHA1
e7a2d4f602bfd178eb4ec6ac9bd406cb5eae50ed
-
SHA256
5bc044ef951c5095e4b7c094df6e54b19dfaafcd148583bb694625b7a0900f1c
-
SHA512
1e7a4065ccf983853b6d212f1d9c9cf43374ee30fd89d4a8d67042b5b560127a7986d60533e949ae77efc48169f96d8ce4cd6f6b0f2f43edebabea238f17fdcb
-
SSDEEP
12288:1O7k28xC7HMDVBjfbL5S6IZ7OGQN/RutyU3ivG/Jt9:+OS6IZ7QN/R8yoaG/L
Score
10/10
Malware Config
Signatures
-
Detects Rhadamanthys payload 2 IoCs
resource yara_rule behavioral1/memory/4088-0-0x0000000000840000-0x00000000008C1000-memory.dmp Rhadamanthys_v8 behavioral1/memory/4088-9-0x0000000000840000-0x00000000008C1000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4088 created 2960 4088 install.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4088 install.exe 4088 install.exe 4088 install.exe 4088 install.exe 3104 svchost.exe 3104 svchost.exe 3104 svchost.exe 3104 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4088 wrote to memory of 3104 4088 install.exe 84 PID 4088 wrote to memory of 3104 4088 install.exe 84 PID 4088 wrote to memory of 3104 4088 install.exe 84 PID 4088 wrote to memory of 3104 4088 install.exe 84 PID 4088 wrote to memory of 3104 4088 install.exe 84
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2960
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\install.exe"C:\Users\Admin\AppData\Local\Temp\install.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088