Analysis
-
max time kernel
144s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 04:27
Static task
static1
Behavioral task
behavioral1
Sample
285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe
Resource
win10v2004-20250129-en
General
-
Target
285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe
-
Size
2.1MB
-
MD5
f8cd8cd3e6a25d340c068d8afc584d57
-
SHA1
a2df305f1715f4edb3475ded16b5ce7fd1d07a49
-
SHA256
285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb
-
SHA512
7fa99c628dc6634a2040923b15f859a707c102e6d8f89fec94d527dca914be60a3cb7b0ea2f162cbb3c9968d8194ddd2a1d6aabcf1bf05d67f113a682a547e6d
-
SSDEEP
49152:HMoRLBk7hwlVpx3hTuTpCrm4AJy3gg3Ps2QfQWyEvib+Fh:C+bClPlgsf3D
Malware Config
Signatures
-
Detects Rhadamanthys payload 1 IoCs
resource yara_rule behavioral2/memory/1904-0-0x0000000000400000-0x000000000051E000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1904 created 2608 1904 jsc.exe 44 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1396 set thread context of 1904 1396 285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1904 jsc.exe 1904 jsc.exe 1904 jsc.exe 1904 jsc.exe 1132 svchost.exe 1132 svchost.exe 1132 svchost.exe 1132 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1904 1396 285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe 84 PID 1396 wrote to memory of 1904 1396 285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe 84 PID 1396 wrote to memory of 1904 1396 285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe 84 PID 1396 wrote to memory of 1904 1396 285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe 84 PID 1396 wrote to memory of 1904 1396 285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe 84 PID 1396 wrote to memory of 1904 1396 285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe 84 PID 1396 wrote to memory of 1904 1396 285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe 84 PID 1396 wrote to memory of 1904 1396 285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe 84 PID 1904 wrote to memory of 1132 1904 jsc.exe 88 PID 1904 wrote to memory of 1132 1904 jsc.exe 88 PID 1904 wrote to memory of 1132 1904 jsc.exe 88 PID 1904 wrote to memory of 1132 1904 jsc.exe 88 PID 1904 wrote to memory of 1132 1904 jsc.exe 88
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2608
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe"C:\Users\Admin\AppData\Local\Temp\285557d7846b75b624cb60db673bceb9a7093330476875499e062aa18b39e4bb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904
-