Analysis
-
max time kernel
97s -
max time network
123s -
platform
windows11-21h2_x64 -
resource
win11-20250207-en -
resource tags
arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-02-2025 14:56
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win11-20250207-en
General
-
Target
Setup.exe
-
Size
2.0MB
-
MD5
67cace08257e46a6ab571d7b0b9b58cb
-
SHA1
a48fab567f9f8e821b45c00a841a6975acda7594
-
SHA256
603ad184c98b1612294dec25a58a9cbee036ea404618910592352d7e5becfeff
-
SHA512
efc1d582f73d050b117d96261ba7198ef3f941117395a9034ce147e1147aec7b814a6247d9f9fc5ac7122353f1d91da39e472269d898657e5a627636749ed8cf
-
SSDEEP
49152:t5ZPhtX6eO4UP84qPuIOV1NhmUabf+W7:tht/V44uFdGbf+W7
Malware Config
Signatures
-
Detects Rhadamanthys payload 2 IoCs
resource yara_rule behavioral2/memory/4128-20-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral2/memory/4128-21-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4128 created 3048 4128 AddInProcess32.exe 49 -
Downloads MZ/PE file 1 IoCs
flow pid Process 6 4796 Process not Found -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2020 set thread context of 1380 2020 Setup.exe 86 PID 2020 set thread context of 4128 2020 Setup.exe 87 PID 1380 set thread context of 3640 1380 AddInProcess32.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 648 4128 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2016 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2020 Setup.exe 2020 Setup.exe 2020 Setup.exe 1380 AddInProcess32.exe 1380 AddInProcess32.exe 1380 AddInProcess32.exe 4128 AddInProcess32.exe 4128 AddInProcess32.exe 4128 AddInProcess32.exe 4128 AddInProcess32.exe 4280 svchost.exe 4280 svchost.exe 4280 svchost.exe 4280 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2020 Setup.exe Token: SeDebugPrivilege 1380 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1380 2020 Setup.exe 86 PID 2020 wrote to memory of 1380 2020 Setup.exe 86 PID 2020 wrote to memory of 1380 2020 Setup.exe 86 PID 2020 wrote to memory of 1380 2020 Setup.exe 86 PID 2020 wrote to memory of 1380 2020 Setup.exe 86 PID 2020 wrote to memory of 1380 2020 Setup.exe 86 PID 2020 wrote to memory of 1380 2020 Setup.exe 86 PID 2020 wrote to memory of 1380 2020 Setup.exe 86 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 2020 wrote to memory of 4128 2020 Setup.exe 87 PID 1380 wrote to memory of 3640 1380 AddInProcess32.exe 88 PID 1380 wrote to memory of 3640 1380 AddInProcess32.exe 88 PID 1380 wrote to memory of 3640 1380 AddInProcess32.exe 88 PID 1380 wrote to memory of 3640 1380 AddInProcess32.exe 88 PID 1380 wrote to memory of 3640 1380 AddInProcess32.exe 88 PID 1380 wrote to memory of 3640 1380 AddInProcess32.exe 88 PID 1380 wrote to memory of 3640 1380 AddInProcess32.exe 88 PID 1380 wrote to memory of 3640 1380 AddInProcess32.exe 88 PID 1380 wrote to memory of 3640 1380 AddInProcess32.exe 88 PID 4128 wrote to memory of 4280 4128 AddInProcess32.exe 89 PID 4128 wrote to memory of 4280 4128 AddInProcess32.exe 89 PID 4128 wrote to memory of 4280 4128 AddInProcess32.exe 89 PID 4128 wrote to memory of 4280 4128 AddInProcess32.exe 89 PID 4128 wrote to memory of 4280 4128 AddInProcess32.exe 89
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3048
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3640
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 3683⤵
- Program crash
PID:648
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QjM4REI1MTEtNTNDNy00NzdFLUJGNDUtNUZEN0E0OTgyMzREfSIgdXNlcmlkPSJ7RTM5MTdFMUMtQjE4Mi00M0I0LUE3MUYtQkJGMTk1RTI4NTNCfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NjI5RTYzREEtODEyMS00NjI3LUI5QTItOTZFRDBDNzFGNUJDfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4yMjAwMC40OTMiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjEiIGluc3RhbGxkYXRldGltZT0iMTczODk1NjEzMiIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNDI4NzExMjU0MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ5NDA2NjU4NzQiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4128 -ip 41281⤵PID:3964