Overview
overview
10Static
static
10Setup.exe
windows7-x64
1Setup.exe
windows10-2004-x64
8msvcp290.dll
windows7-x64
1msvcp290.dll
windows10-2004-x64
1nasrallah_x86.dll
windows7-x64
1nasrallah_x86.dll
windows10-2004-x64
1tier0_s64.dll
windows7-x64
1tier0_s64.dll
windows10-2004-x64
1vcruntime210.dll
windows7-x64
1vcruntime210.dll
windows10-2004-x64
1vstdlib_s64.dll
windows7-x64
1vstdlib_s64.dll
windows10-2004-x64
10Analysis
-
max time kernel
104s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 01:05
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
msvcp290.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
msvcp290.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
nasrallah_x86.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
nasrallah_x86.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
tier0_s64.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
tier0_s64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
vcruntime210.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
vcruntime210.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
vstdlib_s64.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
vstdlib_s64.dll
Resource
win10v2004-20250314-en
General
-
Target
vstdlib_s64.dll
-
Size
4.9MB
-
MD5
964a139640199e709b1bfdbec679821d
-
SHA1
4bba8996b53e9a3fa9f12bcfc9982a7dd9cd704e
-
SHA256
ed4aa432fb4f138bfb3aa60f3ceae1054a8882295f9ce9ce75290c0fe16b1769
-
SHA512
d75f95f114780a4005218775785ceb81fe763d4692e375e1461b5e485ecda7d3b5e398d901239fe0da0afdafb0f3d852c7b199fdae48a7ab8e5ec4b0569d51c3
-
SSDEEP
49152:gccitDWBmZe2NldCkt2ByKAhu25XbizxLrfx7tBDOSpqrOuFM+xLFUVztPgoHRAZ:R5LAmFOztPgoHRAFH
Malware Config
Signatures
-
Detects Rhadamanthys payload 4 IoCs
resource yara_rule behavioral12/memory/3964-0-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral12/memory/3964-3-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral12/memory/3964-4-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral12/memory/3964-2-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3964 created 2836 3964 aspnet_wp.exe 50 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 3964 2496 rundll32.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 5920 3964 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_wp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3964 aspnet_wp.exe 3964 aspnet_wp.exe 3964 aspnet_wp.exe 3964 aspnet_wp.exe 3092 svchost.exe 3092 svchost.exe 3092 svchost.exe 3092 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 2496 wrote to memory of 3964 2496 rundll32.exe 86 PID 3964 wrote to memory of 3092 3964 aspnet_wp.exe 89 PID 3964 wrote to memory of 3092 3964 aspnet_wp.exe 89 PID 3964 wrote to memory of 3092 3964 aspnet_wp.exe 89 PID 3964 wrote to memory of 3092 3964 aspnet_wp.exe 89 PID 3964 wrote to memory of 3092 3964 aspnet_wp.exe 89
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2836
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\vstdlib_s64.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 3123⤵
- Program crash
PID:5920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3964 -ip 39641⤵PID:2896