Analysis
-
max time kernel
103s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe
Resource
win10v2004-20250314-en
General
-
Target
c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe
-
Size
5.3MB
-
MD5
b2bcd5aa3fb1f30d2bc3be809f1a8257
-
SHA1
18357b3a7e36992017db6e135ed8dfe5b4c8f9f3
-
SHA256
c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf
-
SHA512
a3c80e9253b9b7cfb5d1728e3d7027c9f5707a69f9d448a515132c1b98c5538c033830b8c55005c5abe57a6ae98c04edc250048c784cc58ce331b551fbcc5034
-
SSDEEP
49152:HlGIkwGuftS2evmF2upFqOZTYT1u//2Yzwvvg3TPiD7sjk5E52/JI7INSbTANTMd:HsIULPEhSmLzwvc+E5UCIK6t8ozuL
Malware Config
Extracted
rhadamanthys
https://192.30.242.19:9480/0c5934b7b50a019/0rl4l423.a2nct
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5704 created 2820 5704 BitLockerToGo.exe 50 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5216 set thread context of 5704 5216 c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe 100 -
Program crash 2 IoCs
pid pid_target Process procid_target 4456 5704 WerFault.exe 100 5868 5704 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5704 BitLockerToGo.exe 5704 BitLockerToGo.exe 1924 openwith.exe 1924 openwith.exe 1924 openwith.exe 1924 openwith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5216 wrote to memory of 5704 5216 c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe 100 PID 5216 wrote to memory of 5704 5216 c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe 100 PID 5216 wrote to memory of 5704 5216 c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe 100 PID 5216 wrote to memory of 5704 5216 c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe 100 PID 5216 wrote to memory of 5704 5216 c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe 100 PID 5704 wrote to memory of 1924 5704 BitLockerToGo.exe 101 PID 5704 wrote to memory of 1924 5704 BitLockerToGo.exe 101 PID 5704 wrote to memory of 1924 5704 BitLockerToGo.exe 101 PID 5704 wrote to memory of 1924 5704 BitLockerToGo.exe 101 PID 5704 wrote to memory of 1924 5704 BitLockerToGo.exe 101
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2820
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe"C:\Users\Admin\AppData\Local\Temp\c499af472f9d97ebdd5632dca625389913a87d4ddd552d1bdf08170a9e270caf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5216 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 4323⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 4283⤵
- Program crash
PID:5868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5704 -ip 57041⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5704 -ip 57041⤵PID:5936