Analysis
-
max time kernel
62s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 20:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
output.exe
Resource
win10v2004-20250410-en
8 signatures
150 seconds
General
-
Target
output.exe
-
Size
3.2MB
-
MD5
989a61c1043f1267095a8bb396500830
-
SHA1
235d3eb42c6c66d71777d927a42ba4db33c205a4
-
SHA256
bfe8a764e4c82d2cb74a80df209069295fb85b2e458eee2ea3b2bf8da55bb363
-
SHA512
491275f8f5c76a0a9793265b9b8fbb591058920e3c9936396677dd4215dcadd8a594fd4f428991371a768a97270d04c633e46d6e82bfed5623caa7f9cf65c6d9
-
SSDEEP
98304:fWKtFU9z/46aw5vH1WHItRf4Qy7BHlccaKI4a8XRxB2X7168x8XRxB2X7168:uKtFU9z/46aw5vH1WHItRf4B7BHlcfKG
Score
10/10
Malware Config
Signatures
-
Detects Rhadamanthys payload 1 IoCs
resource yara_rule behavioral1/memory/5292-0-0x0000000000400000-0x0000000000522000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5292 created 2436 5292 MSBuild.exe 42 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1512 set thread context of 5292 1512 output.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5292 MSBuild.exe 5292 MSBuild.exe 5292 MSBuild.exe 5292 MSBuild.exe 764 svchost.exe 764 svchost.exe 764 svchost.exe 764 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1512 wrote to memory of 5292 1512 output.exe 91 PID 1512 wrote to memory of 5292 1512 output.exe 91 PID 1512 wrote to memory of 5292 1512 output.exe 91 PID 1512 wrote to memory of 5292 1512 output.exe 91 PID 1512 wrote to memory of 5292 1512 output.exe 91 PID 1512 wrote to memory of 5292 1512 output.exe 91 PID 1512 wrote to memory of 5292 1512 output.exe 91 PID 1512 wrote to memory of 5292 1512 output.exe 91 PID 5292 wrote to memory of 764 5292 MSBuild.exe 92 PID 5292 wrote to memory of 764 5292 MSBuild.exe 92 PID 5292 wrote to memory of 764 5292 MSBuild.exe 92 PID 5292 wrote to memory of 764 5292 MSBuild.exe 92 PID 5292 wrote to memory of 764 5292 MSBuild.exe 92
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2436
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\output.exe"C:\Users\Admin\AppData\Local\Temp\output.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5292
-