Analysis
-
max time kernel
105s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 20:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
output.exe
Resource
win10v2004-20250314-en
8 signatures
150 seconds
General
-
Target
output.exe
-
Size
3.2MB
-
MD5
989a61c1043f1267095a8bb396500830
-
SHA1
235d3eb42c6c66d71777d927a42ba4db33c205a4
-
SHA256
bfe8a764e4c82d2cb74a80df209069295fb85b2e458eee2ea3b2bf8da55bb363
-
SHA512
491275f8f5c76a0a9793265b9b8fbb591058920e3c9936396677dd4215dcadd8a594fd4f428991371a768a97270d04c633e46d6e82bfed5623caa7f9cf65c6d9
-
SSDEEP
98304:fWKtFU9z/46aw5vH1WHItRf4Qy7BHlccaKI4a8XRxB2X7168x8XRxB2X7168:uKtFU9z/46aw5vH1WHItRf4B7BHlcfKG
Score
10/10
Malware Config
Signatures
-
Detects Rhadamanthys payload 1 IoCs
resource yara_rule behavioral1/memory/4844-0-0x0000000000400000-0x0000000000522000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4844 created 2572 4844 MSBuild.exe 42 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4880 set thread context of 4844 4880 output.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4844 MSBuild.exe 4844 MSBuild.exe 4844 MSBuild.exe 4844 MSBuild.exe 3344 svchost.exe 3344 svchost.exe 3344 svchost.exe 3344 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2768 4880 output.exe 90 PID 4880 wrote to memory of 2768 4880 output.exe 90 PID 4880 wrote to memory of 2768 4880 output.exe 90 PID 4880 wrote to memory of 4844 4880 output.exe 91 PID 4880 wrote to memory of 4844 4880 output.exe 91 PID 4880 wrote to memory of 4844 4880 output.exe 91 PID 4880 wrote to memory of 4844 4880 output.exe 91 PID 4880 wrote to memory of 4844 4880 output.exe 91 PID 4880 wrote to memory of 4844 4880 output.exe 91 PID 4880 wrote to memory of 4844 4880 output.exe 91 PID 4880 wrote to memory of 4844 4880 output.exe 91 PID 4844 wrote to memory of 3344 4844 MSBuild.exe 95 PID 4844 wrote to memory of 3344 4844 MSBuild.exe 95 PID 4844 wrote to memory of 3344 4844 MSBuild.exe 95 PID 4844 wrote to memory of 3344 4844 MSBuild.exe 95 PID 4844 wrote to memory of 3344 4844 MSBuild.exe 95
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2572
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\output.exe"C:\Users\Admin\AppData\Local\Temp\output.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4844
-