File name: | good.exe |
Full analysis: | https://app.any.run/tasks/72f0d072-968d-4e6a-81df-09855c1bb2d2 |
Verdict: | Malicious activity |
Threats: | Rhadamanthys is a C++ information-stealing malware that extracts sensitive data from infiltrated machines. Its layered operational chain and advanced evasion tactics make it a major risk in cybersecurity landscapes. |
Analysis date: | January 25, 2025, 18:35:45 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections |
MD5: | CA32AD67A6290904A3679439B574D759 |
SHA1: | 7E4F3B8D5D777432C7F89635A48C15A298F0A1E9 |
SHA256: | 05C29D1506F7601BB014F8C94186DFEB73C23A58E2A8397221BA25D17CD290FA |
SSDEEP: | 24576:fvLnTKqndIs2YSVDuFcJ6vUCDhG/BZcv5v3ag+6HRfZksAT5vhpHcDID6iylToXn:fvLnemIs2YSVDuFcJ6vUKhG/BZi5v3aU |
.exe | | | Win64 Executable (generic) (87.3) |
---|---|---|
.exe | | | Generic Win/DOS Executable (6.3) |
.exe | | | DOS Executable Generic (6.3) |
MachineType: | AMD AMD64 |
---|---|
TimeStamp: | 2064:11:15 23:53:33+00:00 |
ImageFileCharacteristics: | Executable, Large address aware |
PEType: | PE32+ |
LinkerVersion: | 14.38 |
CodeSize: | 40960 |
InitializedDataSize: | 790528 |
UninitializedDataSize: | - |
EntryPoint: | 0x1140 |
OSVersion: | 10 |
ImageVersion: | 10 |
SubsystemVersion: | 6 |
Subsystem: | Windows GUI |
FileVersionNumber: | 11.0.26100.1150 |
ProductVersionNumber: | 11.0.26100.1150 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Windows NT 32-bit |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Unicode |
CompanyName: | Microsoft Corporation |
FileDescription: | Win32 Cabinet Self-Extractor |
FileVersion: | 11.00.26100.1150 (WinBuild.160101.0800) |
InternalName: | Wextract |
LegalCopyright: | © Microsoft Corporation. All rights reserved. |
OriginalFileName: | WEXTRACT.EXE |
ProductName: | Internet Explorer |
ProductVersion: | 11.00.26100.1150 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
904 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\BUILD0~1.EXE | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\BUILD0~1.EXE | — | good.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: csrss Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2436 | C:\WINDOWS\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} | C:\Windows\System32\dllhost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
3612 | "C:\Users\admin\AppData\Local\Temp\good.exe" | C:\Users\admin\AppData\Local\Temp\good.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.26100.1150 (WinBuild.160101.0800) Modules
| |||||||||||||||
4444 | "C:\Users\admin\AppData\Local\Temp\IXP000.TMP\BUILD0~1.EXE" | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\BUILD0~1.EXE | dllhost.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: csrss Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
5464 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\crypted.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\crypted.exe | good.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226505 Modules
| |||||||||||||||
6196 | "C:\Users\admin\AppData\Local\Temp\IXP000.TMP\crypted.exe" | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\crypted.exe | crypted.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225477 Modules
| |||||||||||||||
6368 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5464 -s 832 | C:\Windows\SysWOW64\WerFault.exe | crypted.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
6436 | "C:\Windows\System32\svchost.exe" | C:\Windows\SysWOW64\svchost.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6520 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6196 -s 420 | C:\Windows\SysWOW64\WerFault.exe | — | crypted.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
|
(PID) Process: | (2436) dllhost.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
(PID) Process: | (4444) BUILD0~1.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\xLoFEsKzKCHVVzW |
Operation: | write | Name: | xLoFEsKzKCHVVzW |
Value: xLoFEsKzKCHVVzW | |||
(PID) Process: | (4444) BUILD0~1.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BUILD0~1_RASAPI32 |
Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
(PID) Process: | (4444) BUILD0~1.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BUILD0~1_RASAPI32 |
Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
(PID) Process: | (4444) BUILD0~1.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BUILD0~1_RASAPI32 |
Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
(PID) Process: | (4444) BUILD0~1.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BUILD0~1_RASAPI32 |
Operation: | write | Name: | FileTracingMask |
Value: | |||
(PID) Process: | (4444) BUILD0~1.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BUILD0~1_RASAPI32 |
Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
(PID) Process: | (4444) BUILD0~1.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BUILD0~1_RASAPI32 |
Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
(PID) Process: | (4444) BUILD0~1.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BUILD0~1_RASAPI32 |
Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
(PID) Process: | (4444) BUILD0~1.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BUILD0~1_RASMANCS |
Operation: | write | Name: | EnableFileTracing |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
6368 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_crypted.exe_45d71ead97041e67d726dbd8a62babc7783ae75_5f5087f9_2dc9cb03-759c-4297-8729-dada70f76399\Report.wer | — | |
MD5:— | SHA256:— | |||
6368 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\crypted.exe.5464.dmp | — | |
MD5:— | SHA256:— | |||
6368 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FE | binary | |
MD5:FA84E4BCC92AA5DB735AB50711040CDE | SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33 | |||
6368 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER762D.tmp.dmp | binary | |
MD5:8AA17AE30DC1D304E39C2EC94E214BF7 | SHA256:7D9994342E466984807915FE0F757DFE1084E8C87E678EEB60680A67D0CBAECD | |||
6368 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785 | binary | |
MD5:680B0331A3CC8FCCE16367586EC7A721 | SHA256:19F1B5D2C7F62663C14D97578411DC610E5F33E6CE4165977314442435F15305 | |||
6368 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FE | binary | |
MD5:19842266A87FE478A1A44D3999900D9F | SHA256:6DE71CCB061F17F9BDF93E9164C8EF1E25CAAD1DA4975B0C98B0FE3D30CF2406 | |||
3612 | good.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\BUILD0~1.EXE | executable | |
MD5:F836EA67D0FAF046654D4BF352E96D1C | SHA256:1E0C2F1CC5904D8669B358BCF1F4E83FF2C592CD9AF083BBF6404AFB583445D7 | |||
6368 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785 | binary | |
MD5:5F2FB26FEC53CBB7549766F3143665AA | SHA256:69D2AE7020229CF4FF4D01ACE88EAC2E5349A1C8D73CDAAC5A2704A119BA0272 | |||
3612 | good.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\crypted.exe | executable | |
MD5:94EF322B5B3133BA222FCA7FDCBFA5D8 | SHA256:6FF983EF0D20E0513E26C45C2D58484B8C58057D7E4C4465CEBF9B06E4184640 | |||
6368 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER7823.tmp.xml | xml | |
MD5:8732A423701C10B390B6072AB1B65C15 | SHA256:79406631E37D8FE41B299C7C63863816B164F8E4CB65EEC287B21A9E1007DFE4 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4444 | BUILD0~1.EXE | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | — | — | shared |
— | — | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5064 | SearchApp.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5064 | SearchApp.exe | 2.21.65.154:443 | — | Akamai International B.V. | NL | unknown |
— | — | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4444 | BUILD0~1.EXE | 208.95.112.1:80 | ip-api.com | TUT-AS | US | shared |
6368 | WerFault.exe | 20.42.65.92:443 | watson.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
2992 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6368 | WerFault.exe | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
ip-api.com |
| shared |
watson.events.data.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
— | — | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |