Analysis

  • max time kernel
    143s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2023 02:05

General

  • Target

    9ba9a2feb73a5cf966c84486493cd6794723538f57e9100d7e5f3bf83c148ba4.exe

  • Size

    1.7MB

  • MD5

    3d631a7559e59537a57e9fbef5dc9d8c

  • SHA1

    6f6bbfab293562ac339e2f2134c76e6aa99be5fb

  • SHA256

    9ba9a2feb73a5cf966c84486493cd6794723538f57e9100d7e5f3bf83c148ba4

  • SHA512

    425e65bdac791e92ee0d375da3047fe0dfc73950728b5c68df64991970cbde940896c388947585f6201cc1a5e769773d9290ff443c202e32ee55a603f87ee0e9

  • SSDEEP

    49152:tQGiOdmVLsuiPTEVGdiNoVBe9ihFL3LvBH8:tQGiHQTldiNo09CzLvBc

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 2 IoCs
  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2920
      • C:\Windows\SysWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:3124
    • C:\Users\Admin\AppData\Local\Temp\9ba9a2feb73a5cf966c84486493cd6794723538f57e9100d7e5f3bf83c148ba4.exe
      "C:\Users\Admin\AppData\Local\Temp\9ba9a2feb73a5cf966c84486493cd6794723538f57e9100d7e5f3bf83c148ba4.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
        2⤵
          PID:5052
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
          2⤵
            PID:448
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
            2⤵
              PID:4128
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 1264
              2⤵
              • Program crash
              PID:5092
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 1284
              2⤵
              • Program crash
              PID:3556
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3368 -ip 3368
            1⤵
              PID:208
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3368 -ip 3368
              1⤵
                PID:4480

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Discovery

              Query Registry

              1
              T1012

              Peripheral Device Discovery

              1
              T1120

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\240559546.dll
                Filesize

                442KB

                MD5

                acf51213c2e0b564c28cf0db859c9e38

                SHA1

                0ec6d956dd0299a8d26bd4671af11c9c3fbe2ca0

                SHA256

                643044a62d07c6725a73bce3ee702ad0c15f0fe332165821c5e7f73937f898b7

                SHA512

                15f30f50afdc2838ebdc4f38199f9857c1b9bc43350588abed404dcaef039698a2533dd5c074d2bfc88448a578c2202c033073592a9c551f7a7e4d263e293eed

              • memory/448-136-0x0000000000000000-mapping.dmp
              • memory/3124-151-0x0000000001570000-0x000000000158D000-memory.dmp
                Filesize

                116KB

              • memory/3124-147-0x0000000000000000-mapping.dmp
              • memory/3124-146-0x0000000001270000-0x00000000012A5000-memory.dmp
                Filesize

                212KB

              • memory/3124-156-0x0000000001570000-0x000000000158D000-memory.dmp
                Filesize

                116KB

              • memory/3124-155-0x0000000001270000-0x00000000012A5000-memory.dmp
                Filesize

                212KB

              • memory/3124-153-0x00000000033E0000-0x00000000043E0000-memory.dmp
                Filesize

                16.0MB

              • memory/3124-150-0x00000000015A5000-0x00000000015A7000-memory.dmp
                Filesize

                8KB

              • memory/3124-149-0x00000000015A5000-0x00000000015A7000-memory.dmp
                Filesize

                8KB

              • memory/3124-148-0x0000000001270000-0x00000000012A5000-memory.dmp
                Filesize

                212KB

              • memory/3368-132-0x000000000C610000-0x000000000C924000-memory.dmp
                Filesize

                3.1MB

              • memory/3368-152-0x0000000002450000-0x00000000025F0000-memory.dmp
                Filesize

                1.6MB

              • memory/3368-157-0x0000000002450000-0x00000000025F0000-memory.dmp
                Filesize

                1.6MB

              • memory/3368-133-0x0000000002450000-0x00000000025F0000-memory.dmp
                Filesize

                1.6MB

              • memory/3368-134-0x000000000C610000-0x000000000C924000-memory.dmp
                Filesize

                3.1MB

              • memory/3368-154-0x000000000C610000-0x000000000C924000-memory.dmp
                Filesize

                3.1MB

              • memory/4128-143-0x00000000025D0000-0x00000000025D9000-memory.dmp
                Filesize

                36KB

              • memory/4128-141-0x0000000000400000-0x000000000043E000-memory.dmp
                Filesize

                248KB

              • memory/4128-140-0x0000000000400000-0x000000000043E000-memory.dmp
                Filesize

                248KB

              • memory/4128-142-0x0000000000400000-0x000000000043E000-memory.dmp
                Filesize

                248KB

              • memory/4128-138-0x0000000000400000-0x000000000043E000-memory.dmp
                Filesize

                248KB

              • memory/4128-137-0x0000000000000000-mapping.dmp
              • memory/4128-144-0x00000000025F0000-0x00000000025FD000-memory.dmp
                Filesize

                52KB

              • memory/5052-135-0x0000000000000000-mapping.dmp