Resubmissions

21-01-2023 18:14

230121-wvhcaadc52 10

21-01-2023 18:11

230121-wsllxsdc49 10

Analysis

  • max time kernel
    1800s
  • max time network
    1587s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2023 18:14

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    dc36da0558ef0c16cd0cb8126af0f1f2

  • SHA1

    79453dae6980710622e51e18a305d0511a227719

  • SHA256

    ca871a9028d80e2b3d73a8fe07b9d1628b52e0f9163402a3ab3199f512a36ab1

  • SHA512

    985b27688a33036911de8476707cef04a5a46cd0d5efdf1fdfd345b0bc0fbadd09b65a712567f6944745c3b51a9c741ff4cb5120028ff32661a28c33f6d38e8c

  • SSDEEP

    49152:z3SF3DWhFU3AcOHYFv59oa1GOWJNg8ARSuSujF+N84:z3SF3cVSOa1GvNDySbuEN8

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 1 IoCs
  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2548
      • C:\Windows\SysWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3468
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
        2⤵
          PID:3412
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 1200
          2⤵
          • Program crash
          PID:224
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 1104
          2⤵
          • Program crash
          PID:2636
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3468 -ip 3468
        1⤵
          PID:4208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3468 -ip 3468
          1⤵
            PID:5084
          • C:\Windows\system32\taskmgr.exe
            "C:\Windows\system32\taskmgr.exe" /4
            1⤵
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2304

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          Query Registry

          1
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\240550531.dll
            Filesize

            335KB

            MD5

            af92bfcb7e4c67628a686accbf4231df

            SHA1

            e5b392743d1731ca6fbe6b344d88028588548cac

            SHA256

            959bd4b08d3f72347082976e5e6b5ad2a04201cda4a4b67d27dc3dfe04c73ebe

            SHA512

            553c992234635a6e1463ce99107346200c8fbdcfc41421021761321a5e4621db774a6a0e7df0b3883bd1d367c0a58d031443ced015e01875b88e3695fb71f23c

          • memory/2472-148-0x0000000000765000-0x0000000000767000-memory.dmp
            Filesize

            8KB

          • memory/2472-147-0x0000000000765000-0x0000000000767000-memory.dmp
            Filesize

            8KB

          • memory/2472-144-0x0000000000400000-0x0000000000435000-memory.dmp
            Filesize

            212KB

          • memory/2472-146-0x0000000000400000-0x0000000000435000-memory.dmp
            Filesize

            212KB

          • memory/2472-145-0x0000000000000000-mapping.dmp
          • memory/2472-153-0x0000000000400000-0x0000000000435000-memory.dmp
            Filesize

            212KB

          • memory/2472-150-0x0000000002670000-0x0000000003670000-memory.dmp
            Filesize

            16.0MB

          • memory/2472-149-0x00000000006E0000-0x00000000006FD000-memory.dmp
            Filesize

            116KB

          • memory/3412-140-0x0000000000400000-0x000000000043E000-memory.dmp
            Filesize

            248KB

          • memory/3412-135-0x0000000000000000-mapping.dmp
          • memory/3412-138-0x0000000000400000-0x000000000043E000-memory.dmp
            Filesize

            248KB

          • memory/3412-136-0x0000000000400000-0x000000000043E000-memory.dmp
            Filesize

            248KB

          • memory/3412-142-0x00000000013A0000-0x00000000013AD000-memory.dmp
            Filesize

            52KB

          • memory/3412-141-0x0000000001380000-0x0000000001389000-memory.dmp
            Filesize

            36KB

          • memory/3412-139-0x0000000000400000-0x000000000043E000-memory.dmp
            Filesize

            248KB

          • memory/3468-133-0x000000000DDA0000-0x000000000E09A000-memory.dmp
            Filesize

            3.0MB

          • memory/3468-132-0x00000000032A0000-0x000000000342A000-memory.dmp
            Filesize

            1.5MB

          • memory/3468-134-0x000000000DDA0000-0x000000000E09A000-memory.dmp
            Filesize

            3.0MB

          • memory/3468-151-0x00000000032A0000-0x000000000342A000-memory.dmp
            Filesize

            1.5MB

          • memory/3468-152-0x000000000DDA0000-0x000000000E09A000-memory.dmp
            Filesize

            3.0MB

          • memory/3468-154-0x00000000032A0000-0x000000000342A000-memory.dmp
            Filesize

            1.5MB