Resubmissions
27-11-2024 09:58
241127-lzmgpaymf1 1027-11-2024 09:57
241127-ly4pksvqbl 1012-10-2023 05:37
231012-gblg9sac5z 10Analysis
-
max time kernel
99s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 05:37
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20230915-en
General
-
Target
Loader.exe
-
Size
456KB
-
MD5
2b0c2a69b2615e69ce9b5b65847b2598
-
SHA1
586c543344c0c8ce1ef0cdc630363261042fb6a9
-
SHA256
0843a128cf164e945e6b99bda50a7bdb2a57b82b65965190f8d3620d4a8cfa2c
-
SHA512
089246df82e8e671b9fffe2ee3aba21d41a433ca52fabb848975719ad23b8bb07f4fcc5ac4a6d2e715d9a66df78f7cdb51b9083af01e4b2b04558d4a31d5fbdd
-
SSDEEP
6144:2uWP/BtSnurUylcrGYlnIttxv8HbcLgsd1Gus5psdrvV44dixP+MHDkBYdxtG9+9:2uWP/BZUyoLu8Agsmxwrvejkd2
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-1-0x0000000001F20000-0x0000000002320000-memory.dmp family_rhadamanthys behavioral1/memory/2372-3-0x0000000001F20000-0x0000000002320000-memory.dmp family_rhadamanthys behavioral1/memory/2372-2-0x0000000001F20000-0x0000000002320000-memory.dmp family_rhadamanthys behavioral1/memory/2372-4-0x0000000001F20000-0x0000000002320000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
Processes:
Loader.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest Loader.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
Loader.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ Loader.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
Loader.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Loader.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
Loader.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Loader.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Loader.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Loader.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
Loader.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer Loader.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName Loader.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
Loader.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN Loader.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Loader.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Loader.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Loader.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Loader.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
Loader.exechrome.exepid Process 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2372 Loader.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
Loader.exechrome.exedescription pid Process Token: SeShutdownPrivilege 2372 Loader.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe Token: SeShutdownPrivilege 2564 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid Process 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid Process 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe 2564 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 2564 wrote to memory of 2500 2564 chrome.exe 33 PID 2564 wrote to memory of 2500 2564 chrome.exe 33 PID 2564 wrote to memory of 2500 2564 chrome.exe 33 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 2568 2564 chrome.exe 34 PID 2564 wrote to memory of 1440 2564 chrome.exe 35 PID 2564 wrote to memory of 1440 2564 chrome.exe 35 PID 2564 wrote to memory of 1440 2564 chrome.exe 35 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36 PID 2564 wrote to memory of 2252 2564 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks system information in the registry
- Checks for VirtualBox DLLs, possible anti-VM trick
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5759758,0x7fef5759768,0x7fef57597782⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1216,i,9601759688603943634,18317957561477792962,131072 /prefetch:22⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1216,i,9601759688603943634,18317957561477792962,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1216,i,9601759688603943634,18317957561477792962,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1216,i,9601759688603943634,18317957561477792962,131072 /prefetch:12⤵PID:268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1216,i,9601759688603943634,18317957561477792962,131072 /prefetch:12⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1252 --field-trial-handle=1216,i,9601759688603943634,18317957561477792962,131072 /prefetch:22⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3180 --field-trial-handle=1216,i,9601759688603943634,18317957561477792962,131072 /prefetch:12⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3432 --field-trial-handle=1216,i,9601759688603943634,18317957561477792962,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3448 --field-trial-handle=1216,i,9601759688603943634,18317957561477792962,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5c9c8e5c4123ec978861bff5b97023396
SHA113585f248863a57e9937202f176b834af17ef33f
SHA2560609811eaf726adf5b13a6931900016c9806a9393b00860a4c5d71d6db69e947
SHA512b3fbaa8a7efdab0ce42fa7d2ea176b85ad83564c20f0f1c2b95446d39aafa8f4203af3935b7ec85b0d5e44dbe4e215c2e0bfcef22663a4af4ac9627cb8957fe5
-
Filesize
4KB
MD5863c3041e992c11894643cdc8040806c
SHA1f04437a1641a2465ed34db7393d92357f31f0b9d
SHA256218b6c6a6f084a924d004cb0b550313a86e1b2fcd27c2de67e07988299d12bd8
SHA51271e0d8ff7793d5ef0e895317de5019349e91fa0691e949e28611a3b4b68ee2ff577c7558ff78f26704cd449f5a209d1107460e3127a56a6e4dbcb9f59bd179f8
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e