Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-07-2024 01:12

General

  • Target

    7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe

  • Size

    5.4MB

  • MD5

    a2a9c309c5300a53d2c2fc41b71b174b

  • SHA1

    f6c26eae1925425fa8966266e87a57b688fad218

  • SHA256

    7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224

  • SHA512

    a29eec8fa98174a74e9bd93c5902cdd95ce329ff8b7a1469901a95705dc1d7fffde58afa296399febb8559d8cd73c932945e85cce8af54e7a672d8f1618e3f7c

  • SSDEEP

    98304:j+ddAtuMvY00V2vtQSH7OuqeGszSQTADu0mL63KQOKvYA1ZuoyQPNf+xKi:wdOuMvc8VdbOuqePmQTAKH63NYAiGfiT

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2964
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:5100
    • C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe
      "C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe"
      1⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe
        "C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe
          "C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:544
      • C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe
        "C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2608
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAARgBhAGwAbABiAGEAYwBrAEIAdQBmAGYAZQByAC4AZQB4AGUAOwA=
      1⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2040
    • C:\Users\Admin\AppData\Local\Current\kuvtxylot\FallbackBuffer.exe
      C:\Users\Admin\AppData\Local\Current\kuvtxylot\FallbackBuffer.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4652

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe.log
      Filesize

      805B

      MD5

      58a9108e39c2ea50e65c23be3a9407cf

      SHA1

      fb21f7b9330aa1a77080a3243b81b49035102d7b

      SHA256

      6049be83020702896a539b5c8c13270add224d7b91b3ee0bebc328791b74a84b

      SHA512

      93804ee8a4560503e47c07f5fa4a959e23355a01aba406c103d339debc9b2b1d20a345cdbb8d8069dac97b9151f228cf559ac3dde1500e3484fba1a4126842bf

    • C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe
      Filesize

      2.7MB

      MD5

      abf2da5b3e7845f50463a72f8b6e6aaa

      SHA1

      a5299f55950ca82134da73b9e9844c5d624114c3

      SHA256

      2a4b1ae0ae67cd31f85680e6351bd5b92ff61e246c158decb1a43a3ef01d9f2c

      SHA512

      570e8becd18b36d66a2ac295518c8ba3c0bc83d8a6175e601b509efd9237462d1d0826dbeb9e52465e7cdcd57cb4ae7fd859ddc4a5aad895cef6ef7fa981e8a4

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_grtwbs4c.d4z.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/544-9824-0x0000000000400000-0x00000000004AC000-memory.dmp
      Filesize

      688KB

    • memory/544-12023-0x00000000051F0000-0x00000000051F8000-memory.dmp
      Filesize

      32KB

    • memory/544-12024-0x00000000053A0000-0x00000000053F6000-memory.dmp
      Filesize

      344KB

    • memory/544-12025-0x0000000005530000-0x0000000005596000-memory.dmp
      Filesize

      408KB

    • memory/544-9826-0x0000000005070000-0x0000000005158000-memory.dmp
      Filesize

      928KB

    • memory/2040-12035-0x000002219B780000-0x000002219B7A2000-memory.dmp
      Filesize

      136KB

    • memory/2308-9825-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2308-9819-0x0000000006770000-0x0000000006864000-memory.dmp
      Filesize

      976KB

    • memory/2308-9818-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2308-4911-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2308-4914-0x00000000056A0000-0x0000000005958000-memory.dmp
      Filesize

      2.7MB

    • memory/2308-4907-0x0000000000B80000-0x0000000000E3C000-memory.dmp
      Filesize

      2.7MB

    • memory/2332-64-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-4894-0x00000000054F0000-0x000000000553C000-memory.dmp
      Filesize

      304KB

    • memory/2332-58-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-56-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-54-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-52-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-50-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-42-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-44-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-38-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-40-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-34-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-30-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-32-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-29-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-26-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-20-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-16-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-18-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-12-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-10-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-6-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-5-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-4891-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2332-4893-0x0000000007890000-0x0000000007C40000-memory.dmp
      Filesize

      3.7MB

    • memory/2332-0-0x0000000074B7E000-0x0000000074B7F000-memory.dmp
      Filesize

      4KB

    • memory/2332-4892-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2332-66-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-68-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-4913-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2332-1-0x0000000000120000-0x0000000000698000-memory.dmp
      Filesize

      5.5MB

    • memory/2332-2-0x0000000006320000-0x0000000006894000-memory.dmp
      Filesize

      5.5MB

    • memory/2332-62-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-4-0x00000000051F0000-0x0000000005282000-memory.dmp
      Filesize

      584KB

    • memory/2332-60-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-48-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-4906-0x0000000005E50000-0x0000000005EA4000-memory.dmp
      Filesize

      336KB

    • memory/2332-3-0x00000000057A0000-0x0000000005D44000-memory.dmp
      Filesize

      5.6MB

    • memory/2332-8-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-14-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-46-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-36-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-24-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2332-22-0x0000000006320000-0x000000000688E000-memory.dmp
      Filesize

      5.4MB

    • memory/2608-5774-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2608-5228-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2608-5225-0x00000000055C0000-0x00000000055C8000-memory.dmp
      Filesize

      32KB

    • memory/2608-4957-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2608-4912-0x0000000074B70000-0x0000000075320000-memory.dmp
      Filesize

      7.7MB

    • memory/2608-4915-0x0000000000400000-0x00000000004B0000-memory.dmp
      Filesize

      704KB