Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2024 08:41

General

  • Target

    7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe

  • Size

    5.4MB

  • MD5

    a2a9c309c5300a53d2c2fc41b71b174b

  • SHA1

    f6c26eae1925425fa8966266e87a57b688fad218

  • SHA256

    7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224

  • SHA512

    a29eec8fa98174a74e9bd93c5902cdd95ce329ff8b7a1469901a95705dc1d7fffde58afa296399febb8559d8cd73c932945e85cce8af54e7a672d8f1618e3f7c

  • SSDEEP

    98304:j+ddAtuMvY00V2vtQSH7OuqeGszSQTADu0mL63KQOKvYA1ZuoyQPNf+xKi:wdOuMvc8VdbOuqePmQTAKH63NYAiGfiT

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe
        "C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe
          "C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1416
          • C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe
            "C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:876
        • C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe
          "C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1992
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:960
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {115BF59B-DB1E-4610-B795-18EA7D7FF3E2} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:S4U:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:7404
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAARgBhAGwAbABiAGEAYwBrAEIAdQBmAGYAZQByAC4AZQB4AGUAOwA=
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:7436
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAARgBhAGwAbABiAGEAYwBrAEIAdQBmAGYAZQByAC4AZQB4AGUAOwA=
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2132
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {FD07C8A8-E4DA-43B6-B551-BDE78C511AFF} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:7652
      • C:\Users\Admin\AppData\Local\Current\mgtmhqr\FallbackBuffer.exe
        C:\Users\Admin\AppData\Local\Current\mgtmhqr\FallbackBuffer.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:7684
        • C:\Users\Admin\AppData\Local\Current\mgtmhqr\FallbackBuffer.exe
          "C:\Users\Admin\AppData\Local\Current\mgtmhqr\FallbackBuffer.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4468
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            4⤵
              PID:4508
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              4⤵
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4532
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:7460

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Command and Scripting Interpreter

      1
      T1059

      PowerShell

      1
      T1059.001

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe
        Filesize

        2.7MB

        MD5

        abf2da5b3e7845f50463a72f8b6e6aaa

        SHA1

        a5299f55950ca82134da73b9e9844c5d624114c3

        SHA256

        2a4b1ae0ae67cd31f85680e6351bd5b92ff61e246c158decb1a43a3ef01d9f2c

        SHA512

        570e8becd18b36d66a2ac295518c8ba3c0bc83d8a6175e601b509efd9237462d1d0826dbeb9e52465e7cdcd57cb4ae7fd859ddc4a5aad895cef6ef7fa981e8a4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
        Filesize

        7KB

        MD5

        86f995a7df0ecf7e523039cdc107e208

        SHA1

        5bb772d22a32ec799cef286f856f76623662ac46

        SHA256

        54c91b0302807a5d40923fd77f3bf9bbdea9bf3405ee26747f63a975a1c2a5ed

        SHA512

        dd6aae725d88cacb34eae84e43e84072cf08845e121cf0fde3d8bdc0e46f9516271cf212b533f8891a9b36c7a33095341ea86410c9932561e9638956a50b4dcf

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RVRZH1KORIEG1DUIP7DQ.temp
        Filesize

        7KB

        MD5

        02b3d0e64afed1b9421e1b54b0c71f1e

        SHA1

        8432e9826e84f379e121a06413f9fe016ec828fb

        SHA256

        7664016888181e66281ba4b8c0019388037001b8978b4e8b45450281ba21e3ba

        SHA512

        890fbebe297e1879da256a88b02014b923dc5c31a42aa06aeb9958a9bee48aad60ce475ba3f12919420ef23bafa0b94b6ee7d2588dd85d757460d6c49c9d36db

      • memory/876-9824-0x0000000000E00000-0x0000000000EE8000-memory.dmp
        Filesize

        928KB

      • memory/876-12036-0x0000000004BE0000-0x0000000004C36000-memory.dmp
        Filesize

        344KB

      • memory/876-12035-0x00000000007F0000-0x00000000007F8000-memory.dmp
        Filesize

        32KB

      • memory/876-9822-0x0000000000400000-0x00000000004AC000-memory.dmp
        Filesize

        688KB

      • memory/1416-9807-0x0000000005570000-0x0000000005664000-memory.dmp
        Filesize

        976KB

      • memory/1416-9823-0x00000000744B0000-0x0000000074B9E000-memory.dmp
        Filesize

        6.9MB

      • memory/1416-4900-0x0000000000F70000-0x000000000122C000-memory.dmp
        Filesize

        2.7MB

      • memory/1416-4903-0x0000000004B20000-0x0000000004DD8000-memory.dmp
        Filesize

        2.7MB

      • memory/1416-4902-0x00000000744B0000-0x0000000074B9E000-memory.dmp
        Filesize

        6.9MB

      • memory/1992-9955-0x0000000000080000-0x0000000000130000-memory.dmp
        Filesize

        704KB

      • memory/1992-10149-0x0000000000920000-0x0000000000928000-memory.dmp
        Filesize

        32KB

      • memory/2132-26255-0x000000001A1C0000-0x000000001A4A2000-memory.dmp
        Filesize

        2.9MB

      • memory/2132-26256-0x0000000001200000-0x0000000001208000-memory.dmp
        Filesize

        32KB

      • memory/2392-26-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-4892-0x00000000744B0000-0x0000000074B9E000-memory.dmp
        Filesize

        6.9MB

      • memory/2392-32-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-34-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-36-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-38-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-40-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-42-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-44-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-46-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-48-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-50-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-52-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-54-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-56-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-58-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-60-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-62-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-64-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-66-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-4889-0x00000000059C0000-0x0000000005D70000-memory.dmp
        Filesize

        3.7MB

      • memory/2392-4890-0x0000000002410000-0x000000000245C000-memory.dmp
        Filesize

        304KB

      • memory/2392-4891-0x00000000744B0000-0x0000000074B9E000-memory.dmp
        Filesize

        6.9MB

      • memory/2392-30-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-4901-0x0000000004C90000-0x0000000004CE4000-memory.dmp
        Filesize

        336KB

      • memory/2392-28-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-0-0x00000000744BE000-0x00000000744BF000-memory.dmp
        Filesize

        4KB

      • memory/2392-24-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-22-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-20-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-18-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-12-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-14-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-16-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-10-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-8-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-6-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-1-0x00000000001B0000-0x0000000000728000-memory.dmp
        Filesize

        5.5MB

      • memory/2392-2-0x00000000060B0000-0x0000000006624000-memory.dmp
        Filesize

        5.5MB

      • memory/2392-3-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/2392-4-0x00000000060B0000-0x000000000661E000-memory.dmp
        Filesize

        5.4MB

      • memory/4468-16946-0x0000000000400000-0x00000000004AC000-memory.dmp
        Filesize

        688KB

      • memory/4532-19155-0x0000000000400000-0x00000000006BC000-memory.dmp
        Filesize

        2.7MB

      • memory/7436-12042-0x00000000009D0000-0x00000000009D8000-memory.dmp
        Filesize

        32KB

      • memory/7436-12041-0x000000001A350000-0x000000001A632000-memory.dmp
        Filesize

        2.9MB

      • memory/7684-12046-0x0000000001000000-0x00000000012BC000-memory.dmp
        Filesize

        2.7MB