Analysis

  • max time kernel
    150s
  • max time network
    102s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240704-en
  • resource tags

    arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-07-2024 09:19

General

  • Target

    33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe

  • Size

    4.3MB

  • MD5

    651962c322d049e7271543d8d2673311

  • SHA1

    e4a3c9a15006aae882697cff0ec90795f658ee94

  • SHA256

    33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546

  • SHA512

    121b96a1ce8e12924e41c2243cea25dbc13240c6cfadcfe01aecbea1c6676261cbcf89677fb1a8e429e22d47b1030b9e24e03b96a5f7e956316f02bd8d2c74b1

  • SSDEEP

    98304:fh0DJ8JeTBYX6L9jeMr31y0pv/u4EmRIO3HLWjds/ht/tpxeSZ:bJeTKX6L9fHBW4bW+zdeS

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2568
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4752
    • C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
      "C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5228
      • C:\Users\Admin\AppData\Local\Temp\blue.exe
        "C:\Users\Admin\AppData\Local\Temp\blue.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5504
        • C:\Users\Admin\AppData\Local\Temp\blue.exe
          "C:\Users\Admin\AppData\Local\Temp\blue.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2184
      • C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
        "C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2976
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVgBlAHIAcwBpAG8AbgAuAGUAeABlADsA
      1⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6104
    • C:\Users\Admin\AppData\Local\AuditRuleType\dhkobv\Version.exe
      C:\Users\Admin\AppData\Local\AuditRuleType\dhkobv\Version.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe.log

      Filesize

      958B

      MD5

      f3a9ef806611771e47086f2146b04048

      SHA1

      19d790d0255e4227f87aee9c51d50eb05f8bce8f

      SHA256

      eccf4d562c23908f755fe9bb0f9ddd0af31c85392d0d9524064215559424b5fd

      SHA512

      9c3c558d68c84b61cd1d90668f8ba8cf3080e3e5a5a72da9f63ad70cf62342f2631f1321e8430480649ed2d25c15553026e30b6d1fb1f0530e04b53358815613

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_asluaepc.utt.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\blue.exe

      Filesize

      2.1MB

      MD5

      30cd8c00307286863dba2ec13fb2a611

      SHA1

      65815b908d5fd2905f70240d6dfe6e17f3c78aa1

      SHA256

      c68192f008c1b7638e18ec1a6e5787953ea6775bb33acf9a12f64440f3b788e7

      SHA512

      76a903bdb21ae382cd737432b2f5b3152589a3d3863c9120e9ad850d8cb46e07b90ed42f21d74840d4dc1383f2aee7bfc24f3f10eba94858e84af762bd404335

    • memory/2184-13649-0x0000000005AC0000-0x0000000005B26000-memory.dmp

      Filesize

      408KB

    • memory/2184-13648-0x0000000005950000-0x00000000059A6000-memory.dmp

      Filesize

      344KB

    • memory/2184-9780-0x00000000057E0000-0x00000000058B4000-memory.dmp

      Filesize

      848KB

    • memory/2184-9779-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2976-5862-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/2976-5692-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/2976-5443-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/2976-5413-0x0000000005110000-0x0000000005118000-memory.dmp

      Filesize

      32KB

    • memory/2976-5037-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/2976-5156-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/2976-5095-0x0000000005260000-0x00000000052F2000-memory.dmp

      Filesize

      584KB

    • memory/2976-5094-0x0000000000C10000-0x0000000000CC0000-memory.dmp

      Filesize

      704KB

    • memory/5228-47-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-39-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-0-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

      Filesize

      4KB

    • memory/5228-45-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-52-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-53-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-49-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-41-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-35-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-28-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-23-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-21-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-59-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-61-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-63-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-67-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-65-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-57-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-55-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-13-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-10-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-4-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-2459-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

      Filesize

      4KB

    • memory/5228-2693-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/5228-4868-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/5228-4869-0x0000000007030000-0x0000000007342000-memory.dmp

      Filesize

      3.1MB

    • memory/5228-4870-0x00000000014D0000-0x000000000151C000-memory.dmp

      Filesize

      304KB

    • memory/5228-43-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-1-0x0000000000790000-0x0000000000BE2000-memory.dmp

      Filesize

      4.3MB

    • memory/5228-4883-0x0000000008290000-0x0000000008836000-memory.dmp

      Filesize

      5.6MB

    • memory/5228-2-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/5228-3-0x00000000057D0000-0x0000000005CA6000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-5-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-4884-0x0000000007640000-0x0000000007694000-memory.dmp

      Filesize

      336KB

    • memory/5228-5093-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/5228-37-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-29-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-31-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-33-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-25-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-17-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-19-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-15-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-11-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5228-7-0x00000000057D0000-0x0000000005CA0000-memory.dmp

      Filesize

      4.8MB

    • memory/5504-9774-0x00000000056B0000-0x0000000005798000-memory.dmp

      Filesize

      928KB

    • memory/5504-9433-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/5504-4886-0x0000000005170000-0x000000000541A000-memory.dmp

      Filesize

      2.7MB

    • memory/5504-9781-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/5504-4899-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/5504-4885-0x0000000074AD0000-0x0000000075281000-memory.dmp

      Filesize

      7.7MB

    • memory/5504-4882-0x00000000004D0000-0x00000000006F6000-memory.dmp

      Filesize

      2.1MB

    • memory/6104-13650-0x0000021812CE0000-0x0000021812D02000-memory.dmp

      Filesize

      136KB