Analysis

  • max time kernel
    150s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 01:12

General

  • Target

    33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe

  • Size

    4.3MB

  • MD5

    651962c322d049e7271543d8d2673311

  • SHA1

    e4a3c9a15006aae882697cff0ec90795f658ee94

  • SHA256

    33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546

  • SHA512

    121b96a1ce8e12924e41c2243cea25dbc13240c6cfadcfe01aecbea1c6676261cbcf89677fb1a8e429e22d47b1030b9e24e03b96a5f7e956316f02bd8d2c74b1

  • SSDEEP

    98304:fh0DJ8JeTBYX6L9jeMr31y0pv/u4EmRIO3HLWjds/ht/tpxeSZ:bJeTKX6L9fHBW4bW+zdeS

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2684
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1996
    • C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
      "C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"
      1⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Users\Admin\AppData\Local\Temp\blue.exe
        "C:\Users\Admin\AppData\Local\Temp\blue.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Users\Admin\AppData\Local\Temp\blue.exe
          "C:\Users\Admin\AppData\Local\Temp\blue.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4476
      • C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
        "C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4992
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVgBlAHIAcwBpAG8AbgAuAGUAeABlADsA
      1⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4740
    • C:\Users\Admin\AppData\Local\AuditRuleType\nodicel\Version.exe
      C:\Users\Admin\AppData\Local\AuditRuleType\nodicel\Version.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3304
      • C:\Users\Admin\AppData\Local\AuditRuleType\nodicel\Version.exe
        "C:\Users\Admin\AppData\Local\AuditRuleType\nodicel\Version.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3788
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1812
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVgBlAHIAcwBpAG8AbgAuAGUAeABlADsA
      1⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe.log

      Filesize

      958B

      MD5

      2653ec7e43bfbe52024d5bf4ec27a515

      SHA1

      a08848300075d1c0b385532d840a43e1fd7251fa

      SHA256

      5d7f555a970cc34988aac2e5deaccfc12ef69b5d9ea55fd8d31a9b4b8377f4f2

      SHA512

      b3caeb925a71e99121b34cd1644f199e33a9b73b435cafb47bba0ffb7156d71b3b3ac424076cf0a600eeb422cb358420915a29b97c974937ebf9186bea05938d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      d28a889fd956d5cb3accfbaf1143eb6f

      SHA1

      157ba54b365341f8ff06707d996b3635da8446f7

      SHA256

      21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

      SHA512

      0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hgqvnbys.wpn.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\blue.exe

      Filesize

      2.1MB

      MD5

      30cd8c00307286863dba2ec13fb2a611

      SHA1

      65815b908d5fd2905f70240d6dfe6e17f3c78aa1

      SHA256

      c68192f008c1b7638e18ec1a6e5787953ea6775bb33acf9a12f64440f3b788e7

      SHA512

      76a903bdb21ae382cd737432b2f5b3152589a3d3863c9120e9ad850d8cb46e07b90ed42f21d74840d4dc1383f2aee7bfc24f3f10eba94858e84af762bd404335

    • memory/912-65-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-3-0x00000000050E0000-0x00000000055B6000-memory.dmp

      Filesize

      4.8MB

    • memory/912-25-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-35-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-33-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-31-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-29-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-59-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-23-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-21-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-19-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-17-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-11-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-9-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-7-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-5-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-41-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-39-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-37-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-61-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-57-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-53-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-51-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-49-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-47-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-45-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-43-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-0-0x00000000746CE000-0x00000000746CF000-memory.dmp

      Filesize

      4KB

    • memory/912-67-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-63-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-4866-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/912-13-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-27-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-4867-0x0000000007DB0000-0x00000000080C2000-memory.dmp

      Filesize

      3.1MB

    • memory/912-4868-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/912-15-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-1-0x0000000000100000-0x0000000000552000-memory.dmp

      Filesize

      4.3MB

    • memory/912-2-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/912-55-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-4881-0x00000000080C0000-0x0000000008114000-memory.dmp

      Filesize

      336KB

    • memory/912-4-0x00000000050E0000-0x00000000055B0000-memory.dmp

      Filesize

      4.8MB

    • memory/912-4880-0x0000000008DA0000-0x0000000009344000-memory.dmp

      Filesize

      5.6MB

    • memory/912-4888-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/4476-9777-0x00000000058C0000-0x0000000005994000-memory.dmp

      Filesize

      848KB

    • memory/4476-13645-0x0000000005C80000-0x0000000005CE6000-memory.dmp

      Filesize

      408KB

    • memory/4476-13644-0x0000000005A40000-0x0000000005A96000-memory.dmp

      Filesize

      344KB

    • memory/4476-9775-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/4632-4882-0x0000000000D10000-0x0000000000F36000-memory.dmp

      Filesize

      2.1MB

    • memory/4632-4885-0x0000000005920000-0x0000000005BCA000-memory.dmp

      Filesize

      2.7MB

    • memory/4632-9770-0x0000000005BD0000-0x0000000005CB8000-memory.dmp

      Filesize

      928KB

    • memory/4632-4884-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/4632-4883-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/4632-9776-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/4740-13646-0x00000172B4DA0000-0x00000172B4DC2000-memory.dmp

      Filesize

      136KB

    • memory/4992-4890-0x0000000000B00000-0x0000000000BB0000-memory.dmp

      Filesize

      704KB

    • memory/4992-4956-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/4992-5981-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/4992-5412-0x0000000002A60000-0x0000000002A68000-memory.dmp

      Filesize

      32KB

    • memory/4992-5501-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/4992-4928-0x00000000050D0000-0x0000000005162000-memory.dmp

      Filesize

      584KB

    • memory/4992-4887-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB