Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 15:58
Static task
static1
Behavioral task
behavioral1
Sample
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
Resource
win10v2004-20240709-en
General
-
Target
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
-
Size
4.3MB
-
MD5
651962c322d049e7271543d8d2673311
-
SHA1
e4a3c9a15006aae882697cff0ec90795f658ee94
-
SHA256
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546
-
SHA512
121b96a1ce8e12924e41c2243cea25dbc13240c6cfadcfe01aecbea1c6676261cbcf89677fb1a8e429e22d47b1030b9e24e03b96a5f7e956316f02bd8d2c74b1
-
SSDEEP
98304:fh0DJ8JeTBYX6L9jeMr31y0pv/u4EmRIO3HLWjds/ht/tpxeSZ:bJeTKX6L9fHBW4bW+zdeS
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exedescription pid process target process PID 4696 created 2644 4696 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe sihost.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid process 3896 powershell.exe 4708 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe -
Executes dropped EXE 4 IoCs
Processes:
blue.exeblue.exeVersion.exeVersion.exepid process 2924 blue.exe 760 blue.exe 4408 Version.exe 1516 Version.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exeblue.exeVersion.exeVersion.exedescription pid process target process PID 4832 set thread context of 4696 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe PID 2924 set thread context of 760 2924 blue.exe blue.exe PID 4408 set thread context of 1516 4408 Version.exe Version.exe PID 1516 set thread context of 2452 1516 Version.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exeopenwith.exepowershell.exeVersion.exepid process 4696 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 4696 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 4752 openwith.exe 4752 openwith.exe 4752 openwith.exe 4752 openwith.exe 3896 powershell.exe 3896 powershell.exe 1516 Version.exe 1516 Version.exe 1516 Version.exe 1516 Version.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exeblue.exeblue.exepowershell.exeVersion.exeVersion.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe Token: SeDebugPrivilege 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe Token: SeDebugPrivilege 2924 blue.exe Token: SeDebugPrivilege 2924 blue.exe Token: SeDebugPrivilege 760 blue.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeDebugPrivilege 4408 Version.exe Token: SeDebugPrivilege 4408 Version.exe Token: SeDebugPrivilege 1516 Version.exe Token: SeDebugPrivilege 2452 InstallUtil.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exeblue.exeVersion.exeVersion.exedescription pid process target process PID 4832 wrote to memory of 2924 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe blue.exe PID 4832 wrote to memory of 2924 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe blue.exe PID 4832 wrote to memory of 2924 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe blue.exe PID 4832 wrote to memory of 4696 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe PID 4832 wrote to memory of 4696 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe PID 4832 wrote to memory of 4696 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe PID 4832 wrote to memory of 4696 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe PID 4832 wrote to memory of 4696 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe PID 4832 wrote to memory of 4696 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe PID 4832 wrote to memory of 4696 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe PID 4832 wrote to memory of 4696 4832 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe PID 4696 wrote to memory of 4752 4696 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe openwith.exe PID 4696 wrote to memory of 4752 4696 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe openwith.exe PID 4696 wrote to memory of 4752 4696 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe openwith.exe PID 4696 wrote to memory of 4752 4696 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe openwith.exe PID 4696 wrote to memory of 4752 4696 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe openwith.exe PID 2924 wrote to memory of 760 2924 blue.exe blue.exe PID 2924 wrote to memory of 760 2924 blue.exe blue.exe PID 2924 wrote to memory of 760 2924 blue.exe blue.exe PID 2924 wrote to memory of 760 2924 blue.exe blue.exe PID 2924 wrote to memory of 760 2924 blue.exe blue.exe PID 2924 wrote to memory of 760 2924 blue.exe blue.exe PID 2924 wrote to memory of 760 2924 blue.exe blue.exe PID 2924 wrote to memory of 760 2924 blue.exe blue.exe PID 4408 wrote to memory of 1516 4408 Version.exe Version.exe PID 4408 wrote to memory of 1516 4408 Version.exe Version.exe PID 4408 wrote to memory of 1516 4408 Version.exe Version.exe PID 4408 wrote to memory of 1516 4408 Version.exe Version.exe PID 4408 wrote to memory of 1516 4408 Version.exe Version.exe PID 4408 wrote to memory of 1516 4408 Version.exe Version.exe PID 4408 wrote to memory of 1516 4408 Version.exe Version.exe PID 4408 wrote to memory of 1516 4408 Version.exe Version.exe PID 1516 wrote to memory of 4940 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 4940 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 4940 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 2452 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 2452 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 2452 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 2452 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 2452 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 2452 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 2452 1516 Version.exe InstallUtil.exe PID 1516 wrote to memory of 2452 1516 Version.exe InstallUtil.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2644
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\blue.exe"C:\Users\Admin\AppData\Local\Temp\blue.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\blue.exe"C:\Users\Admin\AppData\Local\Temp\blue.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:760 -
C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4696
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVgBlAHIAcwBpAG8AbgAuAGUAeABlADsA1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
C:\Users\Admin\AppData\Local\AuditRuleType\fqpuuzg\Version.exeC:\Users\Admin\AppData\Local\AuditRuleType\fqpuuzg\Version.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\AuditRuleType\fqpuuzg\Version.exe"C:\Users\Admin\AppData\Local\AuditRuleType\fqpuuzg\Version.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:4940
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVgBlAHIAcwBpAG8AbgAuAGUAeABlADsA1⤵
- Command and Scripting Interpreter: PowerShell
PID:4708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe.log
Filesize958B
MD52653ec7e43bfbe52024d5bf4ec27a515
SHA1a08848300075d1c0b385532d840a43e1fd7251fa
SHA2565d7f555a970cc34988aac2e5deaccfc12ef69b5d9ea55fd8d31a9b4b8377f4f2
SHA512b3caeb925a71e99121b34cd1644f199e33a9b73b435cafb47bba0ffb7156d71b3b3ac424076cf0a600eeb422cb358420915a29b97c974937ebf9186bea05938d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD530cd8c00307286863dba2ec13fb2a611
SHA165815b908d5fd2905f70240d6dfe6e17f3c78aa1
SHA256c68192f008c1b7638e18ec1a6e5787953ea6775bb33acf9a12f64440f3b788e7
SHA51276a903bdb21ae382cd737432b2f5b3152589a3d3863c9120e9ad850d8cb46e07b90ed42f21d74840d4dc1383f2aee7bfc24f3f10eba94858e84af762bd404335