Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
Resource
win10v2004-20240709-en
General
-
Target
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe
-
Size
4.3MB
-
MD5
651962c322d049e7271543d8d2673311
-
SHA1
e4a3c9a15006aae882697cff0ec90795f658ee94
-
SHA256
33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546
-
SHA512
121b96a1ce8e12924e41c2243cea25dbc13240c6cfadcfe01aecbea1c6676261cbcf89677fb1a8e429e22d47b1030b9e24e03b96a5f7e956316f02bd8d2c74b1
-
SSDEEP
98304:fh0DJ8JeTBYX6L9jeMr31y0pv/u4EmRIO3HLWjds/ht/tpxeSZ:bJeTKX6L9fHBW4bW+zdeS
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1720 created 2584 1720 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 44 -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 5452 powershell.exe 5568 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe -
Executes dropped EXE 4 IoCs
pid Process 4308 blue.exe 2404 blue.exe 6088 Version.exe 5116 Version.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1184 set thread context of 1720 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 95 PID 4308 set thread context of 2404 4308 blue.exe 99 PID 6088 set thread context of 5116 6088 Version.exe 111 PID 5116 set thread context of 3800 5116 Version.exe 117 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1720 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 1720 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 4684 openwith.exe 4684 openwith.exe 4684 openwith.exe 4684 openwith.exe 5568 powershell.exe 5568 powershell.exe 5116 Version.exe 5116 Version.exe 5116 Version.exe 5116 Version.exe 5452 powershell.exe 5452 powershell.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe Token: SeDebugPrivilege 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe Token: SeDebugPrivilege 4308 blue.exe Token: SeDebugPrivilege 4308 blue.exe Token: SeDebugPrivilege 2404 blue.exe Token: SeDebugPrivilege 5568 powershell.exe Token: SeDebugPrivilege 6088 Version.exe Token: SeDebugPrivilege 6088 Version.exe Token: SeDebugPrivilege 5116 Version.exe Token: SeDebugPrivilege 3800 InstallUtil.exe Token: SeDebugPrivilege 5452 powershell.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1184 wrote to memory of 4308 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 94 PID 1184 wrote to memory of 4308 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 94 PID 1184 wrote to memory of 4308 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 94 PID 1184 wrote to memory of 1720 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 95 PID 1184 wrote to memory of 1720 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 95 PID 1184 wrote to memory of 1720 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 95 PID 1184 wrote to memory of 1720 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 95 PID 1184 wrote to memory of 1720 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 95 PID 1184 wrote to memory of 1720 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 95 PID 1184 wrote to memory of 1720 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 95 PID 1184 wrote to memory of 1720 1184 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 95 PID 1720 wrote to memory of 4684 1720 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 96 PID 1720 wrote to memory of 4684 1720 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 96 PID 1720 wrote to memory of 4684 1720 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 96 PID 1720 wrote to memory of 4684 1720 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 96 PID 1720 wrote to memory of 4684 1720 33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe 96 PID 4308 wrote to memory of 2404 4308 blue.exe 99 PID 4308 wrote to memory of 2404 4308 blue.exe 99 PID 4308 wrote to memory of 2404 4308 blue.exe 99 PID 4308 wrote to memory of 2404 4308 blue.exe 99 PID 4308 wrote to memory of 2404 4308 blue.exe 99 PID 4308 wrote to memory of 2404 4308 blue.exe 99 PID 4308 wrote to memory of 2404 4308 blue.exe 99 PID 4308 wrote to memory of 2404 4308 blue.exe 99 PID 6088 wrote to memory of 5116 6088 Version.exe 111 PID 6088 wrote to memory of 5116 6088 Version.exe 111 PID 6088 wrote to memory of 5116 6088 Version.exe 111 PID 6088 wrote to memory of 5116 6088 Version.exe 111 PID 6088 wrote to memory of 5116 6088 Version.exe 111 PID 6088 wrote to memory of 5116 6088 Version.exe 111 PID 6088 wrote to memory of 5116 6088 Version.exe 111 PID 6088 wrote to memory of 5116 6088 Version.exe 111 PID 5116 wrote to memory of 3868 5116 Version.exe 116 PID 5116 wrote to memory of 3868 5116 Version.exe 116 PID 5116 wrote to memory of 3868 5116 Version.exe 116 PID 5116 wrote to memory of 3800 5116 Version.exe 117 PID 5116 wrote to memory of 3800 5116 Version.exe 117 PID 5116 wrote to memory of 3800 5116 Version.exe 117 PID 5116 wrote to memory of 3800 5116 Version.exe 117 PID 5116 wrote to memory of 3800 5116 Version.exe 117 PID 5116 wrote to memory of 3800 5116 Version.exe 117 PID 5116 wrote to memory of 3800 5116 Version.exe 117 PID 5116 wrote to memory of 3800 5116 Version.exe 117
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2584
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\blue.exe"C:\Users\Admin\AppData\Local\Temp\blue.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\blue.exe"C:\Users\Admin\AppData\Local\Temp\blue.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"C:\Users\Admin\AppData\Local\Temp\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVgBlAHIAcwBpAG8AbgAuAGUAeABlADsA1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5568
-
C:\Users\Admin\AppData\Local\AuditRuleType\byopt\Version.exeC:\Users\Admin\AppData\Local\AuditRuleType\byopt\Version.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6088 -
C:\Users\Admin\AppData\Local\AuditRuleType\byopt\Version.exe"C:\Users\Admin\AppData\Local\AuditRuleType\byopt\Version.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:3868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVgBlAHIAcwBpAG8AbgAuAGUAeABlADsA1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\33682e861b76b0ae22b7361f5b59bb7e69b95e69480156714f01e7044408b546.exe.log
Filesize958B
MD52653ec7e43bfbe52024d5bf4ec27a515
SHA1a08848300075d1c0b385532d840a43e1fd7251fa
SHA2565d7f555a970cc34988aac2e5deaccfc12ef69b5d9ea55fd8d31a9b4b8377f4f2
SHA512b3caeb925a71e99121b34cd1644f199e33a9b73b435cafb47bba0ffb7156d71b3b3ac424076cf0a600eeb422cb358420915a29b97c974937ebf9186bea05938d
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD530cd8c00307286863dba2ec13fb2a611
SHA165815b908d5fd2905f70240d6dfe6e17f3c78aa1
SHA256c68192f008c1b7638e18ec1a6e5787953ea6775bb33acf9a12f64440f3b788e7
SHA51276a903bdb21ae382cd737432b2f5b3152589a3d3863c9120e9ad850d8cb46e07b90ed42f21d74840d4dc1383f2aee7bfc24f3f10eba94858e84af762bd404335