Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 01:34

General

  • Target

    c4455930a4ee15f3a7abecc4b0dc97911baf6b65b625849bc309fda3929432b4.msi

  • Size

    1.5MB

  • MD5

    1ab7db273d2431aed5d5bab9c1847246

  • SHA1

    95393b511fad6e7017f3a7c57014004a2ebca17d

  • SHA256

    c4455930a4ee15f3a7abecc4b0dc97911baf6b65b625849bc309fda3929432b4

  • SHA512

    50add971d394ccbc31b145466ebc8611b6e030d69de0bf2475175ceedf2426f1460ca6c0d0d8ff8d216c557e03fca2788b75c80e161fcf934649cc42f9946d08

  • SSDEEP

    24576:DKxfS0jEhnJ/mhGd6NFTzqh0lhSMXlTnD55U0zjjZqKtaTakjWCtFGuUK7XgW2:DiycFTznj95U0zjjZZtmzjRGuUK75

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Loads dropped DLL 6 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2664
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1992
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\c4455930a4ee15f3a7abecc4b0dc97911baf6b65b625849bc309fda3929432b4.msi
      1⤵
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:5036
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4992
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 846006CFFD75182688E6B1D08F763563
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1900
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57e69a.rbs

      Filesize

      999B

      MD5

      c934c2a8b7e455fd73f584c27cda5fc8

      SHA1

      7d8685869f7df47e8f026ffb4dd7b56c95a42437

      SHA256

      f7a394696f499e75f874d29d8f4259a57649138980c5663de8125390445da821

      SHA512

      061397a2f5c0ead31f5f79e714f2d5d9dfacf6e050e2286d103cead1385e61e2bb1fee86c82e8c9048a5d686c082d8ad9a7b911aecd008a2942023fc8115ab3b

    • C:\Users\Admin\cr.dll

      Filesize

      2.5MB

      MD5

      0e8161c93aa083c2649182ec398e5a27

      SHA1

      fa0ae74e18b45378f0c7abb1b8a080a1702e6efb

      SHA256

      522b7a28eb6cfdf01c631f6007f46cabf2578d82a3ef027cd33c69628ed2fd97

      SHA512

      03920f59200d44710d035768970f51a896601ac6bbf7543823dda81949d5e80f7c083a2cc548226d86fdf837a957ed62ac7d4d2326e5176fb83da79d8b6f5a5b

    • C:\Windows\Installer\MSIE791.tmp

      Filesize

      738KB

      MD5

      8e65fea37f700d948d1b67afd43b97fc

      SHA1

      823d2b30ec0372e0dc36f7983ad2de1ceda4036c

      SHA256

      20c648a2a4313b1b20da50a9b788d8a1b9637e154adae4541b65badaa40266c9

      SHA512

      07faf03685fde9c71f6bc4b3caecfe4d3c707a8bec5bce1a544f59c1f853edde8f37c019c16bffd3e8fbe5c72c0666ffe0e2dffd878744da64f47e52c7625084

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      e4339a15f2c14c1764974d9a923a1f30

      SHA1

      4fe5257c12dc0d4efe478507a225858d2ed76989

      SHA256

      4480608af1710a3cf8e50d5dc634dab58fd662cae666dc6b1947980bfcb13bcf

      SHA512

      0e3a909576e98404f6047a98433ff52780ee2129f5d845d3519fd4ec5e108efb3cd61b2218ee4f6fb3e3ab2bd90775db7c9ce3bc2ec941ecbf38649fdb10c154

    • \??\Volume{1c684046-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{3ee18830-b1fc-40f3-9db6-31b0cb11ede9}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      f2c6af255bd2dc55ca94e2c44824839b

      SHA1

      adbfaec53a122986ad3eed37b5eb60015115cbc0

      SHA256

      4199a9978c23a9ef4934c4c594ea937881d7e3d071b5cf40a5e369f581fd8bf6

      SHA512

      4a8bfd0f39f25e640f1815f45748594de2be9730feec6e448c9d7d68d573c9545d53ac2039835cf5cc1a288addb618e1b47be9dbf8df3d000b3d6b31804702ac

    • memory/1900-36-0x0000000003AE0000-0x0000000003EE0000-memory.dmp

      Filesize

      4.0MB

    • memory/1900-40-0x00000000758B0000-0x0000000075AC5000-memory.dmp

      Filesize

      2.1MB

    • memory/1900-42-0x0000000073320000-0x00000000735A5000-memory.dmp

      Filesize

      2.5MB

    • memory/1900-38-0x00007FFDC53D0000-0x00007FFDC55C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1900-37-0x0000000003AE0000-0x0000000003EE0000-memory.dmp

      Filesize

      4.0MB

    • memory/1900-35-0x0000000073320000-0x00000000735A5000-memory.dmp

      Filesize

      2.5MB

    • memory/1992-41-0x0000000000470000-0x0000000000479000-memory.dmp

      Filesize

      36KB

    • memory/1992-52-0x0000000002060000-0x0000000002460000-memory.dmp

      Filesize

      4.0MB

    • memory/1992-53-0x00007FFDC53D0000-0x00007FFDC55C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1992-55-0x00000000758B0000-0x0000000075AC5000-memory.dmp

      Filesize

      2.1MB