Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
submitted
31/07/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
Authenticator_v5.1.exe
Resource
win10v2004-20240730-en
General
-
Target
Authenticator_v5.1.exe
-
Size
1.9MB
-
MD5
c607e5a15a55a85f0fd6339c75dbe769
-
SHA1
36e24f54dd93166a2d42ebb222d4c15eefe7239b
-
SHA256
bd403309f8f43fc34d64917720f55c1dbcc50f250f1210bc8dec6c704d4ed461
-
SHA512
db157472ad89553b0a9578da6b5a5b07abe30741509f097f359fb1c40db3818e94f8134513d52627f0e889731dbdf4fc0bf4375ff3a0bdbb0892ca6e108391a6
-
SSDEEP
49152:IebOsgxw8eSymL1zO69MOpJjyTVKueFU4NXJ:P+N1K+luelXJ
Malware Config
Extracted
warmcookie
91.222.173.181
-
mutex
8952466e-ec09-4cf4-b3f8-01bed1b211dd
-
user_agent
Mozilla / 4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR 1.0.3705)
Extracted
rhadamanthys
https://92.246.139.64:7400/b7a8e4d36d60139c9974d297/e751wk8p.0713j
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5080 created 2584 5080 F53E.exe 44 -
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Executes dropped EXE 1 IoCs
pid Process 5080 F53E.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4008 5080 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F53E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Authenticator_v5.1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Authenticator_v5.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Authenticator_v5.1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Authenticator_v5.1.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Authenticator_v5.1.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5080 F53E.exe 5080 F53E.exe 4568 openwith.exe 4568 openwith.exe 4568 openwith.exe 4568 openwith.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4432 wrote to memory of 5080 4432 Authenticator_v5.1.exe 87 PID 4432 wrote to memory of 5080 4432 Authenticator_v5.1.exe 87 PID 4432 wrote to memory of 5080 4432 Authenticator_v5.1.exe 87 PID 5080 wrote to memory of 4568 5080 F53E.exe 88 PID 5080 wrote to memory of 4568 5080 F53E.exe 88 PID 5080 wrote to memory of 4568 5080 F53E.exe 88 PID 5080 wrote to memory of 4568 5080 F53E.exe 88 PID 5080 wrote to memory of 4568 5080 F53E.exe 88
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2584
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\Authenticator_v5.1.exe"C:\Users\Admin\AppData\Local\Temp\Authenticator_v5.1.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\datF53D.tmp\F53E.exe"C:\Users\Admin\AppData\Local\Temp\datF53D.tmp\F53E.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 4963⤵
- Program crash
PID:4008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5080 -ip 50801⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD59a9e54e2c0b5076ebbddd676c45a7c6e
SHA129969d8d71dd863088190dfcabb7713ffc8484ae
SHA2564a802496f5171c7f9d8862a579795c346489d7ab0b0b1b0df7da6621911e6b91
SHA512fc0d7f50c36b969bdb2af43834f947129ea1710599054100a01964b63a3541d06df6e3eeb8c782041ede182be3c9a7c16dbe498f4acac14c8a2646dc26510401