Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
submitted
04-08-2024 07:46
Behavioral task
behavioral1
Sample
b93f7881155103cb85a167145bbe594b.bin.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b93f7881155103cb85a167145bbe594b.bin.exe
Resource
win10v2004-20240802-en
General
-
Target
b93f7881155103cb85a167145bbe594b.bin.exe
-
Size
7.4MB
-
MD5
4bbc93cc56bf15816d8ce4ddc23a6a17
-
SHA1
d9f560d25157fc978c7b5c0f216c21958687a7d5
-
SHA256
7716fc431a6486354a6f450cdd275e05c63ae8bb7614cf8ad4509e1c67427a95
-
SHA512
46d359082e10b7c4b5b012678b99c8bb618b5190713aa9c7c972cef4bdec8a922bb3a30c4ef77b2d7b603e0c27cb64dd4312736c9c4830faa23a059e626a7152
-
SSDEEP
98304:diMrdaUIJ3sxQvmzLvqwBOZTcjgxffDjqJbzEwqWfm1Rqvn:Yi68xQ+zLJOZwjgZ7CfaRSn
Malware Config
Extracted
rhadamanthys
https://109.120.185.28:443/e0bd9c1f4515facb49/gj28n35o.2n73x
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/2540-1-0x0000000000400000-0x0000000000BFC000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Deletes itself 1 IoCs
pid Process 2080 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2540 set thread context of 2080 2540 b93f7881155103cb85a167145bbe594b.bin.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b93f7881155103cb85a167145bbe594b.bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2540 b93f7881155103cb85a167145bbe594b.bin.exe 2540 b93f7881155103cb85a167145bbe594b.bin.exe 2080 cmd.exe 2080 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2540 b93f7881155103cb85a167145bbe594b.bin.exe 2080 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2540 b93f7881155103cb85a167145bbe594b.bin.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2080 2540 b93f7881155103cb85a167145bbe594b.bin.exe 30 PID 2540 wrote to memory of 2080 2540 b93f7881155103cb85a167145bbe594b.bin.exe 30 PID 2540 wrote to memory of 2080 2540 b93f7881155103cb85a167145bbe594b.bin.exe 30 PID 2540 wrote to memory of 2080 2540 b93f7881155103cb85a167145bbe594b.bin.exe 30 PID 2540 wrote to memory of 2080 2540 b93f7881155103cb85a167145bbe594b.bin.exe 30 PID 2080 wrote to memory of 2840 2080 cmd.exe 33 PID 2080 wrote to memory of 2840 2080 cmd.exe 33 PID 2080 wrote to memory of 2840 2080 cmd.exe 33 PID 2080 wrote to memory of 2840 2080 cmd.exe 33 PID 2080 wrote to memory of 2840 2080 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b93f7881155103cb85a167145bbe594b.bin.exe"C:\Users\Admin\AppData\Local\Temp\b93f7881155103cb85a167145bbe594b.bin.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5ae140b168663b32b465f0779461b8e0b
SHA1b9bc54c935be7c8212c347ec1ebcd2c096bdba07
SHA256eb30a91edfab74933b1ca9c5af87e9e0efc173b8e1e06f0ef24dc98972a2dcb1
SHA5129a37eaa76ff482a34d462b4f25027c992a8422898f8eba93f298aba04d5fe916bfcd1309f47705b18b5fb9a37812cce76dad35e1a3fae3f86e4783ce74c54c0a