Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
04-08-2024 07:46
Behavioral task
behavioral1
Sample
b93f7881155103cb85a167145bbe594b.bin.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b93f7881155103cb85a167145bbe594b.bin.exe
Resource
win10v2004-20240802-en
General
-
Target
b93f7881155103cb85a167145bbe594b.bin.exe
-
Size
7.4MB
-
MD5
4bbc93cc56bf15816d8ce4ddc23a6a17
-
SHA1
d9f560d25157fc978c7b5c0f216c21958687a7d5
-
SHA256
7716fc431a6486354a6f450cdd275e05c63ae8bb7614cf8ad4509e1c67427a95
-
SHA512
46d359082e10b7c4b5b012678b99c8bb618b5190713aa9c7c972cef4bdec8a922bb3a30c4ef77b2d7b603e0c27cb64dd4312736c9c4830faa23a059e626a7152
-
SSDEEP
98304:diMrdaUIJ3sxQvmzLvqwBOZTcjgxffDjqJbzEwqWfm1Rqvn:Yi68xQ+zLJOZwjgZ7CfaRSn
Malware Config
Extracted
rhadamanthys
https://109.120.185.28:443/e0bd9c1f4515facb49/gj28n35o.2n73x
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral2/memory/2868-1-0x0000000000330000-0x0000000000B2C000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1064 created 2952 1064 explorer.exe 51 -
Deletes itself 1 IoCs
pid Process 4916 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 4916 2868 b93f7881155103cb85a167145bbe594b.bin.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b93f7881155103cb85a167145bbe594b.bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2868 b93f7881155103cb85a167145bbe594b.bin.exe 2868 b93f7881155103cb85a167145bbe594b.bin.exe 4916 cmd.exe 4916 cmd.exe 1064 explorer.exe 1064 explorer.exe 3520 openwith.exe 3520 openwith.exe 3520 openwith.exe 3520 openwith.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2868 b93f7881155103cb85a167145bbe594b.bin.exe 4916 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2868 b93f7881155103cb85a167145bbe594b.bin.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2868 wrote to memory of 4916 2868 b93f7881155103cb85a167145bbe594b.bin.exe 88 PID 2868 wrote to memory of 4916 2868 b93f7881155103cb85a167145bbe594b.bin.exe 88 PID 2868 wrote to memory of 4916 2868 b93f7881155103cb85a167145bbe594b.bin.exe 88 PID 2868 wrote to memory of 4916 2868 b93f7881155103cb85a167145bbe594b.bin.exe 88 PID 4916 wrote to memory of 1064 4916 cmd.exe 90 PID 4916 wrote to memory of 1064 4916 cmd.exe 90 PID 4916 wrote to memory of 1064 4916 cmd.exe 90 PID 4916 wrote to memory of 1064 4916 cmd.exe 90 PID 1064 wrote to memory of 3520 1064 explorer.exe 94 PID 1064 wrote to memory of 3520 1064 explorer.exe 94 PID 1064 wrote to memory of 3520 1064 explorer.exe 94 PID 1064 wrote to memory of 3520 1064 explorer.exe 94 PID 1064 wrote to memory of 3520 1064 explorer.exe 94
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2952
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\b93f7881155103cb85a167145bbe594b.bin.exe"C:\Users\Admin\AppData\Local\Temp\b93f7881155103cb85a167145bbe594b.bin.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50cc3d3a4a1820d73c5d91c9bcd23058b
SHA14d23764677aa91ca61888ccc84b48fe3a463e709
SHA2565775ee07bf2a9761de494aed1e24a4a365dbe06f9e97b053b65ce42dec7a9d36
SHA5124b96e1bb804f16ec09aca3de8e2451f8cd72e1257e9bb35587783bd866d306211ab8a6417df2e4eb14935be9567b1f3eee3fc84795a9698e8b2945f4ca958ce7