Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 05:56
Behavioral task
behavioral1
Sample
updateload2.exe
Resource
win10v2004-20240802-en
General
-
Target
updateload2.exe
-
Size
4.1MB
-
MD5
f284c82401fcbac1bdde4b71a0af9798
-
SHA1
c9390dc649d0f9e25339f87d7d5a59f58cd6b7df
-
SHA256
9c760353cd7593ae5b5bdd79405a16568b2b7cb68fd7ad7cc5863b69a105a62d
-
SHA512
b2b5564ec6012a04eff51349ddea2b7fab79599a46fae41376343d25f14d39329a525faad61513de7e93dd5d49c50dc5c7ed8a1022a33ba424f6c6dd99154366
-
SSDEEP
98304:BiaVRBZ1vtleQ0TrFbpKyXTp/8zf8R9Mr4/Eof:B9Vt/eQiqyN/8zUs6d
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/4932-0-0x00000000002E0000-0x0000000000459000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4640 created 2804 4640 explorer.exe 50 -
Deletes itself 1 IoCs
pid Process 4812 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4932 set thread context of 4812 4932 updateload2.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updateload2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4932 updateload2.exe 4932 updateload2.exe 4812 cmd.exe 4812 cmd.exe 4640 explorer.exe 4640 explorer.exe 1952 openwith.exe 1952 openwith.exe 1952 openwith.exe 1952 openwith.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4932 updateload2.exe 4812 cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4932 wrote to memory of 4812 4932 updateload2.exe 86 PID 4932 wrote to memory of 4812 4932 updateload2.exe 86 PID 4932 wrote to memory of 4812 4932 updateload2.exe 86 PID 4932 wrote to memory of 4812 4932 updateload2.exe 86 PID 4812 wrote to memory of 4640 4812 cmd.exe 88 PID 4812 wrote to memory of 4640 4812 cmd.exe 88 PID 4812 wrote to memory of 4640 4812 cmd.exe 88 PID 4812 wrote to memory of 4640 4812 cmd.exe 88 PID 4640 wrote to memory of 1952 4640 explorer.exe 92 PID 4640 wrote to memory of 1952 4640 explorer.exe 92 PID 4640 wrote to memory of 1952 4640 explorer.exe 92 PID 4640 wrote to memory of 1952 4640 explorer.exe 92 PID 4640 wrote to memory of 1952 4640 explorer.exe 92
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2804
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\updateload2.exe"C:\Users\Admin\AppData\Local\Temp\updateload2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD51b9a0965e12c85a7593d40e6c1bfb664
SHA1ce2a2d9fd338196c9e818ec91b77be6dcd6df19d
SHA256aa75298aa2e2ee055d35286ed0e60866a786091d6e3ae590ff91e172deb7c072
SHA512817602146d2df54cb3b8f060493ce16eef35e82d84dda0ad7d656b1d83e99baa5cffc3ad0dd1bf2cd3ecd83a4cdf82c9185315da80ad4d8723dc61812cf415de