Analysis
-
max time kernel
422s -
max time network
443s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 09:01
Behavioral task
behavioral1
Sample
Copyright infringement record.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Copyright infringement record.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Copyright infringement record.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Copyright infringement record.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
msimg32.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
msimg32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
renameme.pdf
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
renameme.pdf
Resource
win10v2004-20240802-en
General
-
Target
msimg32.dll
-
Size
4.9MB
-
MD5
edfe2dd4d8218d13e1e6aa5501d5163b
-
SHA1
d3212ebb64dce90a8c972bf3a6f1ad734bc39b08
-
SHA256
1a2399ecc38f3288206c75b55762d125d3d75254062a2c0d85c86e7f896736ac
-
SHA512
282df1a436549af672dad5e74eb0617c882ec1665c6bad112850a7666cd93d2fa5f18f2935d0ebaa8562d592adcab380c6dc5a9117ec373fbf1310caef65035f
-
SSDEEP
49152:JErEyCal8VnN+LwbEOCAQFhZ81wm+R9BlwxPJfkwDQby1uZLOkALP7fivHdHufrF:JElCQ8VN+TAghZbR9y6wKyskkk2HOh
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4636 created 3020 4636 rundll32.exe 50 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*ChromeUpdate = "rundll32.exe C:\\Users\\Admin\\Documents\\FirefoxData.dll,EntryPoint" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4400 rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1504 4636 WerFault.exe 85 3772 4636 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4636 rundll32.exe 4636 rundll32.exe 3464 openwith.exe 3464 openwith.exe 3464 openwith.exe 3464 openwith.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2676 wrote to memory of 4400 2676 rundll32.exe 84 PID 2676 wrote to memory of 4400 2676 rundll32.exe 84 PID 2676 wrote to memory of 4400 2676 rundll32.exe 84 PID 4400 wrote to memory of 4636 4400 rundll32.exe 85 PID 4400 wrote to memory of 4636 4400 rundll32.exe 85 PID 4400 wrote to memory of 4636 4400 rundll32.exe 85 PID 4400 wrote to memory of 4636 4400 rundll32.exe 85 PID 4400 wrote to memory of 4636 4400 rundll32.exe 85 PID 4400 wrote to memory of 4636 4400 rundll32.exe 85 PID 4400 wrote to memory of 2616 4400 rundll32.exe 86 PID 4400 wrote to memory of 2616 4400 rundll32.exe 86 PID 4400 wrote to memory of 2616 4400 rundll32.exe 86 PID 2616 wrote to memory of 4304 2616 cmd.exe 88 PID 2616 wrote to memory of 4304 2616 cmd.exe 88 PID 2616 wrote to memory of 4304 2616 cmd.exe 88 PID 4636 wrote to memory of 3464 4636 rundll32.exe 89 PID 4636 wrote to memory of 3464 4636 rundll32.exe 89 PID 4636 wrote to memory of 3464 4636 rundll32.exe 89 PID 4636 wrote to memory of 3464 4636 rundll32.exe 89 PID 4636 wrote to memory of 3464 4636 rundll32.exe 89
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3020
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#12⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 5364⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 5324⤵
- Program crash
PID:3772
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4304
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4636 -ip 46361⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4636 -ip 46361⤵PID:1988