Overview
overview
10Static
static
1GalaxyFlip...ox.rar
windows7-x64
3GalaxyFlip...ox.rar
windows10-2004-x64
3BloxFlip.exe
windows7-x64
10BloxFlip.exe
windows10-2004-x64
10CustomWinApi.hpp
windows7-x64
3CustomWinApi.hpp
windows10-2004-x64
3D3DX9_43.dll
windows7-x64
1D3DX9_43.dll
windows10-2004-x64
1VMProtectSDK64.lib
windows7-x64
3VMProtectSDK64.lib
windows10-2004-x64
3auth.hpp
windows7-x64
3auth.hpp
windows10-2004-x64
3d3d_Hook.cpp
windows7-x64
3d3d_Hook.cpp
windows10-2004-x64
3imgui.ini
windows7-x64
1imgui.ini
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
GalaxyFlipv2.0Roblox.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GalaxyFlipv2.0Roblox.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BloxFlip.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
BloxFlip.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CustomWinApi.hpp
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
CustomWinApi.hpp
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
D3DX9_43.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
D3DX9_43.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
VMProtectSDK64.lib
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
VMProtectSDK64.lib
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
auth.hpp
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
auth.hpp
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
d3d_Hook.cpp
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
d3d_Hook.cpp
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
imgui.ini
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
imgui.ini
Resource
win10v2004-20240802-en
General
-
Target
BloxFlip.exe
-
Size
702KB
-
MD5
5e8eefdad5b8ab9b1b47f269ca27d8f7
-
SHA1
ba66cf53cfe996d904e57b9409b349da62bb5d27
-
SHA256
e915dccc9e65da534932476e8cec4b7e5446dbd022f242e9302ac18d2a041df5
-
SHA512
3f353dd053e4cd18cb7c56237230d026404a8c217084e740b152ff3e9e3c8ecf0649dbdc5e98617d82086f2b340588741c7afdf4326e1f6bf56242bf7a8c58a8
-
SSDEEP
12288:uQjtwieaRtNsy+vMyX/A8MAnz8gCWxjijlLRjPrDuTsu3WfRme3I:uQjtQatuVY8MAnzCM2RjziTsuERmoI
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral3/memory/2772-12-0x00000000021E0000-0x00000000025E0000-memory.dmp family_rhadamanthys behavioral3/memory/2772-11-0x00000000021E0000-0x00000000025E0000-memory.dmp family_rhadamanthys behavioral3/memory/2772-14-0x00000000021E0000-0x00000000025E0000-memory.dmp family_rhadamanthys behavioral3/memory/2772-13-0x00000000021E0000-0x00000000025E0000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
BloxFlip.exedescription pid Process procid_target PID 2704 set thread context of 2772 2704 BloxFlip.exe 31 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2904 2704 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AppLaunch.exeBloxFlip.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BloxFlip.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid Process 2772 AppLaunch.exe 2772 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid Process Token: SeShutdownPrivilege 2772 AppLaunch.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
BloxFlip.exedescription pid Process procid_target PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2772 2704 BloxFlip.exe 31 PID 2704 wrote to memory of 2904 2704 BloxFlip.exe 32 PID 2704 wrote to memory of 2904 2704 BloxFlip.exe 32 PID 2704 wrote to memory of 2904 2704 BloxFlip.exe 32 PID 2704 wrote to memory of 2904 2704 BloxFlip.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\BloxFlip.exe"C:\Users\Admin\AppData\Local\Temp\BloxFlip.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 922⤵
- Program crash
PID:2904
-