Overview
overview
10Static
static
1GalaxyFlip...ox.rar
windows7-x64
3GalaxyFlip...ox.rar
windows10-2004-x64
3BloxFlip.exe
windows7-x64
10BloxFlip.exe
windows10-2004-x64
10CustomWinApi.hpp
windows7-x64
3CustomWinApi.hpp
windows10-2004-x64
3D3DX9_43.dll
windows7-x64
1D3DX9_43.dll
windows10-2004-x64
1VMProtectSDK64.lib
windows7-x64
3VMProtectSDK64.lib
windows10-2004-x64
3auth.hpp
windows7-x64
3auth.hpp
windows10-2004-x64
3d3d_Hook.cpp
windows7-x64
3d3d_Hook.cpp
windows10-2004-x64
3imgui.ini
windows7-x64
1imgui.ini
windows10-2004-x64
1Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
GalaxyFlipv2.0Roblox.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GalaxyFlipv2.0Roblox.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
BloxFlip.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
BloxFlip.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CustomWinApi.hpp
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
CustomWinApi.hpp
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
D3DX9_43.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
D3DX9_43.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
VMProtectSDK64.lib
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
VMProtectSDK64.lib
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
auth.hpp
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
auth.hpp
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
d3d_Hook.cpp
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
d3d_Hook.cpp
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
imgui.ini
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
imgui.ini
Resource
win10v2004-20240802-en
General
-
Target
BloxFlip.exe
-
Size
702KB
-
MD5
5e8eefdad5b8ab9b1b47f269ca27d8f7
-
SHA1
ba66cf53cfe996d904e57b9409b349da62bb5d27
-
SHA256
e915dccc9e65da534932476e8cec4b7e5446dbd022f242e9302ac18d2a041df5
-
SHA512
3f353dd053e4cd18cb7c56237230d026404a8c217084e740b152ff3e9e3c8ecf0649dbdc5e98617d82086f2b340588741c7afdf4326e1f6bf56242bf7a8c58a8
-
SSDEEP
12288:uQjtwieaRtNsy+vMyX/A8MAnz8gCWxjijlLRjPrDuTsu3WfRme3I:uQjtQatuVY8MAnzCM2RjziTsuERmoI
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 5 IoCs
Processes:
resource yara_rule behavioral4/memory/4884-5-0x0000000003070000-0x0000000003470000-memory.dmp family_rhadamanthys behavioral4/memory/4884-6-0x0000000003070000-0x0000000003470000-memory.dmp family_rhadamanthys behavioral4/memory/4884-7-0x0000000003070000-0x0000000003470000-memory.dmp family_rhadamanthys behavioral4/memory/4884-8-0x0000000003070000-0x0000000003470000-memory.dmp family_rhadamanthys behavioral4/memory/4884-10-0x0000000003070000-0x0000000003470000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
BloxFlip.exedescription pid Process procid_target PID 2324 set thread context of 4884 2324 BloxFlip.exe 93 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2864 2324 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AppLaunch.exeBloxFlip.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BloxFlip.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 AppLaunch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid Process 4884 AppLaunch.exe 4884 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AppLaunch.exedescription pid Process Token: SeShutdownPrivilege 4884 AppLaunch.exe Token: SeCreatePagefilePrivilege 4884 AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
BloxFlip.exedescription pid Process procid_target PID 2324 wrote to memory of 4884 2324 BloxFlip.exe 93 PID 2324 wrote to memory of 4884 2324 BloxFlip.exe 93 PID 2324 wrote to memory of 4884 2324 BloxFlip.exe 93 PID 2324 wrote to memory of 4884 2324 BloxFlip.exe 93 PID 2324 wrote to memory of 4884 2324 BloxFlip.exe 93 PID 2324 wrote to memory of 4884 2324 BloxFlip.exe 93 PID 2324 wrote to memory of 4884 2324 BloxFlip.exe 93 PID 2324 wrote to memory of 4884 2324 BloxFlip.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\BloxFlip.exe"C:\Users\Admin\AppData\Local\Temp\BloxFlip.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 2842⤵
- Program crash
PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2324 -ip 23241⤵PID:4776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4376,i,11708048364682646792,608099842549576907,262144 --variations-seed-version --mojo-platform-channel-handle=4392 /prefetch:81⤵PID:3424