Analysis
-
max time kernel
114s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
223a3aa520689c0021d8ce51024d5bb0N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
223a3aa520689c0021d8ce51024d5bb0N.dll
Resource
win10v2004-20240802-en
General
-
Target
223a3aa520689c0021d8ce51024d5bb0N.dll
-
Size
3.7MB
-
MD5
223a3aa520689c0021d8ce51024d5bb0
-
SHA1
1fbcb94006ea1b3dd1796cebe0e78fb0b9b6a874
-
SHA256
66ffa9d4e27a9f787eaa47364d57b95feae92af35ab154299c5134eacc9f4c42
-
SHA512
b329830a0b22310e4262bd071edfaf38afa199bb428dc1f99b31c83df0f699eb842e6a466d803670d5066780217e7eb966e505262c3620eeb922629ee6883fe3
-
SSDEEP
98304:ziXAEqfpQA7KhbchheGvUapVXNe1gNuqh+CaO:eQxRQA7K9QPfZNe1rqh+
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 400 created 2820 400 rundll32.exe 49 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CrowdstrikeEngine = "rundll32.exe C:\\Users\\Admin\\Documents\\WDEngineUpdater.dll,EntryPoint" reg.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 968 400 WerFault.exe 93 3960 400 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.execmd.exereg.exeopenwith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exeopenwith.exepid Process 400 rundll32.exe 400 rundll32.exe 4472 openwith.exe 4472 openwith.exe 4472 openwith.exe 4472 openwith.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
rundll32.exerundll32.execmd.exerundll32.exedescription pid Process procid_target PID 1880 wrote to memory of 4384 1880 rundll32.exe 84 PID 1880 wrote to memory of 4384 1880 rundll32.exe 84 PID 1880 wrote to memory of 4384 1880 rundll32.exe 84 PID 4384 wrote to memory of 400 4384 rundll32.exe 93 PID 4384 wrote to memory of 400 4384 rundll32.exe 93 PID 4384 wrote to memory of 400 4384 rundll32.exe 93 PID 4384 wrote to memory of 400 4384 rundll32.exe 93 PID 4384 wrote to memory of 400 4384 rundll32.exe 93 PID 4384 wrote to memory of 4292 4384 rundll32.exe 94 PID 4384 wrote to memory of 4292 4384 rundll32.exe 94 PID 4384 wrote to memory of 4292 4384 rundll32.exe 94 PID 4292 wrote to memory of 3100 4292 cmd.exe 96 PID 4292 wrote to memory of 3100 4292 cmd.exe 96 PID 4292 wrote to memory of 3100 4292 cmd.exe 96 PID 400 wrote to memory of 4472 400 rundll32.exe 98 PID 400 wrote to memory of 4472 400 rundll32.exe 98 PID 400 wrote to memory of 4472 400 rundll32.exe 98 PID 400 wrote to memory of 4472 400 rundll32.exe 98 PID 400 wrote to memory of 4472 400 rundll32.exe 98
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2820
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\223a3aa520689c0021d8ce51024d5bb0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\223a3aa520689c0021d8ce51024d5bb0N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 6004⤵
- Program crash
PID:968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 5924⤵
- Program crash
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\WDEngineUpdater.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\WDEngineUpdater.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3100
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 400 -ip 4001⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 400 -ip 4001⤵PID:2056