Analysis

  • max time kernel
    114s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 19:17

General

  • Target

    223a3aa520689c0021d8ce51024d5bb0N.dll

  • Size

    3.7MB

  • MD5

    223a3aa520689c0021d8ce51024d5bb0

  • SHA1

    1fbcb94006ea1b3dd1796cebe0e78fb0b9b6a874

  • SHA256

    66ffa9d4e27a9f787eaa47364d57b95feae92af35ab154299c5134eacc9f4c42

  • SHA512

    b329830a0b22310e4262bd071edfaf38afa199bb428dc1f99b31c83df0f699eb842e6a466d803670d5066780217e7eb966e505262c3620eeb922629ee6883fe3

  • SSDEEP

    98304:ziXAEqfpQA7KhbchheGvUapVXNe1gNuqh+CaO:eQxRQA7K9QPfZNe1rqh+

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2820
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4472
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\223a3aa520689c0021d8ce51024d5bb0N.dll,#1
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\223a3aa520689c0021d8ce51024d5bb0N.dll,#1
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4384
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\SysWOW64\rundll32.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:400
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 600
            4⤵
            • Program crash
            PID:968
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 592
            4⤵
            • Program crash
            PID:3960
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\WDEngineUpdater.dll",EntryPoint /f & exit
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4292
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "CrowdstrikeEngine" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\WDEngineUpdater.dll",EntryPoint /f
            4⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:3100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 400 -ip 400
      1⤵
        PID:2076
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 400 -ip 400
        1⤵
          PID:2056

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/400-2-0x0000000000AE0000-0x0000000000B5E000-memory.dmp

          Filesize

          504KB

        • memory/400-33-0x0000000003920000-0x0000000003D20000-memory.dmp

          Filesize

          4.0MB

        • memory/400-7-0x0000000000AE0000-0x0000000000B5E000-memory.dmp

          Filesize

          504KB

        • memory/400-16-0x0000000000AE0000-0x0000000000B5E000-memory.dmp

          Filesize

          504KB

        • memory/400-23-0x0000000076E70000-0x0000000077085000-memory.dmp

          Filesize

          2.1MB

        • memory/400-18-0x0000000003920000-0x0000000003D20000-memory.dmp

          Filesize

          4.0MB

        • memory/400-19-0x0000000003920000-0x0000000003D20000-memory.dmp

          Filesize

          4.0MB

        • memory/400-20-0x00007FFAA3230000-0x00007FFAA3425000-memory.dmp

          Filesize

          2.0MB

        • memory/400-21-0x0000000003920000-0x0000000003D20000-memory.dmp

          Filesize

          4.0MB

        • memory/400-17-0x0000000003920000-0x0000000003D20000-memory.dmp

          Filesize

          4.0MB

        • memory/400-6-0x0000000000AE0000-0x0000000000B5E000-memory.dmp

          Filesize

          504KB

        • memory/4384-1-0x0000000045DE0000-0x0000000045DFA000-memory.dmp

          Filesize

          104KB

        • memory/4384-15-0x0000000046108000-0x0000000046133000-memory.dmp

          Filesize

          172KB

        • memory/4384-5-0x0000000045DB0000-0x0000000046163000-memory.dmp

          Filesize

          3.7MB

        • memory/4384-0-0x0000000045DB0000-0x0000000046163000-memory.dmp

          Filesize

          3.7MB

        • memory/4384-10-0x0000000046105000-0x0000000046133000-memory.dmp

          Filesize

          184KB

        • memory/4384-11-0x00000000460CD000-0x00000000460D1000-memory.dmp

          Filesize

          16KB

        • memory/4384-12-0x00000000460D2000-0x00000000460D7000-memory.dmp

          Filesize

          20KB

        • memory/4384-13-0x00000000460D6000-0x0000000046106000-memory.dmp

          Filesize

          192KB

        • memory/4384-14-0x00000000460DA000-0x0000000046106000-memory.dmp

          Filesize

          176KB

        • memory/4384-3-0x0000000045DB0000-0x0000000046163000-memory.dmp

          Filesize

          3.7MB

        • memory/4384-4-0x0000000045DB0000-0x0000000046163000-memory.dmp

          Filesize

          3.7MB

        • memory/4472-31-0x0000000002770000-0x0000000002B70000-memory.dmp

          Filesize

          4.0MB

        • memory/4472-30-0x0000000076E70000-0x0000000077085000-memory.dmp

          Filesize

          2.1MB

        • memory/4472-28-0x00007FFAA3230000-0x00007FFAA3425000-memory.dmp

          Filesize

          2.0MB

        • memory/4472-27-0x0000000002770000-0x0000000002B70000-memory.dmp

          Filesize

          4.0MB

        • memory/4472-32-0x0000000002770000-0x0000000002B70000-memory.dmp

          Filesize

          4.0MB

        • memory/4472-24-0x0000000000C60000-0x0000000000C69000-memory.dmp

          Filesize

          36KB

        • memory/4472-26-0x0000000002770000-0x0000000002B70000-memory.dmp

          Filesize

          4.0MB