Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 21:19
Static task
static1
Behavioral task
behavioral1
Sample
Anubis.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Anubis.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
spooferconfig.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
spooferconfig.dll
Resource
win10v2004-20240802-en
General
-
Target
Anubis.exe
-
Size
1.2MB
-
MD5
c2adb7ff42f1c961035f17bad5bee12d
-
SHA1
e2ae36539f9ff88e8a89d750e99d15ea6e84f0dc
-
SHA256
4b350ae0b85aa7f7818e37e3f02397cd3667af8d62eb3132fb3297bd96a0abe2
-
SHA512
16413f90689cfa3fc509637bea54634ead1bba7f89d621bbc8096279f2413cd3477142a63becfa457e5756583c34049699ab1e960d1133dad2f72e3325ecb348
-
SSDEEP
24576:uDDgbYd14JwD00GR/L4Sgh5ovGpuIGPBgyjhgQJ8L/inWS:gcbILXoO3p9GP6ydk/inWS
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1620-18-0x0000000002030000-0x0000000002430000-memory.dmp family_rhadamanthys behavioral1/memory/1620-19-0x0000000002030000-0x0000000002430000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Executes dropped EXE 2 IoCs
Processes:
Launcher.exeWindowsHost.exepid Process 2508 Launcher.exe 1620 WindowsHost.exe -
Loads dropped DLL 4 IoCs
Processes:
Anubis.exepid Process 1652 Anubis.exe 1652 Anubis.exe 1652 Anubis.exe 1720 -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
WindowsHost.exeAnubis.exepowershell.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anubis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exeWindowsHost.exepid Process 2420 powershell.exe 1620 WindowsHost.exe 1620 WindowsHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeWindowsHost.exedescription pid Process Token: SeDebugPrivilege 2420 powershell.exe Token: SeShutdownPrivilege 1620 WindowsHost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Anubis.exeLauncher.exedescription pid Process procid_target PID 1652 wrote to memory of 2420 1652 Anubis.exe 30 PID 1652 wrote to memory of 2420 1652 Anubis.exe 30 PID 1652 wrote to memory of 2420 1652 Anubis.exe 30 PID 1652 wrote to memory of 2420 1652 Anubis.exe 30 PID 1652 wrote to memory of 2508 1652 Anubis.exe 32 PID 1652 wrote to memory of 2508 1652 Anubis.exe 32 PID 1652 wrote to memory of 2508 1652 Anubis.exe 32 PID 1652 wrote to memory of 2508 1652 Anubis.exe 32 PID 1652 wrote to memory of 1620 1652 Anubis.exe 34 PID 1652 wrote to memory of 1620 1652 Anubis.exe 34 PID 1652 wrote to memory of 1620 1652 Anubis.exe 34 PID 1652 wrote to memory of 1620 1652 Anubis.exe 34 PID 2508 wrote to memory of 1736 2508 Launcher.exe 35 PID 2508 wrote to memory of 1736 2508 Launcher.exe 35 PID 2508 wrote to memory of 1736 2508 Launcher.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anubis.exe"C:\Users\Admin\AppData\Local\Temp\Anubis.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHgAegBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAcABnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAdgBuACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:1736
-
-
-
C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD5a8db312e9364d1d82600bf5a398212fe
SHA13bbacada2b463bb9f62ed7ae34a8e8440bc91dcb
SHA25684e01afa9f1f134caa4e49456f4a1700e17bae4cbd962c1dfdf6cdfd61b3a3cb
SHA512a7994ab1901aa1fc6ee89a302a92c9ec7fc3febc348a21e0445d4e17bb2c736ef563543dde94a01fe5d81094e792b354db1d02f8069992b36791fdbb0f8a5782
-
Filesize
456KB
MD5515a0c8be21a5ba836e5687fc2d73333
SHA1c52be9d0d37ac1b8d6bc09860e68e9e0615255ab
SHA2569950788284df125c7359aeb91435ed24d59359fac6a74ed73774ca31561cc7ae
SHA5124e2bd7ce844bba25aff12e2607c4281b59f7579b9407139ef6136ef09282c7afac1c702adebc42f8bd7703fac047fd8b5add34df334bfc04d3518ea483225522