Analysis

  • max time kernel
    41s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 01:56

General

  • Target

    8b738c9057baa2c3219120919226e95659cccec0dc61aca579bba58c7090719e.exe

  • Size

    1.7MB

  • MD5

    702ab38086350094b28c8df1b670f84f

  • SHA1

    3a6ff038d4e70d9f5e4a48f617612f9fc330bc03

  • SHA256

    8b738c9057baa2c3219120919226e95659cccec0dc61aca579bba58c7090719e

  • SHA512

    bf849222a88b78b70918b1925afc507eb407abbdb7ce96e7c9ad94eb98093eccc36d3bc172e794eed24cb4138f114f037fc06b1aa18b2263316e1e195d1d74f3

  • SSDEEP

    24576:GzZh1gHxneFb0gvX0zJc2ewTYuXm9jJp7Bv97S2Rck/J2q0NpBCMX/B:GF6ezktFbYuQFv9fBsiMX/B

Malware Config

Extracted

Family

rhadamanthys

C2

https://144.76.133.166:8034/5502b8a765a7d7349/r4139osc.1hlvc

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\8b738c9057baa2c3219120919226e95659cccec0dc61aca579bba58c7090719e.exe
        "C:\Users\Admin\AppData\Local\Temp\8b738c9057baa2c3219120919226e95659cccec0dc61aca579bba58c7090719e.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Almost Almost.cmd & Almost.cmd & exit
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2024
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2392
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe opssvc.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2112
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2824
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2836
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 561944
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2760
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "ZealandInvitationMonoMessage" Import
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2752
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Reports + ..\Ontario + ..\Contacting + ..\Midlands + ..\Guestbook + ..\Placement + ..\Patricia + ..\Saving + ..\Addition + ..\Publisher + ..\Machine + ..\Blowjobs + ..\Ni E
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2956
          • C:\Users\Admin\AppData\Local\Temp\561944\Internet.pif
            Internet.pif E
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2916
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2840
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InnoWave.url" & echo URL="C:\Users\Admin\AppData\Local\DesignWave Technologies\InnoWave.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InnoWave.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:2604
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:332

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\561944\E

      Filesize

      933KB

      MD5

      e0ccb032f8a542fac39f8dfb475fd99d

      SHA1

      88f27e5db9a8da4025c90d299e19a2cc15d85f6c

      SHA256

      1825a57bfd027e96b47e85f789dd3e15f56980464df7c60fa7600f0f37153167

      SHA512

      3bfe99c999eef5d944ba5042ec6edb8c546e67224f3a13342ca9992105c1a1cf9928f43e3929bda288faa7f2cc9c55b5a7851e55c61689a795f71d406d7ed557

    • C:\Users\Admin\AppData\Local\Temp\Addition

      Filesize

      51KB

      MD5

      a7d7793318e8460f41bc73ffdaa4bf3c

      SHA1

      6b556b531ce4e07ffbc77f4d8eddd4f80c858438

      SHA256

      fffbc97502fc6b21552ca1fe3537a78a56a2553632938b2d4916295c47a26de9

      SHA512

      ddf9588a9d237e652b00cd089a639571698a5d8e3961b1accfc509412b1f9b0507a590d71ce4aea44cd3031594487c6badbcbad296fdee8bfedef23c79d442cf

    • C:\Users\Admin\AppData\Local\Temp\Almost

      Filesize

      14KB

      MD5

      f629c391bb2a555d7201ba313533cb61

      SHA1

      b738978d501b563e12a25480ff8581a1023979b8

      SHA256

      a841624b9936a625f45cfffc446271be2191c3204bf7baa7bdf8890e6db691f3

      SHA512

      d488dbaa581e6629ec8659574abcacc8a80b763b33340ff2dd01801f9fdc316ba7f40bbdc59953fe45a3e43712c3d3eebc23546281f596066160eda5f9096b04

    • C:\Users\Admin\AppData\Local\Temp\Blowjobs

      Filesize

      94KB

      MD5

      195a96edf53ff80a7cf419744723a51e

      SHA1

      53bcdfba9c43063d10e3d8e6f601d49c221d9b93

      SHA256

      366fd97e3ced8777b98c5203c9684482e56eb38288be159d31ed54ba4e38d0b3

      SHA512

      cd1fcae11f40ca7f636b1eb1897330c05e8e710f411d5c33298ecdd7037944634a0179bc4a1435ed4762894428844b2ef02f6044d5d69fd83e9c0d624bf53c63

    • C:\Users\Admin\AppData\Local\Temp\Contacting

      Filesize

      51KB

      MD5

      9eb5963e5d1f1b50eda17ec0743189aa

      SHA1

      9e3c6668a9d148f2e2efdf91f7a8f63272aa68a9

      SHA256

      761af1f43943c43177d47ebb89fada2583481afb3c9655c25665d22a39994d67

      SHA512

      09b3a32662ee6bbe9cd426e9c09e096de7b673f46a8430ac18fb7f85a0c79a51055e034e46167bb03f82a740bb5fdf577503cac9cbf1c3bde0e895355d619831

    • C:\Users\Admin\AppData\Local\Temp\Guestbook

      Filesize

      98KB

      MD5

      79efba76fd8b1b30963707b8bf350501

      SHA1

      592fd780aa9951639570f3bd7b148bedc6744860

      SHA256

      7a41b11bb70e4babb6ed10a663a67cc5b9b74c3112bb2b2258db5ab74082e141

      SHA512

      3b8d97a26610010a06a0f90d94c486cec060c787977e6a72c54bcb73797c9cae1985974188d85119c15903a98558fa41ce9215fb85f4fbf0256bb1e9b501c555

    • C:\Users\Admin\AppData\Local\Temp\Import

      Filesize

      439B

      MD5

      b9991072e589e18038ff84065b53af77

      SHA1

      d820d9d1578ca28065ab893c96baadd0c8f19e11

      SHA256

      4fcbf02ff9dbaab6570a24dfc8377d05433d124c3b6cd5afe08e3d0e5a36e78e

      SHA512

      de0898d82aa8472157a83c08508eb61d2b2769574d1236f6f548dfc92d5b41130a50b65e0268bfbf559f962aa2a619eacd5a1e95972ba9a4ad7c428db6a837e2

    • C:\Users\Admin\AppData\Local\Temp\Machine

      Filesize

      68KB

      MD5

      71426d9aa93b60c078ed07ad60c6a8e2

      SHA1

      26b8b144ab732eb129d6a606ac6217886832451d

      SHA256

      dfacbe1a810d928348af9a9e49c57532ebae04209c0250733512656ac9719786

      SHA512

      b51d5c7873989bd5952febddd1bb6e3c77880831cbb56b383ebec0fb0f2a55b9c3f603ba8eb3291ae34a3ef4288f833ffabd0e58dc030110e081034318b95dc8

    • C:\Users\Admin\AppData\Local\Temp\Midlands

      Filesize

      86KB

      MD5

      8c7367ec5aa6710a1f86257b6cb93c0e

      SHA1

      b0948cb7c8ee6ab0456bc65cb3ae64e1e6099b14

      SHA256

      2848a8fde81ca7346a6c2ff41221e5685efe6c16e446a60d58e336632f2862da

      SHA512

      1fa61b1d1b6ee2c6ca5a7180f37d4c0f3f66e457d70789290d62e62e03f4a45bf0913cd1277829e714bd0a580c9de477b30b3793735388f13f5d684a6de22e37

    • C:\Users\Admin\AppData\Local\Temp\Ni

      Filesize

      12KB

      MD5

      443e110af53edec1b8740aa7b3a23f13

      SHA1

      0ec9b9fdec57a1d3e85b343a6437abfaaa3d4a9e

      SHA256

      0973c477dc7071e83ad0517554746bb998a039d201a5c0d9b9b60a2d07a479b6

      SHA512

      bdc147703cf7351879bfdc55832d6394ca439cdf58e9a0a6916afdfa5e5b42408a10488b14396fc96361a2d6e6f1319412e936963ab10f64fb5d9ffeffaba919

    • C:\Users\Admin\AppData\Local\Temp\Ontario

      Filesize

      97KB

      MD5

      8b6e671bcde125b3094e8a844dc83eb9

      SHA1

      e7c73663a7c3be3de944ab26f2feab68411572b3

      SHA256

      05536696a886b9ffc228f97bf9399113e0e335f6d416c53ae15053f595d8ab78

      SHA512

      61f66ff7c80fcc938ec9462e9e1832e0e578dc9888431b25077eef09fcaad90738c931cbb519ba5aa38dbd811aa5d7b78e14b49193181fd9acd01b2312430e49

    • C:\Users\Admin\AppData\Local\Temp\Patricia

      Filesize

      65KB

      MD5

      d13978a7fbeeeac4d9a8fd32a2a0fc44

      SHA1

      ac9be13532e6993808402ffef4b34543caa6b607

      SHA256

      dffdea2c723deb402f2ffcbba9e8fa47ba5046371111cd9c65885d421f19049f

      SHA512

      a6401b0930c4373b3733e45b6691e268cba8aa73de5a6674ed5d16b60471d98b5169731393a75eb99176e58a96ee4f998abb9fbb007bd060686ec846b55b5e2f

    • C:\Users\Admin\AppData\Local\Temp\Placement

      Filesize

      56KB

      MD5

      ceb785c3c2227d14c636d37dc081d3db

      SHA1

      5c53280255c3ea1cfa7ed88a030cb4fe04e46358

      SHA256

      61f0a3caddf75516d64aba9dd3c00ef223161473c1425670f217fcb818548ab5

      SHA512

      1d7552a26c7ba7fd9c76b5b888873c2e6896d68797106a5b77f8659d5ce0dd72436c15372bf955783bf1e377d7c0c836cbff0dd25f04d67abe9f2e9b778642cf

    • C:\Users\Admin\AppData\Local\Temp\Publisher

      Filesize

      88KB

      MD5

      598ffca35e33b4fc2302a61bf056658e

      SHA1

      826d3ec448ce0fd7ce284bd86b732411882ef2c2

      SHA256

      775d09d656b3beb4d711cbb12759cb876f3a6a39b711e805bc94d1eefb98fd7a

      SHA512

      69eaf29ff30e14b3b06a0d33e027b0dc7ebdfbbac86baa6f9b7ece2fea47e3d602fa07c36d75f6b8d9d44827c5514d1551b9ec6762c4008d2075a0619c964fc4

    • C:\Users\Admin\AppData\Local\Temp\Reports

      Filesize

      86KB

      MD5

      abd0e032eea4b26922ce864c12450b46

      SHA1

      7ce3ba254fc7ccedebb77d651d18de8b710c297f

      SHA256

      215d9e7fb728fe11bfe89fb072d4f6bd2903504c466ed5c8ca0c5029b12ca5b2

      SHA512

      b05d06b8499116d85b84542b5c9ce82b36f7433d439006c89fcc29e7572fc3f15a4cb56ada719b16ec66eee28d3be0a02e4ff66a8a4cbcc420bfe3ed8e508664

    • C:\Users\Admin\AppData\Local\Temp\Saving

      Filesize

      81KB

      MD5

      1cf6c3ab870856b9143535d189dfd914

      SHA1

      cad46a3ad0007cd4ee9c678edd44be319102b41c

      SHA256

      090c755e487d0512dba6b57c4aef1e97bed9e68f4a2bf9fa7fe8056cb8231a6d

      SHA512

      51728fcf8ec19d7dd9d42dfd6a6d07823999d6a1a92fa152c6b19bb28f2030260515a3449b06d1e09e2049676cbd7b05a1d492128a53de363c5ac916d4e606b3

    • C:\Users\Admin\AppData\Local\Temp\Units

      Filesize

      872KB

      MD5

      f6b8f6a0a90ed6f136efdc09ef936754

      SHA1

      89a60aaacf5150a16bf452f709b772ee0a6fdeb7

      SHA256

      b64f73910e0bc4fcbb71acfff0421634773db82174349a344c5d12eae2b91826

      SHA512

      d003a98cfd71d5ae7068f7821a96a504ca110c0686059b205c6dea71a262dbd13528e09a5c82962d87e4e5ba5a106571a2f69b66403d466d6656ae933669c913

    • \Users\Admin\AppData\Local\Temp\561944\Internet.pif

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • memory/332-59-0x00000000000C0000-0x00000000000C9000-memory.dmp

      Filesize

      36KB

    • memory/332-62-0x0000000076E80000-0x0000000077029000-memory.dmp

      Filesize

      1.7MB

    • memory/332-64-0x00000000762D0000-0x0000000076317000-memory.dmp

      Filesize

      284KB

    • memory/332-61-0x0000000001C80000-0x0000000002080000-memory.dmp

      Filesize

      4.0MB

    • memory/2916-54-0x0000000004120000-0x0000000004520000-memory.dmp

      Filesize

      4.0MB

    • memory/2916-53-0x00000000040A0000-0x000000000411E000-memory.dmp

      Filesize

      504KB

    • memory/2916-47-0x00000000040A0000-0x000000000411E000-memory.dmp

      Filesize

      504KB

    • memory/2916-55-0x0000000004120000-0x0000000004520000-memory.dmp

      Filesize

      4.0MB

    • memory/2916-58-0x00000000762D0000-0x0000000076317000-memory.dmp

      Filesize

      284KB

    • memory/2916-56-0x0000000076E80000-0x0000000077029000-memory.dmp

      Filesize

      1.7MB

    • memory/2916-52-0x00000000040A0000-0x000000000411E000-memory.dmp

      Filesize

      504KB

    • memory/2916-51-0x00000000040A0000-0x000000000411E000-memory.dmp

      Filesize

      504KB

    • memory/2916-49-0x00000000040A0000-0x000000000411E000-memory.dmp

      Filesize

      504KB

    • memory/2916-48-0x00000000040A0000-0x000000000411E000-memory.dmp

      Filesize

      504KB