Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
Portable_x32_x64/Data/Packaged/Resource.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Portable_x32_x64/Data/Packaged/Resource.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Portable_x32_x64/Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Portable_x32_x64/Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Portable_x32_x64/msvcp140.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Portable_x32_x64/msvcp140.dll
Resource
win10v2004-20240802-en
General
-
Target
Portable_x32_x64/Setup.exe
-
Size
251KB
-
MD5
fe51917821ba0847a64c5467741ed7e3
-
SHA1
100ee217a3a2d1b2b211fa214804bfa77c676765
-
SHA256
54b3c35bdc0c3a426f6fbe5e06500738dabcdc47b9eaeb6548122af1f46cd2eb
-
SHA512
4a8de56ff27c71f582d342ae82699e1b2b1b3958ff3dbf67c46dd94c35afd8b97cc7dddb3f04e6797a3b50d2ebba44b6ddee8c42174a09b83a808b9ba35f9137
-
SSDEEP
6144:tpbIwepIdznDi8Har8HSDzYTk0zh6LM8wG4m7:fbIwewi8Har8czYTkbLZ4m7
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/8duqxdnh.falc4
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
aspnet_regiis.exedescription pid Process procid_target PID 4948 created 2608 4948 aspnet_regiis.exe 44 -
Loads dropped DLL 1 IoCs
Processes:
Setup.exepid Process 4448 Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid Process procid_target PID 4448 set thread context of 4948 4448 Setup.exe 88 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 2832 4948 WerFault.exe 88 4128 4948 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
aspnet_regiis.exeopenwith.exeSetup.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
aspnet_regiis.exeopenwith.exepid Process 4948 aspnet_regiis.exe 4948 aspnet_regiis.exe 3656 openwith.exe 3656 openwith.exe 3656 openwith.exe 3656 openwith.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Setup.exeaspnet_regiis.exedescription pid Process procid_target PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4448 wrote to memory of 4948 4448 Setup.exe 88 PID 4948 wrote to memory of 3656 4948 aspnet_regiis.exe 89 PID 4948 wrote to memory of 3656 4948 aspnet_regiis.exe 89 PID 4948 wrote to memory of 3656 4948 aspnet_regiis.exe 89 PID 4948 wrote to memory of 3656 4948 aspnet_regiis.exe 89 PID 4948 wrote to memory of 3656 4948 aspnet_regiis.exe 89
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2608
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\Portable_x32_x64\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Portable_x32_x64\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 4443⤵
- Program crash
PID:2832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 4403⤵
- Program crash
PID:4128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4948 -ip 49481⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4948 -ip 49481⤵PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642KB
MD5d6a05fd14991d2dc5f972b681b0b8fd1
SHA192b9d749770953695fc04658af5a7d3d20a13485
SHA256b20121b224944f229ebe84c0adb2500be80cda86dba4d6542e7f225503f8cea7
SHA5121f48c03f4d29e30ac7598a6ed427b9fefe8077fee79239c973c1df39e540d30f6a4ef4667a366f8851a8be0bf469c236da06469f3058393d29b8b058270a2605