Analysis
-
max time kernel
115s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240802-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
26-08-2024 07:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.ly/kQE4e
Resource
win10v2004-20240802-ja
General
-
Target
https://t.ly/kQE4e
Malware Config
Extracted
rhadamanthys
https://198.135.48.191:3090/7cc6bd8a9e6893408/1tlibt59.73eni
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
画像およびビデオの著作権侵害の証拠.exedescription pid Process procid_target PID 3524 created 1480 3524 画像およびビデオの著作権侵害の証拠.exe 51 -
Executes dropped EXE 2 IoCs
Processes:
画像およびビデオの著作権侵害の証拠.exe画像およびビデオの著作権侵害の証拠.exepid Process 4732 画像およびビデオの著作権侵害の証拠.exe 3524 画像およびビデオの著作権侵害の証拠.exe -
Loads dropped DLL 1 IoCs
Processes:
画像およびビデオの著作権侵害の証拠.exepid Process 4732 画像およびビデオの著作権侵害の証拠.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*UpdaterCisco = "rundll32.exe C:\\Users\\Admin\\Documents\\CiscoUpdater000_PARTIAL.dll,EntryPoint" reg.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 5592 3524 WerFault.exe 121 5612 3524 WerFault.exe 121 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
openwith.exe画像およびビデオの著作権侵害の証拠.exe画像およびビデオの著作権侵害の証拠.execmd.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 画像およびビデオの著作権侵害の証拠.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 画像およびビデオの著作権侵害の証拠.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
画像およびビデオの著作権侵害の証拠.exeopenwith.exepid Process 3524 画像およびビデオの著作権侵害の証拠.exe 3524 画像およびビデオの著作権侵害の証拠.exe 3628 openwith.exe 3628 openwith.exe 3628 openwith.exe 3628 openwith.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7zG.exedescription pid Process Token: SeRestorePrivilege 5212 7zG.exe Token: 35 5212 7zG.exe Token: SeSecurityPrivilege 5212 7zG.exe Token: SeSecurityPrivilege 5212 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zG.exepid Process 5212 7zG.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
画像およびビデオの著作権侵害の証拠.execmd.exe画像およびビデオの著作権侵害の証拠.exedescription pid Process procid_target PID 4732 wrote to memory of 3524 4732 画像およびビデオの著作権侵害の証拠.exe 121 PID 4732 wrote to memory of 3524 4732 画像およびビデオの著作権侵害の証拠.exe 121 PID 4732 wrote to memory of 3524 4732 画像およびビデオの著作権侵害の証拠.exe 121 PID 4732 wrote to memory of 3524 4732 画像およびビデオの著作権侵害の証拠.exe 121 PID 4732 wrote to memory of 3524 4732 画像およびビデオの著作権侵害の証拠.exe 121 PID 4732 wrote to memory of 4952 4732 画像およびビデオの著作権侵害の証拠.exe 122 PID 4732 wrote to memory of 4952 4732 画像およびビデオの著作権侵害の証拠.exe 122 PID 4732 wrote to memory of 4952 4732 画像およびビデオの著作権侵害の証拠.exe 122 PID 4952 wrote to memory of 1260 4952 cmd.exe 124 PID 4952 wrote to memory of 1260 4952 cmd.exe 124 PID 4952 wrote to memory of 1260 4952 cmd.exe 124 PID 3524 wrote to memory of 3628 3524 画像およびビデオの著作権侵害の証拠.exe 125 PID 3524 wrote to memory of 3628 3524 画像およびビデオの著作権侵害の証拠.exe 125 PID 3524 wrote to memory of 3628 3524 画像およびビデオの著作権侵害の証拠.exe 125 PID 3524 wrote to memory of 3628 3524 画像およびビデオの著作権侵害の証拠.exe 125 PID 3524 wrote to memory of 3628 3524 画像およびビデオの著作権侵害の証拠.exe 125
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1480
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.ly/kQE4e1⤵PID:1944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=ja --js-flags=--ms-user-locale=ja_JP --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=5056,i,13462514811695382832,13975351635256047125,262144 --variations-seed-version --mojo-platform-channel-handle=1760 /prefetch:11⤵PID:3608
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=ja --js-flags=--ms-user-locale=ja_JP --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4348,i,13462514811695382832,13975351635256047125,262144 --variations-seed-version --mojo-platform-channel-handle=4836 /prefetch:11⤵PID:2164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=ja --service-sandbox-type=asset_store_service --field-trial-handle=5412,i,13462514811695382832,13975351635256047125,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:81⤵PID:5744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=ja --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5464,i,13462514811695382832,13975351635256047125,262144 --variations-seed-version --mojo-platform-channel-handle=5496 /prefetch:81⤵PID:4528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=ja --service-sandbox-type=collections --field-trial-handle=6164,i,13462514811695382832,13975351635256047125,262144 --variations-seed-version --mojo-platform-channel-handle=6212 /prefetch:81⤵PID:3252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=ja --js-flags=--ms-user-locale=ja_JP --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=6188,i,13462514811695382832,13975351635256047125,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:11⤵PID:116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=ja --service-sandbox-type=service --field-trial-handle=5460,i,13462514811695382832,13975351635256047125,262144 --variations-seed-version --mojo-platform-channel-handle=5972 /prefetch:81⤵PID:2728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=ja --service-sandbox-type=none --field-trial-handle=5624,i,13462514811695382832,13975351635256047125,262144 --variations-seed-version --mojo-platform-channel-handle=6596 /prefetch:81⤵PID:228
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=ja --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6708,i,13462514811695382832,13975351635256047125,262144 --variations-seed-version --mojo-platform-channel-handle=5696 /prefetch:81⤵PID:1964
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\画像およびビデオの著作権侵害の証拠\" -spe -an -ai#7zMap22316:96:7zEvent92291⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5212
-
C:\Users\Admin\Downloads\画像およびビデオの著作権侵害の証拠\画像およびビデオの著作権侵害の証拠.exe"C:\Users\Admin\Downloads\画像およびビデオの著作権侵害の証拠\画像およびビデオの著作権侵害の証拠.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\Downloads\画像およびビデオの著作権侵害の証拠\画像およびビデオの著作権侵害の証拠.exe"C:\Users\Admin\Downloads\画像およびビデオの著作権侵害の証拠\画像およびビデオの著作権侵害の証拠.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 4643⤵
- Program crash
PID:5592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 5003⤵
- Program crash
PID:5612
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*UpdaterCisco" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\CiscoUpdater000_PARTIAL.dll",EntryPoint /f & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*UpdaterCisco" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\CiscoUpdater000_PARTIAL.dll",EntryPoint /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3524 -ip 35241⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3524 -ip 35241⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.0MB
MD5b896496cd2d93761423c4a7f8c51b9bb
SHA1d986f06d2a4db282f7d3cf8bf0b253e0e38d30d1
SHA25682932459183f7c47c1578782c0f8f466abeded7632a7da27072520c18c916478
SHA512e164882383f00ffce52f7ae1bdfafae06d189b48b1400bebcc55f26bd53e4c8698ae0261a63b5ec7c642d7dc29998336df62ff80d3a51b937617893f27a60bd0
-
Filesize
727KB
MD5d858d89ed151c44200931c41def7bcdd
SHA10a966b1a9ce0687070211e69c980050ca4ca95fd
SHA25607f0a1b37e9b3b1eaa15a5ea28ba1d17608f2726440329d071236500984fcf20
SHA5129d588a1ad4db194bc75efa4f759220712d72d3971695663100602ea555ab8b7d3ef91fe130963584647891f2b83199ed2e8ff1ee473cee1a0f4438835dd35846