Overview
overview
10Static
static
3fixer/DryIoc.dll
windows7-x64
1fixer/DryIoc.dll
windows10-2004-x64
1fixer/FastRsync.dll
windows7-x64
1fixer/FastRsync.dll
windows10-2004-x64
1fixer/Seri...ct.dll
windows7-x64
1fixer/Seri...ct.dll
windows10-2004-x64
1fixer/Seri...le.dll
windows7-x64
1fixer/Seri...le.dll
windows10-2004-x64
1fixer/Serilog.dll
windows7-x64
1fixer/Serilog.dll
windows10-2004-x64
1fixer/Win64.exe
windows7-x64
1fixer/Win64.exe
windows10-2004-x64
10fixer/loca...lf.dll
windows7-x64
1fixer/loca...lf.dll
windows10-2004-x64
1fixer/loca...43.dll
windows7-x64
3fixer/loca...43.dll
windows10-2004-x64
3fixer/loca...47.dll
windows10-2004-x64
1fixer/loca...GL.dll
windows7-x64
1fixer/loca...GL.dll
windows10-2004-x64
1fixer/loca...v2.dll
windows7-x64
1fixer/loca...v2.dll
windows10-2004-x64
1fixer/loca...ef.dll
windows7-x64
1fixer/loca...ef.dll
windows10-2004-x64
1fixer/loca...lob.js
windows7-x64
3fixer/loca...lob.js
windows10-2004-x64
3fixer/msvcp140.dll
windows7-x64
1fixer/msvcp140.dll
windows10-2004-x64
1fixer/temp...se.dll
windows7-x64
1fixer/temp...se.dll
windows10-2004-x64
1fixer/temp...ent.js
windows7-x64
3fixer/temp...ent.js
windows10-2004-x64
3fixer/temp...ent.js
windows7-x64
3Analysis
-
max time kernel
130s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
fixer/DryIoc.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fixer/DryIoc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
fixer/FastRsync.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
fixer/FastRsync.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
fixer/Serilog.Formatting.Compact.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
fixer/Serilog.Formatting.Compact.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
fixer/Serilog.Sinks.Console.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
fixer/Serilog.Sinks.Console.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
fixer/Serilog.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
fixer/Serilog.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
fixer/Win64.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
fixer/Win64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
fixer/locales/chrome_elf.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
fixer/locales/chrome_elf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
fixer/locales/d3dcompiler_43.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
fixer/locales/d3dcompiler_43.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
fixer/locales/d3dcompiler_47.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
fixer/locales/libEGL.dll
Resource
win7-20240704-en
Behavioral task
behavioral19
Sample
fixer/locales/libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
fixer/locales/libGLESv2.dll
Resource
win7-20240708-en
Behavioral task
behavioral21
Sample
fixer/locales/libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
fixer/locales/libcef.dll
Resource
win7-20240704-en
Behavioral task
behavioral23
Sample
fixer/locales/libcef.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
fixer/locales/natives_blob.js
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
fixer/locales/natives_blob.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
fixer/msvcp140.dll
Resource
win7-20240729-en
Behavioral task
behavioral27
Sample
fixer/msvcp140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
fixer/temp/OpenImageDenoise.dll
Resource
win7-20240708-en
Behavioral task
behavioral29
Sample
fixer/temp/OpenImageDenoise.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
fixer/temp/cef_100_percent.js
Resource
win7-20240705-en
Behavioral task
behavioral31
Sample
fixer/temp/cef_100_percent.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
fixer/temp/cef_200_percent.js
Resource
win7-20240705-en
General
-
Target
fixer/Win64.exe
-
Size
238KB
-
MD5
01b8c89eb83646a038d9cb368e686bdb
-
SHA1
5f217b7ec06fb5b96bb9f5c9def89f368b98cc58
-
SHA256
40c823f1d6c00f1ea2482833d7c45773b6830cc812f5352aff102df63330aea7
-
SHA512
6e5d7272088391c423feafe947310c049125aea22a1857b9f732d3d323cd11ab1c838fa1e056629f0882a91ec05cd33ac6f3cf0ec4bdb0c039f5a8416c7975d4
-
SSDEEP
3072:3uw4AsOzMKuNIlQ/mciPffLHa1d+Dylq5YQooYJoT1jUWXYCJzVaXlZX:3N4AqKQmUmci3fO1d+/dPYajw7
Malware Config
Extracted
rhadamanthys
https://144.76.133.166:8034/5502b8a765a7d7349/gful07nl.rfoel
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
aspnet_regiis.exedescription pid Process procid_target PID 4396 created 2504 4396 aspnet_regiis.exe 50 -
Loads dropped DLL 1 IoCs
Processes:
Win64.exepid Process 4304 Win64.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Win64.exedescription pid Process procid_target PID 4304 set thread context of 4396 4304 Win64.exe 88 -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 4320 4396 WerFault.exe 88 3540 4396 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
aspnet_regiis.exeopenwith.exeWin64.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win64.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
aspnet_regiis.exeopenwith.exepid Process 4396 aspnet_regiis.exe 4396 aspnet_regiis.exe 3404 openwith.exe 3404 openwith.exe 3404 openwith.exe 3404 openwith.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Win64.exeaspnet_regiis.exedescription pid Process procid_target PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4304 wrote to memory of 4396 4304 Win64.exe 88 PID 4396 wrote to memory of 3404 4396 aspnet_regiis.exe 91 PID 4396 wrote to memory of 3404 4396 aspnet_regiis.exe 91 PID 4396 wrote to memory of 3404 4396 aspnet_regiis.exe 91 PID 4396 wrote to memory of 3404 4396 aspnet_regiis.exe 91 PID 4396 wrote to memory of 3404 4396 aspnet_regiis.exe 91
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2504
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\fixer\Win64.exe"C:\Users\Admin\AppData\Local\Temp\fixer\Win64.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 4363⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 4323⤵
- Program crash
PID:3540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4396 -ip 43961⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4396 -ip 43961⤵PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD52d0b9013e47fdc0480ab32799cd62799
SHA1e7fb40062b7beaa04442555ddac1401450d0805b
SHA256bb462874407a759e97bd04d781791d1d0f44eabfc9abc9a39313e3c9cf5a9e37
SHA5129fa06691c6e699ba9680998bfdc08830fc164a263f84285ca0ae2ec8db617761a0c99c8bc728ab61276af2549a93952f5897c09eafb53753de17473bdc79e029