Analysis

  • max time kernel
    135s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 05:53

General

  • Target

    25ab2caba38cdae6ef7cb5568ee3cb58.exe

  • Size

    1.5MB

  • MD5

    25ab2caba38cdae6ef7cb5568ee3cb58

  • SHA1

    cbb3c6c3ab571cac3e232f3a9b7d7bc6a0107f82

  • SHA256

    d1dae6a275073c722606d35b783b4d176c0d8e0feff6c903c27ab9f0f8d7ab07

  • SHA512

    f6f7177802006a4683a304715cf10ecf136d5a92d483f2e74d4f7c6343e1ceab9edce8e06298efdb636e9d981da7d82673cac13aac6d33c61682f65b95d441da

  • SSDEEP

    49152:V3//ab6w1+NDc1pi4rRkXj1Zeecxam5uV3B3YznIYL+lvQd:V3//ab6I+NDc1Nwj1Zlm57I3pQd

Malware Config

Extracted

Family

rhadamanthys

C2

https://154.216.18.122:2013/fb9e53a2cacd52/gkfd7jdw.l32g6

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2488
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2272
    • C:\Users\Admin\AppData\Local\Temp\25ab2caba38cdae6ef7cb5568ee3cb58.exe
      "C:\Users\Admin\AppData\Local\Temp\25ab2caba38cdae6ef7cb5568ee3cb58.exe"
      1⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3412
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k move Automobile Automobile.cmd & Automobile.cmd & exit
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3904
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2056
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "wrsa.exe opssvc.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4580
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4104
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4996
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 817605
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4780
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "PoolsSkipNitrogenStatistical" Campus
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4616
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Wanna + ..\Focal + ..\Jumping + ..\Medieval + ..\Specifications + ..\Nt + ..\Exposure + ..\Cnet + ..\Knives + ..\Squirt + ..\Already + ..\Refined + ..\Antibody e
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:1500
        • C:\Users\Admin\AppData\Local\Temp\817605\Bidder.pif
          Bidder.pif e
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1800
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 896
            4⤵
            • Program crash
            PID:3900
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3180
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1800 -ip 1800
      1⤵
        PID:1672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\817605\Bidder.pif

        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\817605\e

        Filesize

        918KB

        MD5

        14a0e9ba5d99ef289600bcb61b9745a1

        SHA1

        90dfbc00a4153f4c7d57004566fc7a522024c4ee

        SHA256

        7182d1daed8ac780aecdb27d847766042e0ca0ee43757a4e0af9146f75f2fdcf

        SHA512

        73563e4dfd75b2bea383471f3cc5f845da0e29593dac45cbabd61138884fad79540bcb3b1bc19feec440ec2c940a73f6af5859b024bf1ae8d05200b469df512e

      • C:\Users\Admin\AppData\Local\Temp\Already

        Filesize

        75KB

        MD5

        121a2255790ef350269dd6fba7e1e33b

        SHA1

        0ceace6d00f230304a4d66ebf8d57813ef33129d

        SHA256

        b05d7f7fe7062da6b68a07cdd9408d206e0e5fadbfd90738db763275a7d72246

        SHA512

        135e501e04074e48e5f12ffa2550fe8afbffd5c5442a74a4839456d9494f41d5ca5f7b524be22923da103dcd4e9378a1261f034c91b536d32539c4630cae898f

      • C:\Users\Admin\AppData\Local\Temp\Antibody

        Filesize

        24KB

        MD5

        30a8e71b2abd372a9254e7e9cd763ba7

        SHA1

        2a3b30fb53783183642ec1ac83b9a0fb05b04273

        SHA256

        ad59c4fd6970fae0f152621b242392a78159c7904712ee06e6915def81dc1735

        SHA512

        d209ed229dbbdebbf7f4369dedfd63f8407e2d2eed2c409fcc93b6f44bd49d8d17d6d2a8bd90bff1f175e6eeb70c7c36e207577c6e1dc5b3790c7efe79d87799

      • C:\Users\Admin\AppData\Local\Temp\Automobile

        Filesize

        24KB

        MD5

        d6fd538cebac92790e2eb80e8e095a24

        SHA1

        d8e0be911e80983798017d4ff42937af0f70c76f

        SHA256

        4721b747bb7ab50fc035cd647dedb8ca7bf2e257647132519965da640685a7af

        SHA512

        5d31551d25071d66d16a007e376f5a57a769840569d51902e11d2ba05efab3e1d75e344c7ed8bf20619f226a45173d52c00021c8388ff53546eed52bea63029e

      • C:\Users\Admin\AppData\Local\Temp\Campus

        Filesize

        273B

        MD5

        378ac29cb42585d9b9660cdb1b2aa86c

        SHA1

        ac4963f33de1f37df5875522daf897b5823c6714

        SHA256

        06b10b5c564276b3269da2f3060e96bd3ad8aaa9d4d9569cf34907ae43cf6f58

        SHA512

        9dc7360abe00596e08c265bd499d82b34edd0ea00c0f8cf9693d0d35801d560a61ae16f6aace88f62b3fe4756507988651371a364a56d4e47e4e1f22e1bd4cf7

      • C:\Users\Admin\AppData\Local\Temp\Cnet

        Filesize

        58KB

        MD5

        b59f321921254dca3891032c7bf68cd3

        SHA1

        e88afcdbe720f7f9cfb44fff138c9743e276db28

        SHA256

        7c6a3a2df1d556466d647cc566a7415b230ad04b2481f987bf1652dad074b2de

        SHA512

        8a88dee04fef082695df97cfffa28bf357af489933056ab0897555745b0b211f87423b6296d4d397c256c17b1eb225c4997a9f4555bfcec0d8fae3420ee00248

      • C:\Users\Admin\AppData\Local\Temp\Exposure

        Filesize

        97KB

        MD5

        197e6f551dcd5a469c76aecd852a5c5a

        SHA1

        f98c779a7ccc17ab6c396fa5d0cea26fdf559ffc

        SHA256

        6563b551aaee9ea256fbd266005e129aed641246d2873b29eefe5ddfbb5f1ef1

        SHA512

        502ba7e9e592ba741242c92b936193fb5b2a418bbe9788e9c6feb93cfb517057b8d3307ea6390e6d4ef96adcfb9546e422bbd2bb40c7ad3e9afe1770c9718119

      • C:\Users\Admin\AppData\Local\Temp\Focal

        Filesize

        55KB

        MD5

        27184e1413d3b892b3c2b4cda23d9b2c

        SHA1

        5196fb06803597f1afe8dbedcd0f6445aa7b9076

        SHA256

        84f978723c9f309bb94707dfe8b59053b9e4c5ff082320a7783927874819bcc8

        SHA512

        40f0494169ed43ab3dce0d5e3d9aff0120e9999e771c278cd48627430dd95c28165d4cf0695b06edf1a11e28125404a2d0dfc8229d1a9aff0c7cbb8114a3c1df

      • C:\Users\Admin\AppData\Local\Temp\Jumping

        Filesize

        76KB

        MD5

        108a100b2587c96a1652bc5cf5fb364e

        SHA1

        45cdd284363fe78a94b56ffea103ff73d0ccbbf6

        SHA256

        9de0f9fa491811e21279e4262fb8913971a7cdbcd0e6bdcfaff17fbe97757a74

        SHA512

        dbc339ceeae51a6338baa069d66c4caa1cef1ea74f7ce9286eb12afaab59a994b889db4b2321b194ac0f6db36336edd64b62715fd242bb780f3f2546411e6abe

      • C:\Users\Admin\AppData\Local\Temp\Knives

        Filesize

        79KB

        MD5

        47e87902d9887cd8585a7f77d325993b

        SHA1

        4af522145df49d4591cf2169c31abe3210d0df9b

        SHA256

        a5db459a96388036808cba7c7b6efc21c2e9d41f09d345e5f86373b745813147

        SHA512

        cc2e5c39eb08b8ef3505405d13eb595b9911aae91cc2969146e36f8e143ecb3343a5ee4a9e2aac400539f4bb246c4cab6cba88d64975ccd29d0d4f762dfe4ba2

      • C:\Users\Admin\AppData\Local\Temp\Medieval

        Filesize

        79KB

        MD5

        ca3f5c77601804655b5211d3a62fe9c1

        SHA1

        2ff419c490330a901f88914d59578816e9f11e17

        SHA256

        80548089dee5f794d9927da7b23b580334e67f9c9b1ee05d9cbf743a7c0d6a98

        SHA512

        92df9f34cc27196500c59176be38bb2ff44da8c2fc04bbcc55cedfdb76ca4ae00f5bedb00164d2c47d89f752833b5926200b5a9bedab1a91a7cf629bb941c338

      • C:\Users\Admin\AppData\Local\Temp\Nt

        Filesize

        82KB

        MD5

        cb9e2f905076b1a0204d5c1212f7215e

        SHA1

        beed9692456ada33447521872433e9922725787a

        SHA256

        24499ba5c9b8114f35a77380fd2f6f2ffdf232c01b56a3d0066dc9d3adda7c56

        SHA512

        708f36b3323f452955b5658b296ccca5db1732b6be0c7ef616420c9007ff069f289bb17afa1700176eafb222e4339721ab4e22d2c25497d7f8e9ba7185c6bb35

      • C:\Users\Admin\AppData\Local\Temp\Refined

        Filesize

        77KB

        MD5

        413018d1933fdbb9d73944e0cdccd249

        SHA1

        563e71d3c7487dcb40d745822426b6ed67ca97bc

        SHA256

        553a317deb995c711ac51eba98a1c634808863122e7f6f402529de026b30325e

        SHA512

        a770e24e4e123c7cf9ee8c00f084dd822bab56c9ddd321ba07bb39747f234dd6781960d71cde6c9a067efdefefa279991409cd20c6b9c9690c5028acf7bfc139

      • C:\Users\Admin\AppData\Local\Temp\Specifications

        Filesize

        62KB

        MD5

        44f050b62e7cf7483d9ba30a7814cfa5

        SHA1

        8682dc0d838585d9bd86be56f5763f366d277baf

        SHA256

        29d698218b42ca7faaee328b8c085e1839977389b589462a112754c9992c1231

        SHA512

        a2d681d5f7cbc606f720f6ec7c9e8b5116dc3d302bcb0be4cfac84e49b94ce8b510532c0509e7a67302568fbed0aea6fb01d59187482db91587387cf9273474d

      • C:\Users\Admin\AppData\Local\Temp\Squirt

        Filesize

        97KB

        MD5

        1f8b3e119596f734e84886b4c320017e

        SHA1

        f76bdd337e7d18bca2fd29b4f10faec403df7e8d

        SHA256

        51fa742e7ef483c4a8fe52c1d24fdab1746cd7f27cef850941408e2f38e2615f

        SHA512

        ab5effcb0d082f463ef13b865da5104b593c4a034607dce1870fc343bf83866b5343f883fb2577bf479b3a3e1219b6359a89b726aae2ab4a3594e214ee4b3953

      • C:\Users\Admin\AppData\Local\Temp\Tucson

        Filesize

        872KB

        MD5

        4df6b34b207e69f2469c16dd82886105

        SHA1

        12d4dbf6223a9368c72923007d5a2b4a8b6131dc

        SHA256

        0e0f2c9ba6c0e0d932b23aea08e91df090b6706a7c417d0298c4b8f9415f1ea4

        SHA512

        c7e641cc98ae4a7fcc1105f0c1c5ac287867798e5b93544ef64101002414db4c82485e982656a69df580a342417137011814e0a3edca614b21cb8c64862e8b1e

      • C:\Users\Admin\AppData\Local\Temp\Wanna

        Filesize

        57KB

        MD5

        4d73c0fb56a97b7e5d1843ff66cab66b

        SHA1

        23894801a9c1be4a8fb0365831da4bebfc5cd9e2

        SHA256

        0f31bac048d0d5a92d8140039f6bc80e46b55a0077910c7104052500a6ce6aff

        SHA512

        7c2075afb13339b2d1b8c75f3234604b02cf0fed1ccf72fd590bc65d4bf8ee0c7d5c44ec9ac228a1fe4dec8b9a60fa64622763dd47b8dbfedb6a7e4429c6d432

      • memory/1800-43-0x0000000004B30000-0x0000000004BAE000-memory.dmp

        Filesize

        504KB

      • memory/1800-47-0x0000000005D00000-0x0000000006100000-memory.dmp

        Filesize

        4.0MB

      • memory/1800-41-0x0000000004B30000-0x0000000004BAE000-memory.dmp

        Filesize

        504KB

      • memory/1800-39-0x0000000004B30000-0x0000000004BAE000-memory.dmp

        Filesize

        504KB

      • memory/1800-44-0x0000000004B30000-0x0000000004BAE000-memory.dmp

        Filesize

        504KB

      • memory/1800-45-0x0000000004B30000-0x0000000004BAE000-memory.dmp

        Filesize

        504KB

      • memory/1800-46-0x0000000005D00000-0x0000000006100000-memory.dmp

        Filesize

        4.0MB

      • memory/1800-40-0x0000000004B30000-0x0000000004BAE000-memory.dmp

        Filesize

        504KB

      • memory/1800-48-0x00007FFB83F90000-0x00007FFB84185000-memory.dmp

        Filesize

        2.0MB

      • memory/1800-50-0x0000000076480000-0x0000000076695000-memory.dmp

        Filesize

        2.1MB

      • memory/2272-51-0x00000000003E0000-0x00000000003E9000-memory.dmp

        Filesize

        36KB

      • memory/2272-53-0x0000000002230000-0x0000000002630000-memory.dmp

        Filesize

        4.0MB

      • memory/2272-54-0x00007FFB83F90000-0x00007FFB84185000-memory.dmp

        Filesize

        2.0MB

      • memory/2272-56-0x0000000076480000-0x0000000076695000-memory.dmp

        Filesize

        2.1MB