Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 05:53

General

  • Target

    1e064eddcda0b1a5a6d864b79d91bf26.exe

  • Size

    1.5MB

  • MD5

    1e064eddcda0b1a5a6d864b79d91bf26

  • SHA1

    dd50f163bdade043b2f9845e481ae7debcceaa4d

  • SHA256

    28319673d8f382142e223302ede1e0e497ccac2cd7a9814715726335e78c29c7

  • SHA512

    87b0b37a13fbf79316c150f0e69525703888f28312c8efcd8ac2db8832e6385dabd04261a86d8f183a20e64dea12d4a0fb07c81536b6f2c5726847f8e654347c

  • SSDEEP

    24576:GzZTGqTlTTuRQghvPWL5zLntgJET0uItpLkzX7kBJGypqL9HFmsFmFd:GgkTTuxpWLBnGJEgaYBJgHFxmFd

Malware Config

Extracted

Family

rhadamanthys

C2

https://172.236.107.96/5502b8a765a7d7349/0d2mumm6.wcnlc

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1272
      • C:\Users\Admin\AppData\Local\Temp\1e064eddcda0b1a5a6d864b79d91bf26.exe
        "C:\Users\Admin\AppData\Local\Temp\1e064eddcda0b1a5a6d864b79d91bf26.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2160
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Pad Pad.cmd & Pad.cmd & exit
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2724
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe opssvc.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2880
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2728
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2604
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 241319
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2556
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "RosesRtEagleFiled" Arrived
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2576
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Christians + ..\Toll + ..\Farmers + ..\Ga + ..\Hole + ..\Backgrounds + ..\Beverages + ..\Interactions + ..\Receivers + ..\Dos + ..\Willow + ..\Lindsay + ..\Photographic B
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2684
          • C:\Users\Admin\AppData\Local\Temp\241319\Solomon.pif
            Solomon.pif B
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2564
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1076
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\241319\B

      Filesize

      881KB

      MD5

      391e7eccd25c6827bb347558f79f463a

      SHA1

      774ab388b256f6aad4ff5bf5175c7f4578ea6621

      SHA256

      77b091364e68e3b076e5310557be325c36c294c1e4d00a558953725409842610

      SHA512

      3c1505040a33534153d5316fb7c89736517463aa5d3b1278dc8e95e9f924823dd0a45570a5f4786e31af98a2cad046ca53767a576ccb5a3f339bfea190d9f700

    • C:\Users\Admin\AppData\Local\Temp\Arrived

      Filesize

      310B

      MD5

      0185a56db42a165ee45de3a7697cd719

      SHA1

      9f32533c96636b612de43b3fb2fb39b401c56eea

      SHA256

      930d658e77f5e2ac85a8bd77265fce46172b2479aa3531f7a3e76b224040b2da

      SHA512

      9565e7b139af0a5df3bed991ae7b68d38c7cec68814c3a00935b5e09cef7bc0af5c08035b56dfa00bcea413c334b4f57e8c0d78d0c8966b15e20aeeba728046b

    • C:\Users\Admin\AppData\Local\Temp\Backgrounds

      Filesize

      55KB

      MD5

      ec7c849ef51aaa808fb2e2b01167257a

      SHA1

      0fda701090fe3369884ee2acc0bc2f52d21ba388

      SHA256

      5916a7c92f9b67bf550ceeb624a156f03459abb95e01dee51977ade86ec7aa76

      SHA512

      cb6ad028815f0b36a0ba2004c9a5aa8c9e9848a7c0bb33dbe9b8242895bcc3e7dbbdad0206b116df63b33dd3774db7ebf5637ca5b766ad81311dfb576933e498

    • C:\Users\Admin\AppData\Local\Temp\Beverages

      Filesize

      72KB

      MD5

      06636ebff20fd670a34f17dc0660a02f

      SHA1

      50842e5e33e54ce5977b700752d487c9f0d3fa76

      SHA256

      639b705356aa04fc87362eb38b2df7191a90cafacba651ce10ce021c2bcd3ac5

      SHA512

      311a39e4b0ea802c91df652717e3f81f438934eea02c1cb20aadc851617e25e86647a6585b48525f76fbf4c0878d07c884bfe0ce29c94c3900944a9a7297cb1d

    • C:\Users\Admin\AppData\Local\Temp\Christians

      Filesize

      53KB

      MD5

      c39d2152ca76a49430b22fa8c3bad4a6

      SHA1

      a068ce67d60f03ce5610e95e18d1939bb78a8f51

      SHA256

      5cce3a0553e66e57f67ce2b3b8380f71b6f2753c6d04f5f271c5c149004ea87e

      SHA512

      c71f104c77ba719e1d7e9254f703be0ae0306257f129bb59bdd257b39b37c2f897c375e56dc9fa10653c0d5acda09e456d9d7def59a53c5cfecb28ed176a72b8

    • C:\Users\Admin\AppData\Local\Temp\Dos

      Filesize

      91KB

      MD5

      17187b1c133cca101979e834227a8462

      SHA1

      3ca5d1aefee73a163159af4783e148cc05997f5d

      SHA256

      ed7fef33a92437398f347fc6c71b4fcd5984ef931a62086f0a8d8d3cdb47bf2f

      SHA512

      7ba6d0c9b3537e1370d8bdf3d1c7123dae0bae9695b763982cbc2d971d9b3cc880b7ba85d9482e9407794a086e9bb5272c2d1051b45653dd06aad93b6e1d8c3f

    • C:\Users\Admin\AppData\Local\Temp\Farmers

      Filesize

      67KB

      MD5

      374e9f8645d8c9c84dbca3d376fa2232

      SHA1

      f13e58ec275492380f3d61e2815c76752b844524

      SHA256

      441800d470891d917c98a60509f5fb409d792f6b302b4fd680481c75e3b739a6

      SHA512

      2e9c2ab2deaa2745e9026f9f906f0c8267ec7334327ea5c30ec108b57145411207f4a33b20ac1763a4359cba30d261ab66a0613c798061ce118f40150047a54e

    • C:\Users\Admin\AppData\Local\Temp\Ga

      Filesize

      89KB

      MD5

      8ce1b99268919ae2a322960c1389b430

      SHA1

      30bccec43fd9778578ba614b6ce28309ee990c65

      SHA256

      f5ccd2bd5a685a8d9b299205430364e1c1861b4211eda42c0a9aa1dfe46a342c

      SHA512

      88cadb5c905805c259c6995f2c743b5672e6d3fec85903e263f40b2232d2451f2f28fb1e597c4ffaa98947d870cb8b2191e87ad45103169e254c0d3ad99fd913

    • C:\Users\Admin\AppData\Local\Temp\Hole

      Filesize

      76KB

      MD5

      efa7870410bd5ea7354d44e92c7b003b

      SHA1

      8a34b6f22d3762f256e4e29f9d4545eaa77c6dbb

      SHA256

      215d284cc65cd710287417d71029135d06451495d6a55d4b9325702064fba5b8

      SHA512

      30ec41ebd13c27796aafc8600ccdb9c5a547aeaba96a00f74802b1cca4ba251fa5de311f842e398f174119862296978a3d22180eabeb2abfb58b8da8193de45e

    • C:\Users\Admin\AppData\Local\Temp\Interactions

      Filesize

      90KB

      MD5

      de1bb709f102c6ae90cd5fac04443161

      SHA1

      d2beeed4dbcbb77b62e8b39b9ce75eb03d102d05

      SHA256

      1b32207d8e9edace6fb6e6dec67f3be8a2d47db06d59f25c2dd636e898b9a30d

      SHA512

      c1c818f068e18a179d7f5ffeadf8426bf2fa77514c572f5b5ae74dd9884569421e643bb58c5cc2448d20b28b5fd08834aed4894c0921417fcfe1d2533c5ca351

    • C:\Users\Admin\AppData\Local\Temp\Lindsay

      Filesize

      88KB

      MD5

      10e8fb672200f58c8b9890d80f7397ac

      SHA1

      44ffe61d318bfba9ba9f4e0945540ea7e2ee17cc

      SHA256

      6f577dd0f31f69c9a8af9fb5b7fe767e45412cff5c4cc38096aa296f6bc990ab

      SHA512

      3739397a2e6026a807d37e31d5a901829b386151009762c1cfa5352fd7987161d02a12ed667c136d1168999f09ff9b52bfe062a764a314bd93d244446a7c4b68

    • C:\Users\Admin\AppData\Local\Temp\Pad

      Filesize

      13KB

      MD5

      959f5dd61aee97cd58e990d904a7d616

      SHA1

      f55f89830f5cc630d03b8616d762261ca17302bb

      SHA256

      4e7c71ec0fbd5a49568131b48c5d56a6c34f98d5643012d5f076858c9d678d50

      SHA512

      909fb61e40943b10b3546ee1a54f10a07e2e45c1df2ed7b68483cd5b6fe3de8564f88fa5f3e66a0f57322e2c679baa33cffc46637b58c00a4934a60c9cef9c2a

    • C:\Users\Admin\AppData\Local\Temp\Photographic

      Filesize

      9KB

      MD5

      4fcfb49cf9b7e9275aa361d66295eebb

      SHA1

      455f6315bfe03be71beee000f3d806c79b676aaf

      SHA256

      72d49c2b48d48a01eff21525e92ba32fd5024f48435e9b2e76842f431db637b6

      SHA512

      b0ec679e7e7f2f93c6e2d97adab7c6c2e9969ae43961150a5295e67c2e468e9a51c3bf053f40033bfe4a9c9f2113db31808c536b7796d5d2423d4fe92609e72a

    • C:\Users\Admin\AppData\Local\Temp\Receivers

      Filesize

      56KB

      MD5

      7492e93eb182c4a192a575434d44fce2

      SHA1

      cd1484af93b075e6ebbf0bed13d38c2a2bccd023

      SHA256

      a4446752a39b33c87e67c04be85daa18493b07d7e4589985b936e5f02f83b60d

      SHA512

      9d0a3f12d0641d3edfdf3951961c8f9300bc0280d1657a3f1389ee746b24127c588f1bcbeab12af4aa44f5b30e29c9a478b3e38fb8f829955e36896b46a4f196

    • C:\Users\Admin\AppData\Local\Temp\Stomach

      Filesize

      872KB

      MD5

      c9f4552f24606020ccce3341611d353e

      SHA1

      30636bf578a9a05404d50bde21088b6d6a05e111

      SHA256

      bc52236d68e32251d82f6529c06b158f91688d12b63d9aec65dbb493d74177a3

      SHA512

      2d17f3dc86740689311cd941b55fb4b75b3791324116e4d0c5ae29c2f190ef15ed31ac141523a32a0c129466e18abc163b4141cf596b64542e5c5871dcbc8d21

    • C:\Users\Admin\AppData\Local\Temp\Toll

      Filesize

      54KB

      MD5

      0b822930f43feb6a523e2b7478c943b2

      SHA1

      6bd39e29ab1b4e475c545ce41284b409759f8a64

      SHA256

      d84721ee1bf5fe6eec6e4fb42a0a96a86a3bb10d02cd57590ceb10fba3609f46

      SHA512

      57a96ebb9cf4f3d9d0e50512881c33fbba80f21fa593434a700a5019204803472e81d9f9cdf5ef1d3237f486afeca60c876b0bbcec2d10cd157e688c7a78658f

    • C:\Users\Admin\AppData\Local\Temp\Willow

      Filesize

      81KB

      MD5

      b0ed4fc0800b81de64aba363cd7fda59

      SHA1

      a93167e4fc3bc6fe08f813d4b4d1bd5251020d6e

      SHA256

      b98900ce6f107703f3c6c56f9c8ff4676fa0a7260c1698b23659bf3e7d5eb2f4

      SHA512

      dd912543e31eb017261c8e2d47ba8587bc536e017d3a4f3f9f164ff12417a9117a6afee6aae5d587454b8972e06624f34c2f5e1f8463b3952126877028a91849

    • \Users\Admin\AppData\Local\Temp\241319\Solomon.pif

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • memory/2564-42-0x00000000039E0000-0x0000000003A5E000-memory.dmp

      Filesize

      504KB

    • memory/2564-43-0x00000000039E0000-0x0000000003A5E000-memory.dmp

      Filesize

      504KB

    • memory/2564-41-0x00000000039E0000-0x0000000003A5E000-memory.dmp

      Filesize

      504KB

    • memory/2564-47-0x00000000039E0000-0x0000000003A5E000-memory.dmp

      Filesize

      504KB

    • memory/2564-46-0x00000000039E0000-0x0000000003A5E000-memory.dmp

      Filesize

      504KB

    • memory/2564-45-0x00000000039E0000-0x0000000003A5E000-memory.dmp

      Filesize

      504KB

    • memory/2564-48-0x0000000004B10000-0x0000000004F10000-memory.dmp

      Filesize

      4.0MB

    • memory/2564-50-0x0000000077A60000-0x0000000077C09000-memory.dmp

      Filesize

      1.7MB

    • memory/2564-49-0x0000000004B10000-0x0000000004F10000-memory.dmp

      Filesize

      4.0MB

    • memory/2564-52-0x0000000075990000-0x00000000759D7000-memory.dmp

      Filesize

      284KB

    • memory/2804-53-0x0000000000080000-0x0000000000089000-memory.dmp

      Filesize

      36KB

    • memory/2804-55-0x0000000001C80000-0x0000000002080000-memory.dmp

      Filesize

      4.0MB

    • memory/2804-58-0x0000000075990000-0x00000000759D7000-memory.dmp

      Filesize

      284KB

    • memory/2804-56-0x0000000077A60000-0x0000000077C09000-memory.dmp

      Filesize

      1.7MB