Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2024 01:35

General

  • Target

    7c86e8c4143be0e27af9558ca46b3b4d7c5bee5e58e18902757bc02f6a3863a2.exe

  • Size

    1.5MB

  • MD5

    29c6df4f70bc29919dba16a04c08800c

  • SHA1

    0c6083da1f78d6d365138cc96724ee7f33b4b7de

  • SHA256

    7c86e8c4143be0e27af9558ca46b3b4d7c5bee5e58e18902757bc02f6a3863a2

  • SHA512

    30c9c7e62f8cb8d05e3dfcf0c526f9943fb648f91cd156a356550b0be326bde79bcfd638bd8b956577a0b8860eea186a4b80fab1b79deeee6a35515a927db666

  • SSDEEP

    49152:ETXLOO0MV8+2vk1rrts0LDAYjNxyBVQEBX9:EV0gVjrrtsMkYBxQVQEBX9

Malware Config

Extracted

Family

rhadamanthys

C2

https://80.209.243.182:8094/c47580f52cd88a21fb/gb51j2km.kui3h

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\7c86e8c4143be0e27af9558ca46b3b4d7c5bee5e58e18902757bc02f6a3863a2.exe
        "C:\Users\Admin\AppData\Local\Temp\7c86e8c4143be0e27af9558ca46b3b4d7c5bee5e58e18902757bc02f6a3863a2.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1864
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k move Crowd Crowd.cmd & Crowd.cmd & exit
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:576
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2308
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe opssvc.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1896
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2924
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2340
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 327460
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2468
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "PrideDramaticIconAcknowledge" Occasion
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2836
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Default + ..\Too + ..\Scanning + ..\Rivers + ..\Anthropology + ..\Implied + ..\Battle + ..\Tulsa + ..\Packs + ..\Seat + ..\Moved + ..\Giant + ..\Risk + ..\Size + ..\Tax z
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2160
          • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
            Mrna.pif z
            4⤵
            • Deletes itself
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1948
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c schtasks.exe /create /tn "Sticks" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SafeGuard Data Systems\AtlasVault.js'" /sc minute /mo 5 /F
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks.exe /create /tn "Sticks" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SafeGuard Data Systems\AtlasVault.js'" /sc minute /mo 5 /F
                6⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1792
            • C:\Windows\SysWOW64\cmd.exe
              cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AtlasVault.url" & echo URL="C:\Users\Admin\AppData\Local\SafeGuard Data Systems\AtlasVault.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AtlasVault.url" & exit
              5⤵
              • Drops startup file
              • System Location Discovery: System Language Discovery
              PID:2696
            • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
              C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2036
            • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
              C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2608
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2676
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3028
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\327460\z

      Filesize

      989KB

      MD5

      9b72988705ea734a65d71ddda4ad6db1

      SHA1

      0ba8a6787874fb19cf95fd435bfe8f367d916f24

      SHA256

      954ea9105d0c27e132c46e68dbfaec2a636e933028abd42856979c6836ddacc5

      SHA512

      b741eb8c17fe2c32016a710fe0935bd4fff357b4b8e76230b274572d307ff44d3dc4e81bc2fcd253733bc1b93bdc1b0a2a3941b4a720471ec3a521754dcdbe0c

    • C:\Users\Admin\AppData\Local\Temp\Anthropology

      Filesize

      92KB

      MD5

      99c899ad39bb07a27a8447460e35af41

      SHA1

      b230a12ed8079938fc1d2de97fc3bea94484d68e

      SHA256

      cdb390ee422da6a5bc032f10700c4e502e7a67cb8a7a0b84ffb8948d7dedb205

      SHA512

      386235e15750991a6ea89836b3c2f6c3fd71eb3011fbb45475705717a5b7fd0568aeea9e895515eace855aa011ca16c1755ceeee59b176148cb32b7729c2786b

    • C:\Users\Admin\AppData\Local\Temp\Battle

      Filesize

      70KB

      MD5

      f179ed40289ae135eece0b9c92b74a02

      SHA1

      83a9f14cb07d7bd0164397b814cba2321ab9ec39

      SHA256

      97fb5b49f6a10ceec40702cf665177526c9634e32e83a747803894a7bed26e4d

      SHA512

      e721e5bda372a85a07b3be1b06720fb3a75be03dfd73936777d78902d37b81f66b1ed2637019624ead96ca3e2a4eb3e8c1e4e75cf397c8ccf2a564fc58160843

    • C:\Users\Admin\AppData\Local\Temp\Chair

      Filesize

      871KB

      MD5

      5dd76f9b131bd9280b272b0d9cc7d6fa

      SHA1

      e84ac5ab26fa7dfadd6a2ae8eb44ecfcd1df3fcb

      SHA256

      320109cd5cccab034adcba6b12f5b1c74d5efe15d91f703400ea78574815a5ac

      SHA512

      d7e0785c0fdc17e479ee0b7beddaaa9cda41342d3db299780fd54b3f0f15d6cc152d7c6afecbc96282882ded4684475476a0f302aadcf3f2df3b4ac24823104b

    • C:\Users\Admin\AppData\Local\Temp\Crowd

      Filesize

      17KB

      MD5

      4a25a301384083c2f7f8fbdfc4614a24

      SHA1

      149739f4e25721313cb9b4a54c057c9dfd93bebc

      SHA256

      24fdac4db714a722e4dbf2a8c85fe35e344c506cc62ed56a5eeef374c71114b7

      SHA512

      568306cdb99d8130da2f1270c5fd83f6bc0d0da701770fbfbe3a5406130b59cedd670c42ae94f03d840ade2c3280fb572d97367d2eff6517694dd2e6c2087802

    • C:\Users\Admin\AppData\Local\Temp\Default

      Filesize

      59KB

      MD5

      e58ec233a22a2afd0830ac3fbc1681c4

      SHA1

      9ad2820fc1eaf2db249d3ad5fb8235907bdc8a90

      SHA256

      0d0b3c412c1c548551b9a9b654e4807907f1feee60e54025d58345870411bd96

      SHA512

      f07106bffa69bac69c2d671966f1b2be15abbf02a0b743648bd923b353df61677ab62b82be6a4d5a2b3be6b1ea1d52c6c80cc9518e81ffcd2fc103dcd5e82f7d

    • C:\Users\Admin\AppData\Local\Temp\Giant

      Filesize

      63KB

      MD5

      b54bdfec215fcbb5eef44a9fb3fe1d0f

      SHA1

      304da9580c019ade3315d3491f05c8bbb30d1428

      SHA256

      3be53afcf04355c373c141c8d1530642ce9edcda62832c8a52597d93c420ea1e

      SHA512

      56a51c8e70c81c2251ddc42981d2fd1e5961a630080d84335957fcead012719bd91e09a25bed387c297874c170e3d78247a897cc7a4aaf62ca1e7d108309b565

    • C:\Users\Admin\AppData\Local\Temp\Implied

      Filesize

      70KB

      MD5

      ed5a7e5ebc851ff187e78ddb46d5065c

      SHA1

      999c305e511b8b1d920756fa8c8503a4c2b363ab

      SHA256

      9ba25bcaeca5ec60fc96c1f7fc805b7423e85ac4fd8a1d77fcf0bfa3f8883016

      SHA512

      7d6399f8272db050ad3fa47b838073d5fd1d296f3cb48d30f0ab8cfa1a8da583dd386ceea0483182da72c3e9ba7f3f8c284683ee40d4ede0785713b142b709ac

    • C:\Users\Admin\AppData\Local\Temp\Moved

      Filesize

      62KB

      MD5

      eef9d756ed89cd8996e71d05c44cdf6e

      SHA1

      0adb893d88ad645bdd8f46f0f9e9c8f0eb204fa9

      SHA256

      d3ba00b0523e1e305acc3e771a5bc0be0c313f003a26319e34a6a36a49810094

      SHA512

      fcbb8b00bb7e383870dae9bbebb3c2dc59ba5fa84f3c2f68848588049f4d6bdcab3dbf62377d8afa4ae02de3ac09e8b13cb8b9512c293d79c9d857d3928da2bb

    • C:\Users\Admin\AppData\Local\Temp\Occasion

      Filesize

      767B

      MD5

      596ad1a8bd4e44cb130d1ef1d6059e4e

      SHA1

      ffd897fffad3a748e97fbc7534528a728c4902d3

      SHA256

      85f323e6d3d89c79b5edf83d649109f1507f7469de045dfa87897cda0dad27d0

      SHA512

      89f1c093093fc1005ea34eb078082526ce0bae5ecc4802a5391cf054215a58786ef14272b0f64f7035647f50039130a0fc4d49366fab1ba373e197fe2cea66d6

    • C:\Users\Admin\AppData\Local\Temp\Packs

      Filesize

      66KB

      MD5

      7d69e84c0ae6283a8f23549139890abe

      SHA1

      124d9a9aae603472942ddcad81755cff339cec65

      SHA256

      f20ad5e8e7b0d65ed0960768042e36df8ed864f25a4ca8119571a1371a47adc6

      SHA512

      64762bc8941f0d518e3782e6691c4afff0f04fbbe4a7c1b9ee55898e3d45491a8dc4ff11c074a403027beeb97e0350bc8e4d564072ff0966e60f18b3b34aba83

    • C:\Users\Admin\AppData\Local\Temp\Risk

      Filesize

      58KB

      MD5

      6f81fd8da77909832540096df4593ac9

      SHA1

      e81110b795adbe51d1b72a8c3e6006de70e615cf

      SHA256

      4055bf9c63514d77bfb7dfa721eced4069eddadc7b3c6a0c7293368d74ff2691

      SHA512

      ba720ea339e4cf44fe8cb1d61f6a4b8790927a7d5160e109a0d7f447652a3cf1673342ed3631a2c3f5c4c758dbc4b489dc13af61dc1617405245fa056a0b40c7

    • C:\Users\Admin\AppData\Local\Temp\Rivers

      Filesize

      89KB

      MD5

      d28b51a29abf9056c1d277144706a8b7

      SHA1

      c604d01fddd24901576eb59d5eea6a69dc18b4dc

      SHA256

      92ee2bef2bd3517fc502268c7ffc985133e1d43647c3fa3883e26e144f304c5d

      SHA512

      3e5c90f98a152d6953d5598d1d55baea66bee6a680d939f564ccd98275a158f5af88c8caa04982e348c1e774b43913d5bb80db6dcfe1e86d8b6e1a87b4f35b60

    • C:\Users\Admin\AppData\Local\Temp\Scanning

      Filesize

      60KB

      MD5

      1d4f2a3236547d62be707d93e932b925

      SHA1

      af0ad40544630e7c8ed557bb58454275d906c922

      SHA256

      ac0b214c8f0223cc07229111b54b36f20c5482aab23cc110efa4c12b7eca959f

      SHA512

      c142b69c513f28207d1aba6c28c57d7689e97a86ceaed973d6de57f3d0013b57b6e2fec9f3ec7d1d5385fd51e368bd1c2d5e97003b5dd1e24ba3c7091dab0a89

    • C:\Users\Admin\AppData\Local\Temp\Seat

      Filesize

      93KB

      MD5

      c0a33e9bb8a0ab483b925de981ac8258

      SHA1

      c306979d79134d2c371abeb9ad7fd2534ba5b8f0

      SHA256

      64210f7500d2f989a9ff34abe9a1422bcf0da829d872290d6894b0186dd5c9d0

      SHA512

      4d01c211da779e657c1628f29b56723c162960eb5c8aab420d09a2e06defb0f0936bc47639a81cf135c285ccfe44e1f3ca3060b70d4fbe7ff53964bc48582931

    • C:\Users\Admin\AppData\Local\Temp\Size

      Filesize

      55KB

      MD5

      220b23b4c1bac3a2a41c00933fa7ea94

      SHA1

      540d288a4bd06fdba264f7563645d3c6e4c3870f

      SHA256

      91cb645789886cc2df22ad48cb849d4741c0a42001c8a33e458a2f7605578c79

      SHA512

      a78e5454ea5d3b392d8018bdb3d7a0b0cb30c7e6a553dc045b2b69049184b166e46c67841b5992adffdbf43eb501531937b4846a5017cdf93e1ddcd5426010df

    • C:\Users\Admin\AppData\Local\Temp\Tax

      Filesize

      36KB

      MD5

      de08a0716cee5ecf80e0c63ecf2a2200

      SHA1

      16490f11a336240fcc1d001b824e061e2e32d173

      SHA256

      c4aeda45139db7239ce6ab0396253d5c24856c955d6a58c84b57149c11cf4ef0

      SHA512

      92cf3e5f98a27e24c0d848fcf28756f9295b52e3ce1dca65d336015c38515454b06517894e9c0a57da5906d012b2cd3a7a51c8b96343bab5af8b1ba9d38c1ee2

    • C:\Users\Admin\AppData\Local\Temp\Too

      Filesize

      55KB

      MD5

      7bdedddd79c8976415e0388daed25ba3

      SHA1

      ea748e274f55433990bc33d33b3ded9dda425cdc

      SHA256

      9e32b9f865fc2be033cbcee025dbf3f9c18dba39ae3aa863f23f4743e7aba3c6

      SHA512

      ecf9aca1adaba1e3f5e84b09b7235e02cfa9c3365bcc676100288416afc54048692df627ed512b481e587983a58dfd7a77ad3efc5d1bafbdb4f700ea4bb3037e

    • C:\Users\Admin\AppData\Local\Temp\Tulsa

      Filesize

      61KB

      MD5

      ea83893e0583c7c8d47e1094cce3b8f5

      SHA1

      df478775b782326402d6b3c651bad70bcab772ae

      SHA256

      1062139ed245c9142e27a1849cc8dfc1a50b355ff74c0fc5b84d8e501f3acc7f

      SHA512

      008d249e25cd99e7cc03672a275abc3dcbe6ec0e2eaa006e1290f063cedf61d4c2a0d88ec721983b73fab16fd9a4ed5bd0beb0f49feffb651cea9799ff23afe4

    • \Users\Admin\AppData\Local\Temp\327460\Mrna.pif

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • memory/780-80-0x0000000077B90000-0x0000000077D39000-memory.dmp

      Filesize

      1.7MB

    • memory/780-82-0x0000000077810000-0x0000000077857000-memory.dmp

      Filesize

      284KB

    • memory/780-79-0x0000000001D80000-0x0000000002180000-memory.dmp

      Filesize

      4.0MB

    • memory/2036-52-0x00000000000C0000-0x000000000013E000-memory.dmp

      Filesize

      504KB

    • memory/2036-53-0x00000000000C0000-0x000000000013E000-memory.dmp

      Filesize

      504KB

    • memory/2036-55-0x00000000000C0000-0x000000000013E000-memory.dmp

      Filesize

      504KB

    • memory/2036-56-0x0000000000CB0000-0x00000000010B0000-memory.dmp

      Filesize

      4.0MB

    • memory/2036-57-0x0000000000CB0000-0x00000000010B0000-memory.dmp

      Filesize

      4.0MB

    • memory/2036-58-0x0000000077B90000-0x0000000077D39000-memory.dmp

      Filesize

      1.7MB

    • memory/2036-60-0x0000000077810000-0x0000000077857000-memory.dmp

      Filesize

      284KB

    • memory/2608-71-0x0000000000530000-0x00000000005AE000-memory.dmp

      Filesize

      504KB

    • memory/2608-69-0x0000000000530000-0x00000000005AE000-memory.dmp

      Filesize

      504KB

    • memory/2608-73-0x0000000000C50000-0x0000000001050000-memory.dmp

      Filesize

      4.0MB

    • memory/2608-76-0x0000000077810000-0x0000000077857000-memory.dmp

      Filesize

      284KB

    • memory/2608-74-0x0000000077B90000-0x0000000077D39000-memory.dmp

      Filesize

      1.7MB

    • memory/3028-63-0x0000000001DC0000-0x00000000021C0000-memory.dmp

      Filesize

      4.0MB

    • memory/3028-66-0x0000000077810000-0x0000000077857000-memory.dmp

      Filesize

      284KB

    • memory/3028-64-0x0000000077B90000-0x0000000077D39000-memory.dmp

      Filesize

      1.7MB

    • memory/3028-61-0x00000000000C0000-0x00000000000C9000-memory.dmp

      Filesize

      36KB