Analysis

  • max time kernel
    131s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/08/2024, 01:35

General

  • Target

    7c86e8c4143be0e27af9558ca46b3b4d7c5bee5e58e18902757bc02f6a3863a2.exe

  • Size

    1.5MB

  • MD5

    29c6df4f70bc29919dba16a04c08800c

  • SHA1

    0c6083da1f78d6d365138cc96724ee7f33b4b7de

  • SHA256

    7c86e8c4143be0e27af9558ca46b3b4d7c5bee5e58e18902757bc02f6a3863a2

  • SHA512

    30c9c7e62f8cb8d05e3dfcf0c526f9943fb648f91cd156a356550b0be326bde79bcfd638bd8b956577a0b8860eea186a4b80fab1b79deeee6a35515a927db666

  • SSDEEP

    49152:ETXLOO0MV8+2vk1rrts0LDAYjNxyBVQEBX9:EV0gVjrrtsMkYBxQVQEBX9

Malware Config

Extracted

Family

rhadamanthys

C2

https://80.209.243.182:8094/c47580f52cd88a21fb/gb51j2km.kui3h

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2452
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2640
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5084
    • C:\Users\Admin\AppData\Local\Temp\7c86e8c4143be0e27af9558ca46b3b4d7c5bee5e58e18902757bc02f6a3863a2.exe
      "C:\Users\Admin\AppData\Local\Temp\7c86e8c4143be0e27af9558ca46b3b4d7c5bee5e58e18902757bc02f6a3863a2.exe"
      1⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k move Crowd Crowd.cmd & Crowd.cmd & exit
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3080
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2028
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "wrsa.exe opssvc.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3500
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3124
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3760
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 327460
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2980
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "PrideDramaticIconAcknowledge" Occasion
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3900
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Default + ..\Too + ..\Scanning + ..\Rivers + ..\Anthropology + ..\Implied + ..\Battle + ..\Tulsa + ..\Packs + ..\Seat + ..\Moved + ..\Giant + ..\Risk + ..\Size + ..\Tax z
          3⤵
          • System Location Discovery: System Language Discovery
          PID:620
        • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
          Mrna.pif z
          3⤵
          • Deletes itself
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c schtasks.exe /create /tn "Sticks" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SafeGuard Data Systems\AtlasVault.js'" /sc minute /mo 5 /F
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2732
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks.exe /create /tn "Sticks" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SafeGuard Data Systems\AtlasVault.js'" /sc minute /mo 5 /F
              5⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:808
          • C:\Windows\SysWOW64\cmd.exe
            cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AtlasVault.url" & echo URL="C:\Users\Admin\AppData\Local\SafeGuard Data Systems\AtlasVault.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AtlasVault.url" & exit
            4⤵
            • Drops startup file
            • System Location Discovery: System Language Discovery
            PID:2220
          • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
            C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3240
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 436
              5⤵
              • Program crash
              PID:2184
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 432
              5⤵
              • Program crash
              PID:208
          • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
            C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1956
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 436
              5⤵
              • Program crash
              PID:4460
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 468
              5⤵
              • Program crash
              PID:3004
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3240 -ip 3240
      1⤵
        PID:780
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3240 -ip 3240
        1⤵
          PID:2164
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1956 -ip 1956
          1⤵
            PID:1472
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1956 -ip 1956
            1⤵
              PID:2932

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\327460\Mrna.pif

              Filesize

              872KB

              MD5

              c56b5f0201a3b3de53e561fe76912bfd

              SHA1

              2a4062e10a5de813f5688221dbeb3f3ff33eb417

              SHA256

              237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

              SHA512

              195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

            • C:\Users\Admin\AppData\Local\Temp\327460\z

              Filesize

              989KB

              MD5

              9b72988705ea734a65d71ddda4ad6db1

              SHA1

              0ba8a6787874fb19cf95fd435bfe8f367d916f24

              SHA256

              954ea9105d0c27e132c46e68dbfaec2a636e933028abd42856979c6836ddacc5

              SHA512

              b741eb8c17fe2c32016a710fe0935bd4fff357b4b8e76230b274572d307ff44d3dc4e81bc2fcd253733bc1b93bdc1b0a2a3941b4a720471ec3a521754dcdbe0c

            • C:\Users\Admin\AppData\Local\Temp\Anthropology

              Filesize

              92KB

              MD5

              99c899ad39bb07a27a8447460e35af41

              SHA1

              b230a12ed8079938fc1d2de97fc3bea94484d68e

              SHA256

              cdb390ee422da6a5bc032f10700c4e502e7a67cb8a7a0b84ffb8948d7dedb205

              SHA512

              386235e15750991a6ea89836b3c2f6c3fd71eb3011fbb45475705717a5b7fd0568aeea9e895515eace855aa011ca16c1755ceeee59b176148cb32b7729c2786b

            • C:\Users\Admin\AppData\Local\Temp\Battle

              Filesize

              70KB

              MD5

              f179ed40289ae135eece0b9c92b74a02

              SHA1

              83a9f14cb07d7bd0164397b814cba2321ab9ec39

              SHA256

              97fb5b49f6a10ceec40702cf665177526c9634e32e83a747803894a7bed26e4d

              SHA512

              e721e5bda372a85a07b3be1b06720fb3a75be03dfd73936777d78902d37b81f66b1ed2637019624ead96ca3e2a4eb3e8c1e4e75cf397c8ccf2a564fc58160843

            • C:\Users\Admin\AppData\Local\Temp\Chair

              Filesize

              871KB

              MD5

              5dd76f9b131bd9280b272b0d9cc7d6fa

              SHA1

              e84ac5ab26fa7dfadd6a2ae8eb44ecfcd1df3fcb

              SHA256

              320109cd5cccab034adcba6b12f5b1c74d5efe15d91f703400ea78574815a5ac

              SHA512

              d7e0785c0fdc17e479ee0b7beddaaa9cda41342d3db299780fd54b3f0f15d6cc152d7c6afecbc96282882ded4684475476a0f302aadcf3f2df3b4ac24823104b

            • C:\Users\Admin\AppData\Local\Temp\Crowd

              Filesize

              17KB

              MD5

              4a25a301384083c2f7f8fbdfc4614a24

              SHA1

              149739f4e25721313cb9b4a54c057c9dfd93bebc

              SHA256

              24fdac4db714a722e4dbf2a8c85fe35e344c506cc62ed56a5eeef374c71114b7

              SHA512

              568306cdb99d8130da2f1270c5fd83f6bc0d0da701770fbfbe3a5406130b59cedd670c42ae94f03d840ade2c3280fb572d97367d2eff6517694dd2e6c2087802

            • C:\Users\Admin\AppData\Local\Temp\Default

              Filesize

              59KB

              MD5

              e58ec233a22a2afd0830ac3fbc1681c4

              SHA1

              9ad2820fc1eaf2db249d3ad5fb8235907bdc8a90

              SHA256

              0d0b3c412c1c548551b9a9b654e4807907f1feee60e54025d58345870411bd96

              SHA512

              f07106bffa69bac69c2d671966f1b2be15abbf02a0b743648bd923b353df61677ab62b82be6a4d5a2b3be6b1ea1d52c6c80cc9518e81ffcd2fc103dcd5e82f7d

            • C:\Users\Admin\AppData\Local\Temp\Giant

              Filesize

              63KB

              MD5

              b54bdfec215fcbb5eef44a9fb3fe1d0f

              SHA1

              304da9580c019ade3315d3491f05c8bbb30d1428

              SHA256

              3be53afcf04355c373c141c8d1530642ce9edcda62832c8a52597d93c420ea1e

              SHA512

              56a51c8e70c81c2251ddc42981d2fd1e5961a630080d84335957fcead012719bd91e09a25bed387c297874c170e3d78247a897cc7a4aaf62ca1e7d108309b565

            • C:\Users\Admin\AppData\Local\Temp\Implied

              Filesize

              70KB

              MD5

              ed5a7e5ebc851ff187e78ddb46d5065c

              SHA1

              999c305e511b8b1d920756fa8c8503a4c2b363ab

              SHA256

              9ba25bcaeca5ec60fc96c1f7fc805b7423e85ac4fd8a1d77fcf0bfa3f8883016

              SHA512

              7d6399f8272db050ad3fa47b838073d5fd1d296f3cb48d30f0ab8cfa1a8da583dd386ceea0483182da72c3e9ba7f3f8c284683ee40d4ede0785713b142b709ac

            • C:\Users\Admin\AppData\Local\Temp\Moved

              Filesize

              62KB

              MD5

              eef9d756ed89cd8996e71d05c44cdf6e

              SHA1

              0adb893d88ad645bdd8f46f0f9e9c8f0eb204fa9

              SHA256

              d3ba00b0523e1e305acc3e771a5bc0be0c313f003a26319e34a6a36a49810094

              SHA512

              fcbb8b00bb7e383870dae9bbebb3c2dc59ba5fa84f3c2f68848588049f4d6bdcab3dbf62377d8afa4ae02de3ac09e8b13cb8b9512c293d79c9d857d3928da2bb

            • C:\Users\Admin\AppData\Local\Temp\Occasion

              Filesize

              767B

              MD5

              596ad1a8bd4e44cb130d1ef1d6059e4e

              SHA1

              ffd897fffad3a748e97fbc7534528a728c4902d3

              SHA256

              85f323e6d3d89c79b5edf83d649109f1507f7469de045dfa87897cda0dad27d0

              SHA512

              89f1c093093fc1005ea34eb078082526ce0bae5ecc4802a5391cf054215a58786ef14272b0f64f7035647f50039130a0fc4d49366fab1ba373e197fe2cea66d6

            • C:\Users\Admin\AppData\Local\Temp\Packs

              Filesize

              66KB

              MD5

              7d69e84c0ae6283a8f23549139890abe

              SHA1

              124d9a9aae603472942ddcad81755cff339cec65

              SHA256

              f20ad5e8e7b0d65ed0960768042e36df8ed864f25a4ca8119571a1371a47adc6

              SHA512

              64762bc8941f0d518e3782e6691c4afff0f04fbbe4a7c1b9ee55898e3d45491a8dc4ff11c074a403027beeb97e0350bc8e4d564072ff0966e60f18b3b34aba83

            • C:\Users\Admin\AppData\Local\Temp\Risk

              Filesize

              58KB

              MD5

              6f81fd8da77909832540096df4593ac9

              SHA1

              e81110b795adbe51d1b72a8c3e6006de70e615cf

              SHA256

              4055bf9c63514d77bfb7dfa721eced4069eddadc7b3c6a0c7293368d74ff2691

              SHA512

              ba720ea339e4cf44fe8cb1d61f6a4b8790927a7d5160e109a0d7f447652a3cf1673342ed3631a2c3f5c4c758dbc4b489dc13af61dc1617405245fa056a0b40c7

            • C:\Users\Admin\AppData\Local\Temp\Rivers

              Filesize

              89KB

              MD5

              d28b51a29abf9056c1d277144706a8b7

              SHA1

              c604d01fddd24901576eb59d5eea6a69dc18b4dc

              SHA256

              92ee2bef2bd3517fc502268c7ffc985133e1d43647c3fa3883e26e144f304c5d

              SHA512

              3e5c90f98a152d6953d5598d1d55baea66bee6a680d939f564ccd98275a158f5af88c8caa04982e348c1e774b43913d5bb80db6dcfe1e86d8b6e1a87b4f35b60

            • C:\Users\Admin\AppData\Local\Temp\Scanning

              Filesize

              60KB

              MD5

              1d4f2a3236547d62be707d93e932b925

              SHA1

              af0ad40544630e7c8ed557bb58454275d906c922

              SHA256

              ac0b214c8f0223cc07229111b54b36f20c5482aab23cc110efa4c12b7eca959f

              SHA512

              c142b69c513f28207d1aba6c28c57d7689e97a86ceaed973d6de57f3d0013b57b6e2fec9f3ec7d1d5385fd51e368bd1c2d5e97003b5dd1e24ba3c7091dab0a89

            • C:\Users\Admin\AppData\Local\Temp\Seat

              Filesize

              93KB

              MD5

              c0a33e9bb8a0ab483b925de981ac8258

              SHA1

              c306979d79134d2c371abeb9ad7fd2534ba5b8f0

              SHA256

              64210f7500d2f989a9ff34abe9a1422bcf0da829d872290d6894b0186dd5c9d0

              SHA512

              4d01c211da779e657c1628f29b56723c162960eb5c8aab420d09a2e06defb0f0936bc47639a81cf135c285ccfe44e1f3ca3060b70d4fbe7ff53964bc48582931

            • C:\Users\Admin\AppData\Local\Temp\Size

              Filesize

              55KB

              MD5

              220b23b4c1bac3a2a41c00933fa7ea94

              SHA1

              540d288a4bd06fdba264f7563645d3c6e4c3870f

              SHA256

              91cb645789886cc2df22ad48cb849d4741c0a42001c8a33e458a2f7605578c79

              SHA512

              a78e5454ea5d3b392d8018bdb3d7a0b0cb30c7e6a553dc045b2b69049184b166e46c67841b5992adffdbf43eb501531937b4846a5017cdf93e1ddcd5426010df

            • C:\Users\Admin\AppData\Local\Temp\Tax

              Filesize

              36KB

              MD5

              de08a0716cee5ecf80e0c63ecf2a2200

              SHA1

              16490f11a336240fcc1d001b824e061e2e32d173

              SHA256

              c4aeda45139db7239ce6ab0396253d5c24856c955d6a58c84b57149c11cf4ef0

              SHA512

              92cf3e5f98a27e24c0d848fcf28756f9295b52e3ce1dca65d336015c38515454b06517894e9c0a57da5906d012b2cd3a7a51c8b96343bab5af8b1ba9d38c1ee2

            • C:\Users\Admin\AppData\Local\Temp\Too

              Filesize

              55KB

              MD5

              7bdedddd79c8976415e0388daed25ba3

              SHA1

              ea748e274f55433990bc33d33b3ded9dda425cdc

              SHA256

              9e32b9f865fc2be033cbcee025dbf3f9c18dba39ae3aa863f23f4743e7aba3c6

              SHA512

              ecf9aca1adaba1e3f5e84b09b7235e02cfa9c3365bcc676100288416afc54048692df627ed512b481e587983a58dfd7a77ad3efc5d1bafbdb4f700ea4bb3037e

            • C:\Users\Admin\AppData\Local\Temp\Tulsa

              Filesize

              61KB

              MD5

              ea83893e0583c7c8d47e1094cce3b8f5

              SHA1

              df478775b782326402d6b3c651bad70bcab772ae

              SHA256

              1062139ed245c9142e27a1849cc8dfc1a50b355ff74c0fc5b84d8e501f3acc7f

              SHA512

              008d249e25cd99e7cc03672a275abc3dcbe6ec0e2eaa006e1290f063cedf61d4c2a0d88ec721983b73fab16fd9a4ed5bd0beb0f49feffb651cea9799ff23afe4

            • memory/1956-72-0x0000000076690000-0x00000000768A5000-memory.dmp

              Filesize

              2.1MB

            • memory/1956-70-0x00007FFB23AD0000-0x00007FFB23CC5000-memory.dmp

              Filesize

              2.0MB

            • memory/1956-69-0x0000000003F70000-0x0000000004370000-memory.dmp

              Filesize

              4.0MB

            • memory/1956-67-0x0000000001200000-0x000000000127E000-memory.dmp

              Filesize

              504KB

            • memory/1956-65-0x0000000001200000-0x000000000127E000-memory.dmp

              Filesize

              504KB

            • memory/2640-63-0x0000000076690000-0x00000000768A5000-memory.dmp

              Filesize

              2.1MB

            • memory/2640-61-0x00007FFB23AD0000-0x00007FFB23CC5000-memory.dmp

              Filesize

              2.0MB

            • memory/2640-58-0x00000000007F0000-0x00000000007F9000-memory.dmp

              Filesize

              36KB

            • memory/2640-60-0x00000000025A0000-0x00000000029A0000-memory.dmp

              Filesize

              4.0MB

            • memory/3240-49-0x0000000000520000-0x000000000059E000-memory.dmp

              Filesize

              504KB

            • memory/3240-57-0x0000000076690000-0x00000000768A5000-memory.dmp

              Filesize

              2.1MB

            • memory/3240-55-0x00007FFB23AD0000-0x00007FFB23CC5000-memory.dmp

              Filesize

              2.0MB

            • memory/3240-54-0x00000000039D0000-0x0000000003DD0000-memory.dmp

              Filesize

              4.0MB

            • memory/3240-53-0x00000000039D0000-0x0000000003DD0000-memory.dmp

              Filesize

              4.0MB

            • memory/3240-52-0x0000000000520000-0x000000000059E000-memory.dmp

              Filesize

              504KB

            • memory/3240-50-0x0000000000520000-0x000000000059E000-memory.dmp

              Filesize

              504KB

            • memory/5084-76-0x00007FFB23AD0000-0x00007FFB23CC5000-memory.dmp

              Filesize

              2.0MB

            • memory/5084-75-0x0000000002B80000-0x0000000002F80000-memory.dmp

              Filesize

              4.0MB

            • memory/5084-78-0x0000000076690000-0x00000000768A5000-memory.dmp

              Filesize

              2.1MB