Analysis
-
max time kernel
76s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
Driver_x32.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Driver_x32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Installer-master-BlackMythWukong.msi
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Installer-master-BlackMythWukong.msi
Resource
win10v2004-20240802-en
General
-
Target
Installer-master-BlackMythWukong.msi
-
Size
43.8MB
-
MD5
4cbea3318f7107adb73e10fd8de96abf
-
SHA1
c6db50f856e92e5b0fa2f4b3855cbd58aa408fc1
-
SHA256
395c44cce9624a5750c97c313b5ede45ea36dd623bc71f7d1bf2e4964492dcd4
-
SHA512
724291101a4859c8e700ff762e48f6e2ded60fed23bfd64be7c438552c885b22d35b693ec03c2d234afe60d9defdc39ada77fedd9d3c881710935aa4e4f9b931
-
SSDEEP
786432:H8JJ5v6bZ0no3r27KIvSOcaVWfoyI4aEK0Gpqq++mFIjqEKrdLi9VMkryQs:HC5i10noy7KS/RVLCqpP++mF+gLBf
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4256 created 2952 4256 visapro.exe 50 -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3460 ICACLS.EXE 4752 ICACLS.EXE -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIC5F.tmp msiexec.exe File opened for modification C:\Windows\Installer\e580b07.msi msiexec.exe File created C:\Windows\Installer\SourceHash{D2331EC5-01E6-4564-8DF3-B5D283A6767A} msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\LOGS\DPX\setuperr.log EXPAND.EXE File created C:\Windows\Installer\e580b07.msi msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 4256 visapro.exe -
Loads dropped DLL 1 IoCs
pid Process 1816 MsiExec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 1592 msiexec.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2676 4256 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language visapro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ICACLS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ICACLS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPAND.EXE -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2728 msiexec.exe 2728 msiexec.exe 4256 visapro.exe 4256 visapro.exe 3988 openwith.exe 3988 openwith.exe 3988 openwith.exe 3988 openwith.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeShutdownPrivilege 1592 msiexec.exe Token: SeIncreaseQuotaPrivilege 1592 msiexec.exe Token: SeSecurityPrivilege 2728 msiexec.exe Token: SeCreateTokenPrivilege 1592 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1592 msiexec.exe Token: SeLockMemoryPrivilege 1592 msiexec.exe Token: SeIncreaseQuotaPrivilege 1592 msiexec.exe Token: SeMachineAccountPrivilege 1592 msiexec.exe Token: SeTcbPrivilege 1592 msiexec.exe Token: SeSecurityPrivilege 1592 msiexec.exe Token: SeTakeOwnershipPrivilege 1592 msiexec.exe Token: SeLoadDriverPrivilege 1592 msiexec.exe Token: SeSystemProfilePrivilege 1592 msiexec.exe Token: SeSystemtimePrivilege 1592 msiexec.exe Token: SeProfSingleProcessPrivilege 1592 msiexec.exe Token: SeIncBasePriorityPrivilege 1592 msiexec.exe Token: SeCreatePagefilePrivilege 1592 msiexec.exe Token: SeCreatePermanentPrivilege 1592 msiexec.exe Token: SeBackupPrivilege 1592 msiexec.exe Token: SeRestorePrivilege 1592 msiexec.exe Token: SeShutdownPrivilege 1592 msiexec.exe Token: SeDebugPrivilege 1592 msiexec.exe Token: SeAuditPrivilege 1592 msiexec.exe Token: SeSystemEnvironmentPrivilege 1592 msiexec.exe Token: SeChangeNotifyPrivilege 1592 msiexec.exe Token: SeRemoteShutdownPrivilege 1592 msiexec.exe Token: SeUndockPrivilege 1592 msiexec.exe Token: SeSyncAgentPrivilege 1592 msiexec.exe Token: SeEnableDelegationPrivilege 1592 msiexec.exe Token: SeManageVolumePrivilege 1592 msiexec.exe Token: SeImpersonatePrivilege 1592 msiexec.exe Token: SeCreateGlobalPrivilege 1592 msiexec.exe Token: SeBackupPrivilege 832 vssvc.exe Token: SeRestorePrivilege 832 vssvc.exe Token: SeAuditPrivilege 832 vssvc.exe Token: SeBackupPrivilege 2728 msiexec.exe Token: SeRestorePrivilege 2728 msiexec.exe Token: SeRestorePrivilege 2728 msiexec.exe Token: SeTakeOwnershipPrivilege 2728 msiexec.exe Token: SeRestorePrivilege 2728 msiexec.exe Token: SeTakeOwnershipPrivilege 2728 msiexec.exe Token: SeBackupPrivilege 4744 srtasks.exe Token: SeRestorePrivilege 4744 srtasks.exe Token: SeSecurityPrivilege 4744 srtasks.exe Token: SeTakeOwnershipPrivilege 4744 srtasks.exe Token: SeBackupPrivilege 4744 srtasks.exe Token: SeRestorePrivilege 4744 srtasks.exe Token: SeSecurityPrivilege 4744 srtasks.exe Token: SeTakeOwnershipPrivilege 4744 srtasks.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1592 msiexec.exe 1592 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4256 visapro.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2728 wrote to memory of 4744 2728 msiexec.exe 94 PID 2728 wrote to memory of 4744 2728 msiexec.exe 94 PID 2728 wrote to memory of 1816 2728 msiexec.exe 96 PID 2728 wrote to memory of 1816 2728 msiexec.exe 96 PID 2728 wrote to memory of 1816 2728 msiexec.exe 96 PID 1816 wrote to memory of 3460 1816 MsiExec.exe 101 PID 1816 wrote to memory of 3460 1816 MsiExec.exe 101 PID 1816 wrote to memory of 3460 1816 MsiExec.exe 101 PID 1816 wrote to memory of 1152 1816 MsiExec.exe 103 PID 1816 wrote to memory of 1152 1816 MsiExec.exe 103 PID 1816 wrote to memory of 1152 1816 MsiExec.exe 103 PID 1816 wrote to memory of 4256 1816 MsiExec.exe 105 PID 1816 wrote to memory of 4256 1816 MsiExec.exe 105 PID 1816 wrote to memory of 4256 1816 MsiExec.exe 105 PID 4256 wrote to memory of 3988 4256 visapro.exe 110 PID 4256 wrote to memory of 3988 4256 visapro.exe 110 PID 4256 wrote to memory of 3988 4256 visapro.exe 110 PID 4256 wrote to memory of 3988 4256 visapro.exe 110 PID 4256 wrote to memory of 3988 4256 visapro.exe 110 PID 1816 wrote to memory of 3516 1816 MsiExec.exe 115 PID 1816 wrote to memory of 3516 1816 MsiExec.exe 115 PID 1816 wrote to memory of 3516 1816 MsiExec.exe 115 PID 1816 wrote to memory of 4752 1816 MsiExec.exe 117 PID 1816 wrote to memory of 4752 1816 MsiExec.exe 117 PID 1816 wrote to memory of 4752 1816 MsiExec.exe 117 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2952
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Installer-master-BlackMythWukong.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1592
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FAC6DE93DEF274B4E41760CB3010EEB72⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-97802ab5-ecf4-4ef8-a803-bca1e5aa5cfe\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3460
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\MW-97802ab5-ecf4-4ef8-a803-bca1e5aa5cfe\files\visapro.exe"C:\Users\Admin\AppData\Local\Temp\MW-97802ab5-ecf4-4ef8-a803-bca1e5aa5cfe\files\visapro.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 7204⤵
- Program crash
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-97802ab5-ecf4-4ef8-a803-bca1e5aa5cfe\files"3⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-97802ab5-ecf4-4ef8-a803-bca1e5aa5cfe\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4752
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4256 -ip 42561⤵PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43.4MB
MD59f1ce12a6a16d2755d486fdbd2c0f506
SHA18082354009566d640b028f1266e0e3bfd2fc333d
SHA2560bd8fb2d6b28c93dcf4c3badffae9041287221a2db276ff872a78221ac1e0f31
SHA512bd8d0308e4504c92f9e59f46bafe90ff278218ad858736e32ade76c9d48ff9db83572d972dbd7f269a2d11913c2b2c0e2b6a2c7f37dc5f27d7be45dc323cdbfb
-
Filesize
49.6MB
MD553a23a0592e5aab08e0fa996497337f4
SHA17c843871ef5debb284915c6c7628d96563e3693e
SHA256d3f7809ae8ccc194787198cc370952ab22a9b74bcae1e249f840c18798205bc1
SHA512d21aaae60d62b2c9a1bf52fa4464cefc777ca81e9122aca8989afcf0676f81e39af8f3df405c4cc3b8c68f8a1bcb94adcb60a718f80d63084bb79323f775d321
-
Filesize
1004B
MD57a675cf27bb343b98655b7ae27ec5b6c
SHA1f590862dac56c0e05f49aff3cfcb178df638941e
SHA256524dcd3a285f7f4eb622e68a84bf8bcb23c4fea44fc36b99be91c160187f11ac
SHA5128091e3e23ff4918aa7a490f4a906c14f7b95782dbc52f39d60d32c65dd0a23b5c6a3d869aaf9387d50b2448e06034c69dad44f74bb7df08e02a6d09a58443832
-
Filesize
1KB
MD5e6461c3249b0197b2eba81353ba62b1f
SHA1458ffaa203fcc42524dd8784b99335fc0c720801
SHA256fb80554755798836e14291652746a1c487fdf8a9c71e8a48eaf1026a7f264ea1
SHA51218ed11b948a11cb3cbf7d02f79d3951b6c4d81ad4bcb2884737f97ba713d71eb4e5a145657e83f69eadb60243902cf6f42f67260a69e422197bb371c49f326ea
-
Filesize
208KB
MD50c8921bbcc37c6efd34faf44cf3b0cb5
SHA1dcfa71246157edcd09eecaf9d4c5e360b24b3e49
SHA256fd622cf73ea951a6de631063aba856487d77745dd1500adca61902b8dde56fe1
SHA512ed55443e20d40cca90596f0a0542fa5ab83fe0270399adfaafd172987fb813dfd44ec0da0a58c096af3641003f830341fe259ad5bce9823f238ae63b7e11e108
-
Filesize
23.7MB
MD59c983ddff25d700e41614929507cfc61
SHA15e98847c9eaf31e37ca150d5df3dcd5d55a31f94
SHA256e6ca26acc06d650bad96a1ba8b13df0907b597630d902b811e69e4cf010cea35
SHA512497e32b762addd8bed80e5256c9b541a208bf92b28fb31520cbaba1e3f7a00aa3bfa662d52453b56a0d228901ea220e3716eac11e5ec095bfa2f35c2bf421cc6
-
\??\Volume{fa35ad82-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c76b2626-6e6e-4703-8162-7f3f2db5e662}_OnDiskSnapshotProp
Filesize6KB
MD5023acc3d20335cdcb73bfd2bdfc1bc1f
SHA1fd3e2496dbe591d2bea793855f54d4a8a80667f2
SHA2560e29dbeb82a8a5b3680081bd24316740da993db19ce12b1eb30bd431f13a7c19
SHA5123504b530ad9591eb1d28dcfe589917c9ce55178262098e0ba4918077191ad526f9e8ff7325f2945a28b901628cbf8f6f6f63284c4e687b699fb0e31efbcb29af