Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
Portable.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Portable.exe
Resource
win10v2004-20240802-en
General
-
Target
Portable.exe
-
Size
47.5MB
-
MD5
7914276bc13829ece91fb33f038a2344
-
SHA1
e849ac762ff282d46966ba651bb1a50b570dac43
-
SHA256
7c4e153855d42e10e3635b40f6471246624a3492a4c07170443a7fa9131eac33
-
SHA512
184a6831dd66c7fe4444c5515dd702bab3cf3743fec7d2953f3f5d5387f18a5a3915290013500d74076d61b45817dc5c9b806598e13971c5f71596c5a8496002
-
SSDEEP
786432:uCDyg3W4TaEhG4fsl6ny34lzK/szLPlwXu4Sk/f9VJxVNeKtmUVQ8E+5M5+bwMzk:uCWcaEhG4fsEnyIE/2LqXOk/f9VdIEm/
Malware Config
Extracted
rhadamanthys
https://185.161.251.6:5545/03a8d04906e4d03e0d308acd/homicide
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Portable.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Portable.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid Process 2684 chrome.exe 2684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe Token: SeShutdownPrivilege 2684 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid Process 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe 2684 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 2684 wrote to memory of 2656 2684 chrome.exe 31 PID 2684 wrote to memory of 2656 2684 chrome.exe 31 PID 2684 wrote to memory of 2656 2684 chrome.exe 31 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2952 2684 chrome.exe 33 PID 2684 wrote to memory of 2720 2684 chrome.exe 34 PID 2684 wrote to memory of 2720 2684 chrome.exe 34 PID 2684 wrote to memory of 2720 2684 chrome.exe 34 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35 PID 2684 wrote to memory of 2956 2684 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Portable.exe"C:\Users\Admin\AppData\Local\Temp\Portable.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2624
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef71b9758,0x7fef71b9768,0x7fef71b97782⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1280,i,13445560356270395073,12242049388289857505,131072 /prefetch:22⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1280,i,13445560356270395073,12242049388289857505,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 --field-trial-handle=1280,i,13445560356270395073,12242049388289857505,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2232 --field-trial-handle=1280,i,13445560356270395073,12242049388289857505,131072 /prefetch:12⤵PID:300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2244 --field-trial-handle=1280,i,13445560356270395073,12242049388289857505,131072 /prefetch:12⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1452 --field-trial-handle=1280,i,13445560356270395073,12242049388289857505,131072 /prefetch:22⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2864 --field-trial-handle=1280,i,13445560356270395073,12242049388289857505,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3836 --field-trial-handle=1280,i,13445560356270395073,12242049388289857505,131072 /prefetch:82⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3844 --field-trial-handle=1280,i,13445560356270395073,12242049388289857505,131072 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3016
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:804
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x23c1⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5e7226392c938e4e604d2175eb9f43ca1
SHA12098293f39aa0bcdd62e718f9212d9062fa283ab
SHA256d46ec08b6c29c4ca56cecbf73149cc66ebd902197590fe28cd65dad52a08c4e1
SHA51263a4b99101c790d40a813db9e0d5fde21a64ccaf60a6009ead027920dbbdb52cc262af829e5c4140f3702a559c7ac46efa89622d76d45b4b49a9ce01625ef145
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD51f2016dc6352e159e48754632471320c
SHA18458f6083d98f94233d51ec6fe2d18ceb5e4e109
SHA256504ea90641ed4abcd0fd58bb4d6ba87424b36ffac81258e495acd9e55023e514
SHA512a898cff996797896a5ad6e7ccb34d2ae3abed19a18b9ff5037a0dd1c4d979d650430b5d3adaf7f3be94a2a0bc3ea68143e43388be9035a19728b36407f5a91d3
-
Filesize
5KB
MD5bcc492c94dc36d8b6e01977b1ed89c48
SHA1d3997f31ad7188931b1fc9fdee5519ac0d4a36d9
SHA256fd2a892b540616d94b496c531541a578828d4e76fd343587251cc54fc4aa6db6
SHA512b48502477f3900ccba0ae56e4162522bc1a96a1fea392688d558d7a090ff5dcae67b93186dfc68b16f5a0b3ad7e61d936f8ce908ba5033308dd9ac00a1bf1b01
-
Filesize
4KB
MD50834e05c9aded8b073a2befb4530b4cc
SHA12b01fe6851512ccbbbe32edabd842f1c7939f59c
SHA2565a17cddc92caa3a13e5c6523ec0175459339504520dec313a2c06ae92185be0c
SHA512c657c65bd6dc16a04e6a2c44970d68c35be368166aad9cf7f782fa94c895cfdcc3cef49bda98474e6b4cdc7223d1270c73c6144cc89b163f7603e3d0f9b05ac1
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
321KB
MD5d535bd37ef012b65a3f2b10dd74e007c
SHA13225ebd066ce1bfd1088ac1bfa7907aa5c2a09ed
SHA256401556360296ef084fce6422645edca72d52d02199bfc0bcd673aed700fb418e
SHA5128fdd82f7934c86070c5313fa6263fd321fc4d3b0f3fa5429efa1b9bb80c479494746568b9184fc238dd27dc6c3ce1925dd2e5a2bb84526b3546ea1c88e3ac203
-
Filesize
321KB
MD5dfec04b9c3905c9b34504456f7effbd6
SHA18fb8382b62995fc58c260cae9d2036e9a29bbede
SHA256f39f7fae683637b8d7386e341f57fef3b5e88ea016d3e5bb694ccc5e22bf67a6
SHA51206a425747e0da715822600ac0e1ab919a0dc90bb06dd71ebaaf07dca1ee93f0f2a44c3ae4e17c44714b088a531e098fe8d858858cd77afcfd57b70e03932390b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e