Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe
Resource
win10v2004-20240802-en
General
-
Target
ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe
-
Size
2.4MB
-
MD5
ee0a93c22584233cc9faf75b7b49bb78
-
SHA1
a31b0ac14c81447b71524e2815be43d9a55ea9f1
-
SHA256
ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27
-
SHA512
9fab2820bdb0a4e423f66c43105fc1f447d429b6ae525359f0977d034b562ca1a408e728324335f5aced12edd2135660711dd865b3c5fa641b57a02055ee170c
-
SSDEEP
49152:+pz3Cy3BkrhfRAXMSxDw7DDCDbNV2ZGomxwF2Nz2k+IsvOYIiPcT:+pey3BkrZRAXMwDuDeh4ZGXeUMSevI9
Malware Config
Extracted
rhadamanthys
https://154.216.19.149:2047/888260cc6af8f/pnmx326i.m7ats
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
explorer.exedescription pid process target process PID 1620 created 2940 1620 explorer.exe sihost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe -
Executes dropped EXE 2 IoCs
Processes:
dpaw.exedpaw.exepid process 4080 dpaw.exe 4824 dpaw.exe -
Loads dropped DLL 2 IoCs
Processes:
dpaw.exedpaw.exepid process 4080 dpaw.exe 4824 dpaw.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dpaw.exedescription pid process target process PID 4824 set thread context of 4140 4824 dpaw.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explorer.exeopenwith.exead8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exedpaw.exedpaw.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
dpaw.exedpaw.execmd.exeexplorer.exeopenwith.exepid process 4080 dpaw.exe 4824 dpaw.exe 4824 dpaw.exe 4140 cmd.exe 4140 cmd.exe 1620 explorer.exe 1620 explorer.exe 804 openwith.exe 804 openwith.exe 804 openwith.exe 804 openwith.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
dpaw.execmd.exepid process 4824 dpaw.exe 4140 cmd.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exedpaw.exedpaw.execmd.exeexplorer.exedescription pid process target process PID 4004 wrote to memory of 4080 4004 ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe dpaw.exe PID 4004 wrote to memory of 4080 4004 ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe dpaw.exe PID 4004 wrote to memory of 4080 4004 ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe dpaw.exe PID 4080 wrote to memory of 4824 4080 dpaw.exe dpaw.exe PID 4080 wrote to memory of 4824 4080 dpaw.exe dpaw.exe PID 4080 wrote to memory of 4824 4080 dpaw.exe dpaw.exe PID 4824 wrote to memory of 4140 4824 dpaw.exe cmd.exe PID 4824 wrote to memory of 4140 4824 dpaw.exe cmd.exe PID 4824 wrote to memory of 4140 4824 dpaw.exe cmd.exe PID 4824 wrote to memory of 4140 4824 dpaw.exe cmd.exe PID 4140 wrote to memory of 1620 4140 cmd.exe explorer.exe PID 4140 wrote to memory of 1620 4140 cmd.exe explorer.exe PID 4140 wrote to memory of 1620 4140 cmd.exe explorer.exe PID 4140 wrote to memory of 1620 4140 cmd.exe explorer.exe PID 1620 wrote to memory of 804 1620 explorer.exe openwith.exe PID 1620 wrote to memory of 804 1620 explorer.exe openwith.exe PID 1620 wrote to memory of 804 1620 explorer.exe openwith.exe PID 1620 wrote to memory of 804 1620 explorer.exe openwith.exe PID 1620 wrote to memory of 804 1620 explorer.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2940
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
C:\Users\Admin\AppData\Local\Temp\ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe"C:\Users\Admin\AppData\Local\Temp\ad8a68b30eb57f68ac5114c34d84977986b8a1a861ea1510275ca9135ab69c27.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\dpaw.exe"C:\Users\Admin\AppData\Local\Temp\dpaw.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Roaming\BackupstreamEar\dpaw.exeC:\Users\Admin\AppData\Roaming\BackupstreamEar\dpaw.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD54e35791c97152a0c01c6638fd26413fd
SHA1048c20b2152b4aeb390c276dbf5df3334dba45a7
SHA256f5bd2c558b6686c8e8c701be3c56108edf5edcaf7bda69ee0407b0829ad09833
SHA51279a47f194fe68a9da5b882c97bf70ccb0ad944c287ce034b040e1ae7c0f5f78013777731f5352033fe2e2e2026fc0be4aae433bcd980bbd4d18fb5ed3a34af06
-
Filesize
2.7MB
MD5870feaab725b148208dd12ffabe33f9d
SHA19f3651ad5725848c880c24f8e749205a7e1e78c1
SHA256bbf7154f14d736f0c8491fb9fb44d2f179cdb02d34ab54c04466fa0702ea7d55
SHA5125bea301f85e6a55fd5730793b960442bc4dab92d0bf47e4e55c5490448a4a22ed6d0feb1dbe9d56d6b6ff8d06f163381807f83f467621f527bc6521857fc8e1a
-
Filesize
1.1MB
MD5d65cb7d896828d7ac8362666ba0924ed
SHA1fcf717e3655504d40cf0b61ddf9baf3a567d4eae
SHA25631b3d8e895fe4427afa72ef941d3f38091c492fd4022798f3dbd07358400d108
SHA512b06315613939f72fd162d0b6cc1a0eb7ae071c1488c03df1819bde79ed3538a26cabca47b197a599f6b9d5b4cf2b178d9f2d847e9d77ccfd7bad67be3a8033cf
-
Filesize
1007KB
MD5c9a617c1948d7ea4a92cdec95eb0c2a8
SHA10d3bab8fae5b47475d8b6aaaf5a13f8ba2ee74d0
SHA256303cfaaa049a750c2708f75348aa8160e5e40e6cda748f1d406a791a73ac59b7
SHA5123a39a90238908c9aa5f9ac9fa9a3014cb61a4d9670d8dbe4967366bd594a243719d01887f67b7882e1d9ea9aceac1f1e146c8a93d057baa40c035f8c385bc1cb
-
Filesize
65KB
MD5a9bd962417f5f9c7d3ee60059339d41a
SHA16872db237f15ce21eefc4182724397806488e8ff
SHA25623eaeb4e7878be5897aaf9a3c7ab4ca9cb0815f6c2d5fd70c1fe60d1ed3e8dbe
SHA512731ee69c219f93d3d687d8fc8a18aa50c5676c89ebc41cd0e737426de5780dbcf4f178c449c29d777091b25b236749c5db262116419f28d9c48f068d84941d41