Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 12:55
Static task
static1
Behavioral task
behavioral1
Sample
ff5bef5bc6a37af813010fbf65b9f470N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff5bef5bc6a37af813010fbf65b9f470N.dll
Resource
win10v2004-20240802-en
General
-
Target
ff5bef5bc6a37af813010fbf65b9f470N.dll
-
Size
1.5MB
-
MD5
ff5bef5bc6a37af813010fbf65b9f470
-
SHA1
92a81390c6fc694b48364afcc8a9898e3600bc16
-
SHA256
766d45108b453a7efb1c63a80bdfcd2784bbfb730fe5c0971ab68ebf3e345109
-
SHA512
79991d76123f7f3f458c905e01e8fbb7cc621892b389fe97d7df0b7d804c16626404479e4422cebd7fa8fd0e25b7784884c38250e304327da643613620b4e064
-
SSDEEP
24576:/8DpJCGFXLxo15Xyfsf+fee5p184Pr1HLOkVyLP7E8Lr19Ei+sh/7mFJ3ckEJ8:1TWfee5kerZLOkALP7fiiHhDisW
Malware Config
Extracted
rhadamanthys
https://198.135.48.191:3090/7cc6bd8a9e6893408/9mv6h45b.p009i
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\*ChromeUpdate = "rundll32.exe C:\\Users\\Admin\\Documents\\FirefoxData.dll,EntryPoint" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 2516 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2988 1616 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.execmd.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
rundll32.exerundll32.exerundll32.execmd.exedescription pid process target process PID 2496 wrote to memory of 2516 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 2516 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 2516 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 2516 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 2516 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 2516 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 2516 2496 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 2516 wrote to memory of 1616 2516 rundll32.exe rundll32.exe PID 1616 wrote to memory of 2988 1616 rundll32.exe WerFault.exe PID 1616 wrote to memory of 2988 1616 rundll32.exe WerFault.exe PID 1616 wrote to memory of 2988 1616 rundll32.exe WerFault.exe PID 1616 wrote to memory of 2988 1616 rundll32.exe WerFault.exe PID 2516 wrote to memory of 2712 2516 rundll32.exe cmd.exe PID 2516 wrote to memory of 2712 2516 rundll32.exe cmd.exe PID 2516 wrote to memory of 2712 2516 rundll32.exe cmd.exe PID 2516 wrote to memory of 2712 2516 rundll32.exe cmd.exe PID 2712 wrote to memory of 2768 2712 cmd.exe reg.exe PID 2712 wrote to memory of 2768 2712 cmd.exe reg.exe PID 2712 wrote to memory of 2768 2712 cmd.exe reg.exe PID 2712 wrote to memory of 2768 2712 cmd.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff5bef5bc6a37af813010fbf65b9f470N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff5bef5bc6a37af813010fbf65b9f470N.dll,#12⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1964⤵
- Program crash
PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2768
-
-
-