Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 12:55
Static task
static1
Behavioral task
behavioral1
Sample
ff5bef5bc6a37af813010fbf65b9f470N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff5bef5bc6a37af813010fbf65b9f470N.dll
Resource
win10v2004-20240802-en
General
-
Target
ff5bef5bc6a37af813010fbf65b9f470N.dll
-
Size
1.5MB
-
MD5
ff5bef5bc6a37af813010fbf65b9f470
-
SHA1
92a81390c6fc694b48364afcc8a9898e3600bc16
-
SHA256
766d45108b453a7efb1c63a80bdfcd2784bbfb730fe5c0971ab68ebf3e345109
-
SHA512
79991d76123f7f3f458c905e01e8fbb7cc621892b389fe97d7df0b7d804c16626404479e4422cebd7fa8fd0e25b7784884c38250e304327da643613620b4e064
-
SSDEEP
24576:/8DpJCGFXLxo15Xyfsf+fee5p184Pr1HLOkVyLP7E8Lr19Ei+sh/7mFJ3ckEJ8:1TWfee5kerZLOkALP7fiiHhDisW
Malware Config
Extracted
rhadamanthys
https://198.135.48.191:3090/7cc6bd8a9e6893408/9mv6h45b.p009i
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 3648 created 2956 3648 rundll32.exe 50 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*ChromeUpdate = "rundll32.exe C:\\Users\\Admin\\Documents\\FirefoxData.dll,EntryPoint" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
rundll32.exepid Process 2880 rundll32.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 4260 3648 WerFault.exe 89 3488 3648 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.execmd.exereg.exeopenwith.exerundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exeopenwith.exepid Process 3648 rundll32.exe 3648 rundll32.exe 4576 openwith.exe 4576 openwith.exe 4576 openwith.exe 4576 openwith.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
rundll32.exerundll32.execmd.exerundll32.exedescription pid Process procid_target PID 3120 wrote to memory of 2880 3120 rundll32.exe 85 PID 3120 wrote to memory of 2880 3120 rundll32.exe 85 PID 3120 wrote to memory of 2880 3120 rundll32.exe 85 PID 2880 wrote to memory of 3648 2880 rundll32.exe 89 PID 2880 wrote to memory of 3648 2880 rundll32.exe 89 PID 2880 wrote to memory of 3648 2880 rundll32.exe 89 PID 2880 wrote to memory of 3648 2880 rundll32.exe 89 PID 2880 wrote to memory of 3648 2880 rundll32.exe 89 PID 2880 wrote to memory of 3648 2880 rundll32.exe 89 PID 2880 wrote to memory of 3008 2880 rundll32.exe 90 PID 2880 wrote to memory of 3008 2880 rundll32.exe 90 PID 2880 wrote to memory of 3008 2880 rundll32.exe 90 PID 3008 wrote to memory of 4612 3008 cmd.exe 92 PID 3008 wrote to memory of 4612 3008 cmd.exe 92 PID 3008 wrote to memory of 4612 3008 cmd.exe 92 PID 3648 wrote to memory of 4576 3648 rundll32.exe 93 PID 3648 wrote to memory of 4576 3648 rundll32.exe 93 PID 3648 wrote to memory of 4576 3648 rundll32.exe 93 PID 3648 wrote to memory of 4576 3648 rundll32.exe 93 PID 3648 wrote to memory of 4576 3648 rundll32.exe 93
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2956
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff5bef5bc6a37af813010fbf65b9f470N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff5bef5bc6a37af813010fbf65b9f470N.dll,#12⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 5924⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 5884⤵
- Program crash
PID:3488
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4612
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3648 -ip 36481⤵PID:3140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3648 -ip 36481⤵PID:4396