Analysis

  • max time kernel
    142s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 21:37

General

  • Target

    Obsidian_Installer_v.3.15.exe.msi

  • Size

    23.0MB

  • MD5

    4295dda40427af8df6738b3531d63389

  • SHA1

    cb5a45de787c34eda399a3cad64abd3b6133f514

  • SHA256

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2

  • SHA512

    31ae6245cc6188e9d8b471c9cb169263fb7189e3d7653266857db01e3b92b1773ddc1971e3468734f48294f48aaf1a1e93b21d3ffc89dc30f6fcf8549c6a24e2

  • SSDEEP

    393216:u66L7jpW/sxwA0Ip5AGgrJmD1Y5D9xAgAmBOn4AZENqMJiaErOQtt4KgTD5v2X:uHWUxOQxZDKNfAuOri9rQtlKy

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1372
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Obsidian_Installer_v.3.15.exe.msi
        2⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1592
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1880
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 2EB20E6EC43C3427C0547DC93315D924
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi"
          3⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1320
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3000
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000048C" "0000000000000060"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2412

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f7819d9.rbs

      Filesize

      6KB

      MD5

      1cc87c045c98f254b276744ad7f2b787

      SHA1

      5379bab7ce8fcf18d0b003b8a89312826adeaa82

      SHA256

      6b7e7c923d4f3f62f4f27e33ffcddbad80be2575f40ee517311606e9d9b47e4b

      SHA512

      9f496a198f3069b5590630d96c7c3f84ee09342c36d746d4dd94a3547c2aefe0aed87317fab2da06920925765391de7a6470df244e06fad39cb2db1447ee3517

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07298EE8EBA9732300AE62BDCA6B6898

      Filesize

      1KB

      MD5

      e11e31581aae545302f6176a117b4d95

      SHA1

      743af0529bd032a0f44a83cdd4baa97b7c2ec49a

      SHA256

      2e7bf16cc22485a7bbe2aa8696750761b0ae39be3b2fe9d0cc6d4ef73491425c

      SHA512

      c63aba6ca79c60a92b3bd26d784a5436e45a626022958bf6c194afc380c7bfb01fadf0b772513bbdbd7f1bb73691b0edb2f60b2f235ec9e0b81c427e04fbe451

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07298EE8EBA9732300AE62BDCA6B6898

      Filesize

      312B

      MD5

      9cab25a1c84e6694a29f4dffadd8f6f5

      SHA1

      53fe9d8ec481286b328386ed6ffe7420ed7fd3de

      SHA256

      022236727acb1c65221c30cd79f096cfa0e43814c6e79e093f629ed4ac1d78ec

      SHA512

      7a60b7c958b67ff16a038c5bf3251e0570462d3a122919253c2262db2894b9d8096f0be84aeafb3035497b3faa94b6a8dd30897837da1f98c00f27a229a732a5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      502db7fbe67b5378681b74360fa2388b

      SHA1

      1b3b5eb5370cc1da2373ca59f5f60c917b0242c2

      SHA256

      29e510aa9a8854171079cfaa0cae7bd6e1988eef39baefe635bf863956181db0

      SHA512

      6bcab51c9ee15545df013cf54fb6d2cb4e561c5f7f002bd42427391384aee248c9c38d8c4d9fcaac1ae287dc7a378cd083d4caee7fce5bb59c5027266516fe1a

    • C:\Users\Admin\AppData\Local\Temp\Cab905F.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar984E.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi

      Filesize

      22.3MB

      MD5

      e969fa4b30951a66e9bf28b21fd75174

      SHA1

      dc818acf470ad20f56f464e4839650564f023a7f

      SHA256

      96811ea4f9266ba8ee5c758c146fbc84f3cfe5ec4c5c966b5885e11b5f696f74

      SHA512

      6da2ec033f58843a06270ef04c55ba0ee8449df685f1902ab953bf511acd0a4735532db3bff73858c082005b4df27d5c376a4fb324f9506b85564356286b0f68

    • \Windows\Installer\MSI26BF.tmp

      Filesize

      193KB

      MD5

      7e274959f4347527c246a2c6343105e7

      SHA1

      8885c1a2624ccd01102d9eabfa9050fd19093f16

      SHA256

      dbe502732e67c80c03fba12a885f3c68023eeff31fcde8170f4733d8261b540e

      SHA512

      bf4666efec860030f2795ebdb5ed34a11f2611a342ea1b752dd232072425420b9155804fc43ed7546c4fd3973bc68cdfc9c5cd9765d3c529891a0862173df4b9

    • memory/1880-173-0x0000000002010000-0x0000000002410000-memory.dmp

      Filesize

      4.0MB

    • memory/1880-171-0x00000000000C0000-0x00000000000C9000-memory.dmp

      Filesize

      36KB

    • memory/1880-174-0x0000000076EF0000-0x0000000077099000-memory.dmp

      Filesize

      1.7MB

    • memory/1880-176-0x0000000075010000-0x0000000075057000-memory.dmp

      Filesize

      284KB

    • memory/1964-168-0x0000000076EF0000-0x0000000077099000-memory.dmp

      Filesize

      1.7MB

    • memory/1964-170-0x0000000075010000-0x0000000075057000-memory.dmp

      Filesize

      284KB

    • memory/1964-167-0x0000000005500000-0x0000000005900000-memory.dmp

      Filesize

      4.0MB

    • memory/1964-166-0x0000000005500000-0x0000000005900000-memory.dmp

      Filesize

      4.0MB