Analysis

  • max time kernel
    95s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 21:37

General

  • Target

    Obsidian_Installer_v.3.15.exe.msi

  • Size

    23.0MB

  • MD5

    4295dda40427af8df6738b3531d63389

  • SHA1

    cb5a45de787c34eda399a3cad64abd3b6133f514

  • SHA256

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2

  • SHA512

    31ae6245cc6188e9d8b471c9cb169263fb7189e3d7653266857db01e3b92b1773ddc1971e3468734f48294f48aaf1a1e93b21d3ffc89dc30f6fcf8549c6a24e2

  • SSDEEP

    393216:u66L7jpW/sxwA0Ip5AGgrJmD1Y5D9xAgAmBOn4AZENqMJiaErOQtt4KgTD5v2X:uHWUxOQxZDKNfAuOri9rQtlKy

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2552
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4824
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Obsidian_Installer_v.3.15.exe.msi
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:5020
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1932
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 9304E0BD7735AEFE3D49E475ADE0EF4B
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi"
          3⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1020
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 1456
          3⤵
          • Program crash
          PID:4148
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1164
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4948 -ip 4948
      1⤵
        PID:3936

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e57b065.rbs

        Filesize

        7KB

        MD5

        0bb0031f18bf66f49b405596ef83b351

        SHA1

        0931dd88d0badd66cb4031ea6e2870718a6faea6

        SHA256

        838edfedf4b5f937420c222b415959e240111dc725ba48c3a5e08ec5638737d8

        SHA512

        3bdb56b6bc6660d5c4e0335a6bd8c719758501d44af3adcfa4e5804eeccb266f50515e66dc79ee670e1478b92b452ace77d4f0b98338f56830d815a6d9d5425f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\248DDD9FCF61002E219645695E3FFC98_980C1CDB5B8D38EE1A4189343051F5EF

        Filesize

        751B

        MD5

        b11869dfd07ed73ebe9acb3e46aad945

        SHA1

        8210c7cace27f9db67325aeb392af7079be336df

        SHA256

        82b99fe8316daf91f097a310b2aaa96a7d7c72fd11f51b55820d01a261b24d0d

        SHA512

        92a599cfaff7dcb60ea96e0cc8860fec3d22f07943d2bc407c7b18f7d7ea3aad53daecfb80fde6e2cb583740ed6bd4f788c638d2612994721683ed4f77ff1c8e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

        Filesize

        727B

        MD5

        7a3b8457313a521e0d44f91765a4e041

        SHA1

        4ea8ecb5e7b4c11f4c491caf6cee7ced5ec4c267

        SHA256

        2b08ecf53bb8b6c430659926148f896102dc80b5f38b0ec5efe122199659651c

        SHA512

        7349fd1b8c490d540a8bb25f40587f9874ff5d9b1f9bdb2ea69db9218ebdbdccea5e4d6645fbd1098d051b008b1ebfd12a619c3a4d6fb54940705ab14933e159

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\248DDD9FCF61002E219645695E3FFC98_980C1CDB5B8D38EE1A4189343051F5EF

        Filesize

        478B

        MD5

        a806f64b70ac5595410c22b6e6c5a736

        SHA1

        aa5ce520205c16f11470e42593b4d0aa5c9ad9c8

        SHA256

        dd21b98ae39a9262db7471841de4218dfc7044b075919c44743f474d7cd77ace

        SHA512

        94e1f17ab0e346589679e4ba22668ed3745d748ca9b284fca5605b358e12eef8d72cd6d94b5588332c249311f133a5baa6ad41c821e654f71150342c35c3dbe4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

        Filesize

        478B

        MD5

        1af2a8464eb5d5e55345fcdb0d4e8d15

        SHA1

        8d467a5d67c929e553cb333aca5390c0a9da1713

        SHA256

        a1a70b504a5e3c9ac53888adf7683708ddd446a444d40961b1fb123d8f1d98f3

        SHA512

        77df74610190b58c09b8d100ef661668757b9fbc396a5a3678d4dce50d436fc4694da506f81757017590cae93e393dc9f9c7b7a6e04eafefea614fc6c158309c

      • C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi

        Filesize

        22.3MB

        MD5

        e969fa4b30951a66e9bf28b21fd75174

        SHA1

        dc818acf470ad20f56f464e4839650564f023a7f

        SHA256

        96811ea4f9266ba8ee5c758c146fbc84f3cfe5ec4c5c966b5885e11b5f696f74

        SHA512

        6da2ec033f58843a06270ef04c55ba0ee8449df685f1902ab953bf511acd0a4735532db3bff73858c082005b4df27d5c376a4fb324f9506b85564356286b0f68

      • C:\Windows\Installer\MSIB13F.tmp

        Filesize

        193KB

        MD5

        7e274959f4347527c246a2c6343105e7

        SHA1

        8885c1a2624ccd01102d9eabfa9050fd19093f16

        SHA256

        dbe502732e67c80c03fba12a885f3c68023eeff31fcde8170f4733d8261b540e

        SHA512

        bf4666efec860030f2795ebdb5ed34a11f2611a342ea1b752dd232072425420b9155804fc43ed7546c4fd3973bc68cdfc9c5cd9765d3c529891a0862173df4b9

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.7MB

        MD5

        7b5b4192197a2852c5a258ac42fbc60a

        SHA1

        f585f4b9fd6a0f9945e643abae01105de30a40b5

        SHA256

        f47f439546a4f0f812b04db8843cceb18e15f586f36ac4b840a108a3def1e5bb

        SHA512

        e19f30cca287e4439530dc21a06b20c2958270a37ae4456d1419972d9e5b40a2e3501c8a98ec4b309b9755221c2ffc17e1b8b5a2a2bbb0b36ccffdce164bdbe5

      • \??\Volume{f3a72b53-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{18addcda-cd7a-4390-8cf0-650fb1c2b526}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        85b7795b0de03e068e1ec8d46f2acab2

        SHA1

        ee0e7e5925c25fd8b1a99a5ccf17d1067ae81988

        SHA256

        80cd7a10a7de6b38a882bb32ad4d76d1010bdf178302e53f37ff0a2133c1f4a9

        SHA512

        55a8d158dabc21acff078adcb24ba6638307f273fbcdbacfc6fdf91d2715a75815cbeb0492fb8d706d3e6f217c9effc006ce6b3230bff87ae970300af22e5ba6

      • memory/4824-40-0x0000000001290000-0x0000000001299000-memory.dmp

        Filesize

        36KB

      • memory/4824-42-0x0000000002DB0000-0x00000000031B0000-memory.dmp

        Filesize

        4.0MB

      • memory/4824-43-0x00007FFA197F0000-0x00007FFA199E5000-memory.dmp

        Filesize

        2.0MB

      • memory/4824-45-0x00000000750A0000-0x00000000752B5000-memory.dmp

        Filesize

        2.1MB

      • memory/4948-37-0x00007FFA197F0000-0x00007FFA199E5000-memory.dmp

        Filesize

        2.0MB

      • memory/4948-39-0x00000000750A0000-0x00000000752B5000-memory.dmp

        Filesize

        2.1MB

      • memory/4948-36-0x00000000050C0000-0x00000000054C0000-memory.dmp

        Filesize

        4.0MB

      • memory/4948-35-0x00000000050C0000-0x00000000054C0000-memory.dmp

        Filesize

        4.0MB