Analysis

  • max time kernel
    128s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 04:30

General

  • Target

    http://85.239.33.148/coordinate/sistercompetitivepro.zip

Malware Config

Extracted

Family

rhadamanthys

C2

https://45.202.35.41:2085/498d0f4cfcafbce1543c5cc/10m$

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3016
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3324
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://85.239.33.148/coordinate/sistercompetitivepro.zip
      1⤵
        PID:2820
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4272,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4852 /prefetch:1
        1⤵
          PID:4020
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4284,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=3808 /prefetch:1
          1⤵
            PID:220
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5476,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=5500 /prefetch:8
            1⤵
              PID:4992
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5512,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=5684 /prefetch:8
              1⤵
                PID:1268
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --field-trial-handle=6152,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:8
                1⤵
                  PID:2252
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=6160,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=6244 /prefetch:1
                  1⤵
                    PID:2004
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --field-trial-handle=6076,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=6728 /prefetch:8
                    1⤵
                      PID:1216
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --field-trial-handle=6688,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=6896 /prefetch:8
                      1⤵
                        PID:5064
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:864
                        • C:\Users\Admin\Downloads\sistercompetitivepro\sistercompetitivepro\sistercompetitivepro.exe
                          "C:\Users\Admin\Downloads\sistercompetitivepro\sistercompetitivepro\sistercompetitivepro.exe"
                          1⤵
                          • Adds Run key to start application
                          • Suspicious use of WriteProcessMemory
                          PID:1648
                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sistercompetitive.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sistercompetitive.exe
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4768
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                              3⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:1688
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 480
                                4⤵
                                • Program crash
                                PID:2820
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 488
                                4⤵
                                • Program crash
                                PID:4472
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6212,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=6200 /prefetch:8
                          1⤵
                            PID:4864
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1688 -ip 1688
                            1⤵
                              PID:2704
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1688 -ip 1688
                              1⤵
                                PID:2268

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sistercompetitive.exe

                                Filesize

                                7.3MB

                                MD5

                                b6798b22a6a137c247daa62fe852d953

                                SHA1

                                597e7265d7918556c1d019d58ceadd504f48a854

                                SHA256

                                471c981c11df004b941dad0175bc435f9c901bcb968ba9582f1a2181443d9ef4

                                SHA512

                                a31b751173dbf50ec728d7f031c1d22de5e66120e8852110253071669f58a36b28c8769f9e8cebc88aa317348069bc7122842f428ccc643758a6e082218019b7

                              • memory/1688-25-0x0000000003A00000-0x0000000003E00000-memory.dmp

                                Filesize

                                4.0MB

                              • memory/1688-28-0x0000000003A00000-0x0000000003E00000-memory.dmp

                                Filesize

                                4.0MB

                              • memory/1688-19-0x0000000000400000-0x000000000047E000-memory.dmp

                                Filesize

                                504KB

                              • memory/1688-37-0x0000000003A00000-0x0000000003E00000-memory.dmp

                                Filesize

                                4.0MB

                              • memory/1688-21-0x0000000000400000-0x000000000047E000-memory.dmp

                                Filesize

                                504KB

                              • memory/1688-24-0x0000000003A00000-0x0000000003E00000-memory.dmp

                                Filesize

                                4.0MB

                              • memory/1688-18-0x0000000000400000-0x000000000047E000-memory.dmp

                                Filesize

                                504KB

                              • memory/1688-26-0x0000000003A00000-0x0000000003E00000-memory.dmp

                                Filesize

                                4.0MB

                              • memory/1688-27-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1688-30-0x0000000076A20000-0x0000000076C35000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/1688-23-0x0000000000400000-0x000000000047E000-memory.dmp

                                Filesize

                                504KB

                              • memory/3324-31-0x0000000001020000-0x0000000001029000-memory.dmp

                                Filesize

                                36KB

                              • memory/3324-33-0x0000000002D20000-0x0000000003120000-memory.dmp

                                Filesize

                                4.0MB

                              • memory/3324-36-0x0000000076A20000-0x0000000076C35000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/3324-34-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/4768-13-0x00000000750C0000-0x0000000075870000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/4768-16-0x0000000005A20000-0x0000000005A3A000-memory.dmp

                                Filesize

                                104KB

                              • memory/4768-8-0x00000000750C0000-0x0000000075870000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/4768-7-0x0000000005420000-0x00000000054BC000-memory.dmp

                                Filesize

                                624KB

                              • memory/4768-17-0x0000000005CA0000-0x0000000005CA6000-memory.dmp

                                Filesize

                                24KB

                              • memory/4768-5-0x00000000750CE000-0x00000000750CF000-memory.dmp

                                Filesize

                                4KB

                              • memory/4768-22-0x00000000750C0000-0x0000000075870000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/4768-15-0x00000000750C0000-0x0000000075870000-memory.dmp

                                Filesize

                                7.7MB

                              • memory/4768-14-0x00000000750CE000-0x00000000750CF000-memory.dmp

                                Filesize

                                4KB

                              • memory/4768-6-0x0000000000030000-0x0000000000778000-memory.dmp

                                Filesize

                                7.3MB

                              • memory/4768-12-0x0000000005550000-0x000000000555A000-memory.dmp

                                Filesize

                                40KB

                              • memory/4768-11-0x00000000057C0000-0x0000000005852000-memory.dmp

                                Filesize

                                584KB

                              • memory/4768-10-0x0000000005CD0000-0x0000000006274000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/4768-9-0x0000000005570000-0x000000000560E000-memory.dmp

                                Filesize

                                632KB