Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-09-2024 00:55

General

  • Target

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2.msi

  • Size

    23.0MB

  • MD5

    4295dda40427af8df6738b3531d63389

  • SHA1

    cb5a45de787c34eda399a3cad64abd3b6133f514

  • SHA256

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2

  • SHA512

    31ae6245cc6188e9d8b471c9cb169263fb7189e3d7653266857db01e3b92b1773ddc1971e3468734f48294f48aaf1a1e93b21d3ffc89dc30f6fcf8549c6a24e2

  • SSDEEP

    393216:u66L7jpW/sxwA0Ip5AGgrJmD1Y5D9xAgAmBOn4AZENqMJiaErOQtt4KgTD5v2X:uHWUxOQxZDKNfAuOri9rQtlKy

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1160
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2.msi
        2⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2352
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1420
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding B63CC763D038A1F58112C9B7DF76D41B
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi"
          3⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1284
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3044
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000470" "00000000000004C4"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1444

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f76c8ec.rbs

      Filesize

      6KB

      MD5

      6c9b8cd43bb6761420aa88e111de61ac

      SHA1

      3482e3634b5d993a3efd8ca7ea589ee9fe4ba42d

      SHA256

      412c81827a568377c03cf9459a74616cd97ea462465039370f1ceff6c590d844

      SHA512

      dca3486addef28e1a2ba0937f6f2b38a9742ae9d983fd1e678582b37a28e05602ba73b08830686c0dadc94ac6683a7f4ef473223ac8990292fee881e45090791

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07298EE8EBA9732300AE62BDCA6B6898

      Filesize

      1KB

      MD5

      e11e31581aae545302f6176a117b4d95

      SHA1

      743af0529bd032a0f44a83cdd4baa97b7c2ec49a

      SHA256

      2e7bf16cc22485a7bbe2aa8696750761b0ae39be3b2fe9d0cc6d4ef73491425c

      SHA512

      c63aba6ca79c60a92b3bd26d784a5436e45a626022958bf6c194afc380c7bfb01fadf0b772513bbdbd7f1bb73691b0edb2f60b2f235ec9e0b81c427e04fbe451

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07298EE8EBA9732300AE62BDCA6B6898

      Filesize

      312B

      MD5

      7fbfd101005e0e906c3e4b426c63f418

      SHA1

      d90f9e02d716ff56f6fd27bc53f0ddf1173196c6

      SHA256

      d360e641104aa4beafdcbfbf375220647f246c4d89b2a1d9e197ac4773571739

      SHA512

      d1da13edba74138e1cfa870ce66439780d842faa6d78602858062063c76e184ad5ab5135db1b6805f941543851075fa666165776e2b4fd67bc943a18cdd78a81

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5d2652ff326c5b5461164dd8d2ac7c05

      SHA1

      a5fd5422b2e9d4f2314ad1ce5fee5053616f292b

      SHA256

      59e8cc140dd60f180c554c3691d54305a5187e85201a98c3824b6942d955ff22

      SHA512

      84202ab1066e08608fa5d8c35852959d5e0301b37c6708d76b40f065062a253b62ab8f901871f4c723e64ca4b42ebc9f0558d711c64db07560b25d707ef38513

    • C:\Users\Admin\AppData\Local\Temp\CabA8A0.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarAA0A.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi

      Filesize

      22.3MB

      MD5

      e969fa4b30951a66e9bf28b21fd75174

      SHA1

      dc818acf470ad20f56f464e4839650564f023a7f

      SHA256

      96811ea4f9266ba8ee5c758c146fbc84f3cfe5ec4c5c966b5885e11b5f696f74

      SHA512

      6da2ec033f58843a06270ef04c55ba0ee8449df685f1902ab953bf511acd0a4735532db3bff73858c082005b4df27d5c376a4fb324f9506b85564356286b0f68

    • C:\Windows\Installer\MSICC21.tmp

      Filesize

      193KB

      MD5

      7e274959f4347527c246a2c6343105e7

      SHA1

      8885c1a2624ccd01102d9eabfa9050fd19093f16

      SHA256

      dbe502732e67c80c03fba12a885f3c68023eeff31fcde8170f4733d8261b540e

      SHA512

      bf4666efec860030f2795ebdb5ed34a11f2611a342ea1b752dd232072425420b9155804fc43ed7546c4fd3973bc68cdfc9c5cd9765d3c529891a0862173df4b9

    • memory/1176-146-0x0000000005BF0000-0x0000000005FF0000-memory.dmp

      Filesize

      4.0MB

    • memory/1176-147-0x0000000077B00000-0x0000000077CA9000-memory.dmp

      Filesize

      1.7MB

    • memory/1176-149-0x0000000076450000-0x0000000076497000-memory.dmp

      Filesize

      284KB

    • memory/1176-145-0x0000000005BF0000-0x0000000005FF0000-memory.dmp

      Filesize

      4.0MB

    • memory/1420-150-0x0000000000090000-0x0000000000099000-memory.dmp

      Filesize

      36KB

    • memory/1420-153-0x0000000077B00000-0x0000000077CA9000-memory.dmp

      Filesize

      1.7MB

    • memory/1420-155-0x0000000076450000-0x0000000076497000-memory.dmp

      Filesize

      284KB

    • memory/1420-152-0x0000000001BA0000-0x0000000001FA0000-memory.dmp

      Filesize

      4.0MB