Analysis

  • max time kernel
    124s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 00:55

General

  • Target

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2.msi

  • Size

    23.0MB

  • MD5

    4295dda40427af8df6738b3531d63389

  • SHA1

    cb5a45de787c34eda399a3cad64abd3b6133f514

  • SHA256

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2

  • SHA512

    31ae6245cc6188e9d8b471c9cb169263fb7189e3d7653266857db01e3b92b1773ddc1971e3468734f48294f48aaf1a1e93b21d3ffc89dc30f6fcf8549c6a24e2

  • SSDEEP

    393216:u66L7jpW/sxwA0Ip5AGgrJmD1Y5D9xAgAmBOn4AZENqMJiaErOQtt4KgTD5v2X:uHWUxOQxZDKNfAuOri9rQtlKy

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3032
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3600
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2.msi
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2196
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2252
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding DEE7A194C5E5F0936751A9E14719818E
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3416
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi"
          3⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:4784
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 1436
          3⤵
          • Program crash
          PID:3420
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:5028
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4392,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=3924 /prefetch:8
      1⤵
        PID:3088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3416 -ip 3416
        1⤵
          PID:1064

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e58a3ce.rbs

          Filesize

          7KB

          MD5

          a6280b23a0c9fcb9e492b9831c24c3e0

          SHA1

          327a6cd38beed1f5e0963167b98a743f4ef1129a

          SHA256

          c0c62fd5b470ec636819dc82c623cd48f891f5fd5d5d95bfddc69f48baa588d9

          SHA512

          b1a75fd84d3cb22c8bb74b51732c160e55156aa71486fbb79ba79072d02f456bff2dd84c9ebaba952aac6b7fd6bdeb2470c52b539f598582f036b06bee3d3fd4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\248DDD9FCF61002E219645695E3FFC98_980C1CDB5B8D38EE1A4189343051F5EF

          Filesize

          751B

          MD5

          b11869dfd07ed73ebe9acb3e46aad945

          SHA1

          8210c7cace27f9db67325aeb392af7079be336df

          SHA256

          82b99fe8316daf91f097a310b2aaa96a7d7c72fd11f51b55820d01a261b24d0d

          SHA512

          92a599cfaff7dcb60ea96e0cc8860fec3d22f07943d2bc407c7b18f7d7ea3aad53daecfb80fde6e2cb583740ed6bd4f788c638d2612994721683ed4f77ff1c8e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

          Filesize

          727B

          MD5

          7a3b8457313a521e0d44f91765a4e041

          SHA1

          4ea8ecb5e7b4c11f4c491caf6cee7ced5ec4c267

          SHA256

          2b08ecf53bb8b6c430659926148f896102dc80b5f38b0ec5efe122199659651c

          SHA512

          7349fd1b8c490d540a8bb25f40587f9874ff5d9b1f9bdb2ea69db9218ebdbdccea5e4d6645fbd1098d051b008b1ebfd12a619c3a4d6fb54940705ab14933e159

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\248DDD9FCF61002E219645695E3FFC98_980C1CDB5B8D38EE1A4189343051F5EF

          Filesize

          478B

          MD5

          d77c16130970624c912b2a96096a6963

          SHA1

          53d4a3f7dbad35ef194c34f5921c8c21e024d11a

          SHA256

          5160124aa5b73300ed987702d88f1757169a3a5aa21e02a75b3560572377d40e

          SHA512

          49bd95ec4a031c239b1ec045b9b85dcc53cc9cc8860a6679e5e5b16ccbdc4a2957bd8efded44bb5b484620c10dcfb336f8f7386ef8a5166629652c24af693c25

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

          Filesize

          478B

          MD5

          0be99cfa198ed765152664451641b5b2

          SHA1

          cb4ab6d7a6647e89b6f4703828c18c4d6bedf35f

          SHA256

          60ac59411f5e11744f145a3d3305a79a091c3086cf67c18421feaa8dfc64e23f

          SHA512

          6fdd4fb1a1812b0fd9cfc78ca60388e866f87db600705f2b84295a0e4f81f4e566b156003ce9e88bfa3733190c6d2d4a238167f3fe17eb5a93478ec9ff1e3782

        • C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi

          Filesize

          22.3MB

          MD5

          e969fa4b30951a66e9bf28b21fd75174

          SHA1

          dc818acf470ad20f56f464e4839650564f023a7f

          SHA256

          96811ea4f9266ba8ee5c758c146fbc84f3cfe5ec4c5c966b5885e11b5f696f74

          SHA512

          6da2ec033f58843a06270ef04c55ba0ee8449df685f1902ab953bf511acd0a4735532db3bff73858c082005b4df27d5c376a4fb324f9506b85564356286b0f68

        • C:\Windows\Installer\MSIA4C7.tmp

          Filesize

          193KB

          MD5

          7e274959f4347527c246a2c6343105e7

          SHA1

          8885c1a2624ccd01102d9eabfa9050fd19093f16

          SHA256

          dbe502732e67c80c03fba12a885f3c68023eeff31fcde8170f4733d8261b540e

          SHA512

          bf4666efec860030f2795ebdb5ed34a11f2611a342ea1b752dd232072425420b9155804fc43ed7546c4fd3973bc68cdfc9c5cd9765d3c529891a0862173df4b9

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          23.7MB

          MD5

          f7800e5f483af37b0137c3b3e87a2367

          SHA1

          14b897394fc86102c4bc063ea12e835801c0ae95

          SHA256

          96413bc3e871f2b2eb9afc13c29e71087f1e093c8569dad2d14f19abf58d5b7d

          SHA512

          3dbc4617a817453ef88146855e395e5990a483e4d28b9666d0a2b7b35452a8dec2f0a59fe91c8b76aad80d94791d3313441530905f0a84769349fdaf179ffae3

        • \??\Volume{ff3ab8f7-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{ab5d6c89-e2e2-44a8-a3d5-dcbadcddacae}_OnDiskSnapshotProp

          Filesize

          6KB

          MD5

          af1bb067f76cc673a0ead6b5de6d963e

          SHA1

          13784089405d00e77063c33ba43ed833b5f1e552

          SHA256

          11aedee568fcb3629c2e84d0194444d57258ad868768a37d139f1411aa2b77f5

          SHA512

          4844b7975b28c15389260a12e59d9bd5a4ef932aeb9c8dd34fd9d81c1724cd86c5b56d3d5eea6cd87df98c90f74cb11cccd274bba8daa5066253f383f5cbe839

        • memory/3416-35-0x0000000005BF0000-0x0000000005FF0000-memory.dmp

          Filesize

          4.0MB

        • memory/3416-37-0x00007FFD20230000-0x00007FFD20425000-memory.dmp

          Filesize

          2.0MB

        • memory/3416-39-0x0000000076410000-0x0000000076625000-memory.dmp

          Filesize

          2.1MB

        • memory/3416-36-0x0000000005BF0000-0x0000000005FF0000-memory.dmp

          Filesize

          4.0MB

        • memory/3600-42-0x0000000002AC0000-0x0000000002EC0000-memory.dmp

          Filesize

          4.0MB

        • memory/3600-40-0x0000000000E30000-0x0000000000E39000-memory.dmp

          Filesize

          36KB

        • memory/3600-45-0x0000000076410000-0x0000000076625000-memory.dmp

          Filesize

          2.1MB

        • memory/3600-43-0x00007FFD20230000-0x00007FFD20425000-memory.dmp

          Filesize

          2.0MB