Analysis

  • max time kernel
    126s
  • max time network
    85s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10-09-2024 02:09

General

  • Target

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2.msi

  • Size

    23.0MB

  • MD5

    4295dda40427af8df6738b3531d63389

  • SHA1

    cb5a45de787c34eda399a3cad64abd3b6133f514

  • SHA256

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2

  • SHA512

    31ae6245cc6188e9d8b471c9cb169263fb7189e3d7653266857db01e3b92b1773ddc1971e3468734f48294f48aaf1a1e93b21d3ffc89dc30f6fcf8549c6a24e2

  • SSDEEP

    393216:u66L7jpW/sxwA0Ip5AGgrJmD1Y5D9xAgAmBOn4AZENqMJiaErOQtt4KgTD5v2X:uHWUxOQxZDKNfAuOri9rQtlKy

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1244
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2.msi
        2⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2636
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1536
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding AD2774D903FC71D44327A4B1F5E13CA4
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi"
          3⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:916
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1948
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003E0" "00000000000003D4"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f77b55d.rbs

      Filesize

      6KB

      MD5

      5d2b3677b2e3b97f40b13b2ca36d925f

      SHA1

      455c978e9a49be17c4c91c1737d0f1b42618ee06

      SHA256

      b15de284b5e2a7aca2034f0ef6ebce413c6c4a8664044ca24d613f3df47728ff

      SHA512

      c4f39c161bacf7895270798e9c7ccff00f0911a1371ae555783cb75e71dc0d737454312f8acbcc2eb3b844ff1ff47cefdcf2ba9c1b2056f9eaf2cfce018c549c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07298EE8EBA9732300AE62BDCA6B6898

      Filesize

      1KB

      MD5

      e11e31581aae545302f6176a117b4d95

      SHA1

      743af0529bd032a0f44a83cdd4baa97b7c2ec49a

      SHA256

      2e7bf16cc22485a7bbe2aa8696750761b0ae39be3b2fe9d0cc6d4ef73491425c

      SHA512

      c63aba6ca79c60a92b3bd26d784a5436e45a626022958bf6c194afc380c7bfb01fadf0b772513bbdbd7f1bb73691b0edb2f60b2f235ec9e0b81c427e04fbe451

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07298EE8EBA9732300AE62BDCA6B6898

      Filesize

      312B

      MD5

      54c3c7bbc4abf692986fa54303d589be

      SHA1

      d5481a3fdc0066a6afdf6a1631ff5497fd108494

      SHA256

      7853aff454af2d1e7094b4b2010f315d28de38c2c72431e7bf99c95e19269b92

      SHA512

      ef821bc51c780decdaffa92289fb3aca51a88fcf461483496e7cbc4fc83755dc5c94d8f24d71610a5e31d6d523b2814761ff675600b952ecd0045fed07a93878

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      19ed51470a28e0ce12424b587157da3f

      SHA1

      eaa29672f59f59e353d5371a188ea0890a2edcd7

      SHA256

      96fc478a58e09e9a9534667735fc3786866262754b9e64a512fef01502db0b69

      SHA512

      1e214b5c96b054a932ebff375bc5cadac3f7f6767aa628649c896c908d1bfe76372b25844a173c3c0f9c78a66442cc9bb439c9ecbdc744910844c133f2a6246a

    • C:\Users\Admin\AppData\Local\Temp\Cab5959.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar941A.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi

      Filesize

      22.3MB

      MD5

      e969fa4b30951a66e9bf28b21fd75174

      SHA1

      dc818acf470ad20f56f464e4839650564f023a7f

      SHA256

      96811ea4f9266ba8ee5c758c146fbc84f3cfe5ec4c5c966b5885e11b5f696f74

      SHA512

      6da2ec033f58843a06270ef04c55ba0ee8449df685f1902ab953bf511acd0a4735532db3bff73858c082005b4df27d5c376a4fb324f9506b85564356286b0f68

    • C:\Windows\Installer\MSIB72B.tmp

      Filesize

      193KB

      MD5

      7e274959f4347527c246a2c6343105e7

      SHA1

      8885c1a2624ccd01102d9eabfa9050fd19093f16

      SHA256

      dbe502732e67c80c03fba12a885f3c68023eeff31fcde8170f4733d8261b540e

      SHA512

      bf4666efec860030f2795ebdb5ed34a11f2611a342ea1b752dd232072425420b9155804fc43ed7546c4fd3973bc68cdfc9c5cd9765d3c529891a0862173df4b9

    • memory/1536-135-0x0000000076C90000-0x0000000076CD7000-memory.dmp

      Filesize

      284KB

    • memory/1536-130-0x0000000000090000-0x0000000000099000-memory.dmp

      Filesize

      36KB

    • memory/1536-132-0x0000000001AF0000-0x0000000001EF0000-memory.dmp

      Filesize

      4.0MB

    • memory/1536-133-0x0000000077010000-0x00000000771B9000-memory.dmp

      Filesize

      1.7MB

    • memory/2128-127-0x0000000077010000-0x00000000771B9000-memory.dmp

      Filesize

      1.7MB

    • memory/2128-126-0x0000000005A40000-0x0000000005E40000-memory.dmp

      Filesize

      4.0MB

    • memory/2128-129-0x0000000076C90000-0x0000000076CD7000-memory.dmp

      Filesize

      284KB

    • memory/2128-125-0x0000000005A40000-0x0000000005E40000-memory.dmp

      Filesize

      4.0MB