Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 02:09

General

  • Target

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2.msi

  • Size

    23.0MB

  • MD5

    4295dda40427af8df6738b3531d63389

  • SHA1

    cb5a45de787c34eda399a3cad64abd3b6133f514

  • SHA256

    b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2

  • SHA512

    31ae6245cc6188e9d8b471c9cb169263fb7189e3d7653266857db01e3b92b1773ddc1971e3468734f48294f48aaf1a1e93b21d3ffc89dc30f6fcf8549c6a24e2

  • SSDEEP

    393216:u66L7jpW/sxwA0Ip5AGgrJmD1Y5D9xAgAmBOn4AZENqMJiaErOQtt4KgTD5v2X:uHWUxOQxZDKNfAuOri9rQtlKy

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2660
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4612
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2.msi
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2000
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3944
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 02D7335E8139F307B8C7F28636C5EF93
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3756
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi"
          3⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:4832
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 1168
          3⤵
          • Program crash
          PID:3352
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3756 -ip 3756
      1⤵
        PID:1888

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e57c871.rbs

        Filesize

        7KB

        MD5

        4dfd6a1b64826d5585acb98f0bf8fae4

        SHA1

        6fe2b98823d83c706914f568f9d515c7554d34a3

        SHA256

        868c844027b56fc2e903e0c153bd42af90487f3aec3e7884988b5d00a63e8786

        SHA512

        6d0f8dedc0fd1d3188b6f5b7260cd6a8210c470ce85f0a155ef38787f289eef9c0e521b9159fec0bf8779015ae763b848b5513283cbe98ec5197e07b44850a9b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\248DDD9FCF61002E219645695E3FFC98_980C1CDB5B8D38EE1A4189343051F5EF

        Filesize

        751B

        MD5

        b11869dfd07ed73ebe9acb3e46aad945

        SHA1

        8210c7cace27f9db67325aeb392af7079be336df

        SHA256

        82b99fe8316daf91f097a310b2aaa96a7d7c72fd11f51b55820d01a261b24d0d

        SHA512

        92a599cfaff7dcb60ea96e0cc8860fec3d22f07943d2bc407c7b18f7d7ea3aad53daecfb80fde6e2cb583740ed6bd4f788c638d2612994721683ed4f77ff1c8e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

        Filesize

        727B

        MD5

        7a3b8457313a521e0d44f91765a4e041

        SHA1

        4ea8ecb5e7b4c11f4c491caf6cee7ced5ec4c267

        SHA256

        2b08ecf53bb8b6c430659926148f896102dc80b5f38b0ec5efe122199659651c

        SHA512

        7349fd1b8c490d540a8bb25f40587f9874ff5d9b1f9bdb2ea69db9218ebdbdccea5e4d6645fbd1098d051b008b1ebfd12a619c3a4d6fb54940705ab14933e159

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\248DDD9FCF61002E219645695E3FFC98_980C1CDB5B8D38EE1A4189343051F5EF

        Filesize

        478B

        MD5

        4260f48db5168e8afe145322a4d22025

        SHA1

        1620174566eb7c5a283907bc3aa445755de9a484

        SHA256

        734ce55b687f44cb856280376381d654666510ae369e1de990cdacb4e95f69c4

        SHA512

        db0ae1b29eb155d9f7769d7a52dc69adff550982b41fb30b346e1f9e6775acc5878cf1e1017023d6b973c5637669570f33c03887daf383c8be79077d46064d94

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1

        Filesize

        478B

        MD5

        df284cc5b21c64ae57e25abc41d6adf3

        SHA1

        13cbd0746ae4322d0320d18e6f769998491e7864

        SHA256

        db6759223f918e55da3b9bf245ee1c097bf626f88053f3748adb6fa51dba8397

        SHA512

        4f55b9827bc6a47156646ba3098ab2c00eb67d1fcde83edcc9b38c00d6ae7a173d23faf125de3b010cf13fc3f0067bbe15180c8b7733794db1cf690adf7e5f2e

      • C:\Users\Admin\AppData\Local\Temp\dXNlcg==.msi

        Filesize

        22.3MB

        MD5

        e969fa4b30951a66e9bf28b21fd75174

        SHA1

        dc818acf470ad20f56f464e4839650564f023a7f

        SHA256

        96811ea4f9266ba8ee5c758c146fbc84f3cfe5ec4c5c966b5885e11b5f696f74

        SHA512

        6da2ec033f58843a06270ef04c55ba0ee8449df685f1902ab953bf511acd0a4735532db3bff73858c082005b4df27d5c376a4fb324f9506b85564356286b0f68

      • C:\Windows\Installer\MSIC95B.tmp

        Filesize

        193KB

        MD5

        7e274959f4347527c246a2c6343105e7

        SHA1

        8885c1a2624ccd01102d9eabfa9050fd19093f16

        SHA256

        dbe502732e67c80c03fba12a885f3c68023eeff31fcde8170f4733d8261b540e

        SHA512

        bf4666efec860030f2795ebdb5ed34a11f2611a342ea1b752dd232072425420b9155804fc43ed7546c4fd3973bc68cdfc9c5cd9765d3c529891a0862173df4b9

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        23.7MB

        MD5

        6266a6d1211083dd7ab45c294b8cccac

        SHA1

        de46ee0b2558fcfb326e10dd34f88eeb6fe233fd

        SHA256

        083e014bfdcd9df407daee712db097c2dc8e53f081da6612e51e4126191fbd36

        SHA512

        dd69a577bf4ca627ce821204a19ac0b67a5edaab51198b2072c8949f285636d0b6dccfd210c460749a908b4b93e8246518b80f8e23d34b9f86a40aa6845fe9ce

      • \??\Volume{f1c9ec80-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{2259096a-09ab-4916-8fe2-33584f0b4380}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        a19df879fc2831ea362e4d84db46b0d7

        SHA1

        618fbe4527f548d034739b6c47401a7aa66eadc4

        SHA256

        658ecef8a8f442d678b63ba2d6d03a6fffca2fb84f6e63b1a0110585c379e609

        SHA512

        a2963fcaa7be2a448abac0314ef90e7995d1562d05ce128efa96f0b4070bf8fa2fa90048f797904d2875ea0c36e5d5b89efa3b4935b862d6af756954f4d7ad59

      • memory/3756-35-0x0000000005910000-0x0000000005D10000-memory.dmp

        Filesize

        4.0MB

      • memory/3756-39-0x0000000076930000-0x0000000076B45000-memory.dmp

        Filesize

        2.1MB

      • memory/3756-37-0x00007FF9A9F50000-0x00007FF9AA145000-memory.dmp

        Filesize

        2.0MB

      • memory/3756-36-0x0000000005910000-0x0000000005D10000-memory.dmp

        Filesize

        4.0MB

      • memory/4612-40-0x0000000000890000-0x0000000000899000-memory.dmp

        Filesize

        36KB

      • memory/4612-42-0x00000000023E0000-0x00000000027E0000-memory.dmp

        Filesize

        4.0MB

      • memory/4612-43-0x00007FF9A9F50000-0x00007FF9AA145000-memory.dmp

        Filesize

        2.0MB

      • memory/4612-45-0x0000000076930000-0x0000000076B45000-memory.dmp

        Filesize

        2.1MB