Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 13:57
Static task
static1
Behavioral task
behavioral1
Sample
lestvpn.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
lestvpn.exe
Resource
win10v2004-20240802-en
General
-
Target
lestvpn.exe
-
Size
14.5MB
-
MD5
acdaf35aa2e0134025ace04b6ca485f6
-
SHA1
724abebf2991d5abe605d011d29c3d2a7df7ee87
-
SHA256
9b09c0bda213a1807cc1a904dce72f68089c0ae7c4b2df7ccee30ef505cf03b1
-
SHA512
c7aea84e645017ea118f073d59863ed55df2e1f9c0e9340683aa2883f118b666e097b362330bd2a6beb898e7c89e127fcebb91296271b1a038b4b4677ce029c9
-
SSDEEP
393216:twbtBNVjdb3M6hsxujJXTZC5ztrctDlbylnfmUV:t0tZjeEssj5TEtA/byln3
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3748 created 2576 3748 letsvpnAnquan.exe 42 -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 4336 letsvpn-latest.exe 4552 letsvpnAnquan.exe 3748 letsvpnAnquan.exe 4636 letsvpnAnquan.exe -
Loads dropped DLL 17 IoCs
pid Process 4572 lestvpn.exe 4572 lestvpn.exe 4572 lestvpn.exe 4572 lestvpn.exe 4572 lestvpn.exe 3748 letsvpnAnquan.exe 4552 letsvpnAnquan.exe 4552 letsvpnAnquan.exe 4552 letsvpnAnquan.exe 3748 letsvpnAnquan.exe 3748 letsvpnAnquan.exe 4336 letsvpn-latest.exe 4336 letsvpn-latest.exe 4636 letsvpnAnquan.exe 4636 letsvpnAnquan.exe 4636 letsvpnAnquan.exe 4336 letsvpn-latest.exe -
pid Process 4488 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpnAnquan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lestvpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpn-latest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpnAnquan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpnAnquan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3748 letsvpnAnquan.exe 3748 letsvpnAnquan.exe 4488 powershell.exe 4492 openwith.exe 4492 openwith.exe 4492 openwith.exe 4492 openwith.exe 4488 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4552 letsvpnAnquan.exe Token: SeDebugPrivilege 4488 powershell.exe Token: SeDebugPrivilege 4636 letsvpnAnquan.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4336 4572 lestvpn.exe 93 PID 4572 wrote to memory of 4336 4572 lestvpn.exe 93 PID 4572 wrote to memory of 4336 4572 lestvpn.exe 93 PID 4572 wrote to memory of 4552 4572 lestvpn.exe 94 PID 4572 wrote to memory of 4552 4572 lestvpn.exe 94 PID 4572 wrote to memory of 4552 4572 lestvpn.exe 94 PID 4572 wrote to memory of 3748 4572 lestvpn.exe 95 PID 4572 wrote to memory of 3748 4572 lestvpn.exe 95 PID 4572 wrote to memory of 3748 4572 lestvpn.exe 95 PID 4336 wrote to memory of 4488 4336 letsvpn-latest.exe 96 PID 4336 wrote to memory of 4488 4336 letsvpn-latest.exe 96 PID 4336 wrote to memory of 4488 4336 letsvpn-latest.exe 96 PID 3748 wrote to memory of 4492 3748 letsvpnAnquan.exe 99 PID 3748 wrote to memory of 4492 3748 letsvpnAnquan.exe 99 PID 3748 wrote to memory of 4492 3748 letsvpnAnquan.exe 99 PID 3748 wrote to memory of 4492 3748 letsvpnAnquan.exe 99 PID 3748 wrote to memory of 4492 3748 letsvpnAnquan.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2576
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\lestvpn.exe"C:\Users\Admin\AppData\Local\Temp\lestvpn.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\letsvpn-latest.exeC:\Users\Admin\AppData\Local\Temp\letsvpn-latest.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe"C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\config.ini"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe"C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\let_config.ini"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3748
-
-
C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exeC:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe "C:\Users\Admin\AppData\Local\Temp\config.ini"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
521B
MD582fd1c0a56b8af6ad97d973328281509
SHA15b4d01cb01d2e5e62dd3026de96dcf37f5713b89
SHA256a57a4a3a9e484a52872a0c105ac939bf91e97033f4e40c21e5fd03f0bf8bc548
SHA5123ced1456093d84e9617e630d06128da646b41720e873822c37cb40b4698919c4c543250ab9f191d73d6aac1109206655faa179dd781a578e1f778fe92b9a4b08
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
25KB
MD524b6950afd8663a46246044e6b09add8
SHA16444dab57d93ce987c22da66b3706d5d7fc226da
SHA2569aa3ca96a84eb5606694adb58776c9e926020ef184828b6f7e6f9b50498f7071
SHA512e1967e7e8c3d64b61451254da281415edf9946a6c8a46006f39ae091609c65666c376934b1bdcbd2a7f73adea7aa68e557694f804bf3bc3ce7854fa527e91740
-
Filesize
910KB
MD5ae2bb0a84eb09656a88e6e1d4737f25f
SHA1cb658ac4932c196edafe21830d138a9184a02e24
SHA25607f268e382051fe80098180d9d9464d244a5b95bc3bdd68c81b032f40aa9cf18
SHA5121c9d495f6ba687fadd98946e5834b1536a0a7836d5d9fb71153c9ab2b8a75ada55a3ea9dee5f86e5ed7577752cc9579f2fbee6ff44cd55a5bde8423f120404d4
-
Filesize
636KB
MD5139f9c49094a8cb625017f49d1612929
SHA12acf3c680c86d0bf24daf1aa1764031aac0ecf1c
SHA2563f45303d21300a5de7d2d84e32d3a50b161239061452442783eed1b0a34876e1
SHA51209d224ec76eb31efdb0a53384896fd8c12a7dcc6a60bb3e01324f748c674235c6bbbc72b57b1c5235eb4da20729c45d9cfe5acc1edeebe47f7344e0f83275ed1
-
Filesize
14.5MB
MD594f6bd702b7a2e17c45d16eaf7da0d64
SHA145f8c05851bcf16416e087253ce962b320e9db8a
SHA25607f44325eab13b01d536a42e90a0247c6efecf23ccd4586309828aa814f5c776
SHA5127ffc5183d3f1fb23e38c60d55724ab9e9e1e3832c9fb09296f0635f78d81477c6894c00a28e63096fa395e1c11cbeaa1f77f910f9ff9c1f1ecf0b857aa671b3d
-
Filesize
14KB
MD5426dfd5ece3b41970773031637cd5539
SHA1d0fe14f8dab89aaddac8b1c89b1cee48396ec636
SHA256737f08702f00e78dbe78acbeda63b73d04c1f8e741c5282a9aa1409369b6efa8
SHA5125c66ea3360115d6dcc71f6d624a886f3c992c5d30338880b0ba48db77dd7fa744b60a3d65fed63427ebb3a8bcf9b204e9ba1521d8c9f0e804ce0db76befa8935
-
Filesize
164KB
MD524a0d2ef5b931a2a13341a2503b1de80
SHA16201347d1ded92d365126a1225768e11c33ee818
SHA256fbbe7ee073d0290ac13c98b92a8405ea04dcc6837b4144889885dd70679e933f
SHA5125e06f88bb3920cef40a4941efb3b4d3012edf868cc3042f9dbc1989c76b410b4e2da12c20ae2fbcffe5525b43aeca8875e51167d0ce041864d546fdb2e1fecd2
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
Filesize
9KB
MD5ca95c9da8cef7062813b989ab9486201
SHA1c555af25df3de51aa18d487d47408d5245dba2d1
SHA256feb6364375d0ab081e9cdf11271c40cb966af295c600903383b0730f0821c0be
SHA512a30d94910204d1419c803dc12d90a9d22f63117e4709b1a131d8c4d5ead7e4121150e2c8b004a546b33c40c294df0a74567013001f55f37147d86bb847d7bbc9
-
Filesize
6KB
MD53d366250fcf8b755fce575c75f8c79e4
SHA12ebac7df78154738d41aac8e27d7a0e482845c57
SHA2568bdd996ae4778c6f829e2bcb651c55efc9ec37eeea17d259e013b39528dddbb6
SHA51267d2d88de625227ccd2cb406b4ac3a215d1770d385c985a44e2285490f49b45f23ce64745b24444e2a0f581335fda02e913b92781043e8dfd287844435ba9094