Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 13:57

General

  • Target

    lestvpn.exe

  • Size

    14.5MB

  • MD5

    acdaf35aa2e0134025ace04b6ca485f6

  • SHA1

    724abebf2991d5abe605d011d29c3d2a7df7ee87

  • SHA256

    9b09c0bda213a1807cc1a904dce72f68089c0ae7c4b2df7ccee30ef505cf03b1

  • SHA512

    c7aea84e645017ea118f073d59863ed55df2e1f9c0e9340683aa2883f118b666e097b362330bd2a6beb898e7c89e127fcebb91296271b1a038b4b4677ce029c9

  • SSDEEP

    393216:twbtBNVjdb3M6hsxujJXTZC5ztrctDlbylnfmUV:t0tZjeEssj5TEtA/byln3

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 17 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2576
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4492
    • C:\Users\Admin\AppData\Local\Temp\lestvpn.exe
      "C:\Users\Admin\AppData\Local\Temp\lestvpn.exe"
      1⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Users\Admin\AppData\Local\Temp\letsvpn-latest.exe
        C:\Users\Admin\AppData\Local\Temp\letsvpn-latest.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4336
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4488
      • C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe
        "C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\config.ini"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
      • C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe
        "C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\let_config.ini"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3748
    • C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe
      C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe "C:\Users\Admin\AppData\Local\Temp\config.ini"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\letsvpnAnquan.exe.log

      Filesize

      521B

      MD5

      82fd1c0a56b8af6ad97d973328281509

      SHA1

      5b4d01cb01d2e5e62dd3026de96dcf37f5713b89

      SHA256

      a57a4a3a9e484a52872a0c105ac939bf91e97033f4e40c21e5fd03f0bf8bc548

      SHA512

      3ced1456093d84e9617e630d06128da646b41720e873822c37cb40b4698919c4c543250ab9f191d73d6aac1109206655faa179dd781a578e1f778fe92b9a4b08

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1fpldu4m.4qq.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\alien\core.dll

      Filesize

      25KB

      MD5

      24b6950afd8663a46246044e6b09add8

      SHA1

      6444dab57d93ce987c22da66b3706d5d7fc226da

      SHA256

      9aa3ca96a84eb5606694adb58776c9e926020ef184828b6f7e6f9b50498f7071

      SHA512

      e1967e7e8c3d64b61451254da281415edf9946a6c8a46006f39ae091609c65666c376934b1bdcbd2a7f73adea7aa68e557694f804bf3bc3ce7854fa527e91740

    • C:\Users\Admin\AppData\Local\Temp\config.ini

      Filesize

      910KB

      MD5

      ae2bb0a84eb09656a88e6e1d4737f25f

      SHA1

      cb658ac4932c196edafe21830d138a9184a02e24

      SHA256

      07f268e382051fe80098180d9d9464d244a5b95bc3bdd68c81b032f40aa9cf18

      SHA512

      1c9d495f6ba687fadd98946e5834b1536a0a7836d5d9fb71153c9ab2b8a75ada55a3ea9dee5f86e5ed7577752cc9579f2fbee6ff44cd55a5bde8423f120404d4

    • C:\Users\Admin\AppData\Local\Temp\let_config.ini

      Filesize

      636KB

      MD5

      139f9c49094a8cb625017f49d1612929

      SHA1

      2acf3c680c86d0bf24daf1aa1764031aac0ecf1c

      SHA256

      3f45303d21300a5de7d2d84e32d3a50b161239061452442783eed1b0a34876e1

      SHA512

      09d224ec76eb31efdb0a53384896fd8c12a7dcc6a60bb3e01324f748c674235c6bbbc72b57b1c5235eb4da20729c45d9cfe5acc1edeebe47f7344e0f83275ed1

    • C:\Users\Admin\AppData\Local\Temp\letsvpn-latest.exe

      Filesize

      14.5MB

      MD5

      94f6bd702b7a2e17c45d16eaf7da0d64

      SHA1

      45f8c05851bcf16416e087253ce962b320e9db8a

      SHA256

      07f44325eab13b01d536a42e90a0247c6efecf23ccd4586309828aa814f5c776

      SHA512

      7ffc5183d3f1fb23e38c60d55724ab9e9e1e3832c9fb09296f0635f78d81477c6894c00a28e63096fa395e1c11cbeaa1f77f910f9ff9c1f1ecf0b857aa671b3d

    • C:\Users\Admin\AppData\Local\Temp\letsvpnAnquan.exe

      Filesize

      14KB

      MD5

      426dfd5ece3b41970773031637cd5539

      SHA1

      d0fe14f8dab89aaddac8b1c89b1cee48396ec636

      SHA256

      737f08702f00e78dbe78acbeda63b73d04c1f8e741c5282a9aa1409369b6efa8

      SHA512

      5c66ea3360115d6dcc71f6d624a886f3c992c5d30338880b0ba48db77dd7fa744b60a3d65fed63427ebb3a8bcf9b204e9ba1521d8c9f0e804ce0db76befa8935

    • C:\Users\Admin\AppData\Local\Temp\lua5.1.dll

      Filesize

      164KB

      MD5

      24a0d2ef5b931a2a13341a2503b1de80

      SHA1

      6201347d1ded92d365126a1225768e11c33ee818

      SHA256

      fbbe7ee073d0290ac13c98b92a8405ea04dcc6837b4144889885dd70679e933f

      SHA512

      5e06f88bb3920cef40a4941efb3b4d3012edf868cc3042f9dbc1989c76b410b4e2da12c20ae2fbcffe5525b43aeca8875e51167d0ce041864d546fdb2e1fecd2

    • C:\Users\Admin\AppData\Local\Temp\nsd9ACA.tmp\INetC.dll

      Filesize

      25KB

      MD5

      40d7eca32b2f4d29db98715dd45bfac5

      SHA1

      124df3f617f562e46095776454e1c0c7bb791cc7

      SHA256

      85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

      SHA512

      5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

    • C:\Users\Admin\AppData\Local\Temp\nskB97D.tmp\System.dll

      Filesize

      11KB

      MD5

      75ed96254fbf894e42058062b4b4f0d1

      SHA1

      996503f1383b49021eb3427bc28d13b5bbd11977

      SHA256

      a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7

      SHA512

      58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4

    • C:\Users\Admin\AppData\Local\Temp\nskB97D.tmp\nsDialogs.dll

      Filesize

      9KB

      MD5

      ca95c9da8cef7062813b989ab9486201

      SHA1

      c555af25df3de51aa18d487d47408d5245dba2d1

      SHA256

      feb6364375d0ab081e9cdf11271c40cb966af295c600903383b0730f0821c0be

      SHA512

      a30d94910204d1419c803dc12d90a9d22f63117e4709b1a131d8c4d5ead7e4121150e2c8b004a546b33c40c294df0a74567013001f55f37147d86bb847d7bbc9

    • C:\Users\Admin\AppData\Local\Temp\nskB97D.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      3d366250fcf8b755fce575c75f8c79e4

      SHA1

      2ebac7df78154738d41aac8e27d7a0e482845c57

      SHA256

      8bdd996ae4778c6f829e2bcb651c55efc9ec37eeea17d259e013b39528dddbb6

      SHA512

      67d2d88de625227ccd2cb406b4ac3a215d1770d385c985a44e2285490f49b45f23ce64745b24444e2a0f581335fda02e913b92781043e8dfd287844435ba9094

    • memory/3748-69-0x0000000002240000-0x0000000002640000-memory.dmp

      Filesize

      4.0MB

    • memory/3748-65-0x00007FFEE92B0000-0x00007FFEE94A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3748-55-0x0000000002240000-0x0000000002640000-memory.dmp

      Filesize

      4.0MB

    • memory/3748-54-0x0000000000900000-0x0000000000909000-memory.dmp

      Filesize

      36KB

    • memory/3748-53-0x00000000008D0000-0x00000000008F8000-memory.dmp

      Filesize

      160KB

    • memory/3748-51-0x0000000002240000-0x0000000002640000-memory.dmp

      Filesize

      4.0MB

    • memory/3748-67-0x00000000763C0000-0x00000000765D5000-memory.dmp

      Filesize

      2.1MB

    • memory/3748-64-0x0000000002240000-0x0000000002640000-memory.dmp

      Filesize

      4.0MB

    • memory/3748-72-0x0000000002240000-0x0000000002640000-memory.dmp

      Filesize

      4.0MB

    • memory/4488-91-0x0000000005F00000-0x0000000006254000-memory.dmp

      Filesize

      3.3MB

    • memory/4488-101-0x00000000064B0000-0x00000000064CE000-memory.dmp

      Filesize

      120KB

    • memory/4488-75-0x0000000005680000-0x0000000005CA8000-memory.dmp

      Filesize

      6.2MB

    • memory/4488-79-0x0000000005410000-0x0000000005432000-memory.dmp

      Filesize

      136KB

    • memory/4488-82-0x0000000005E90000-0x0000000005EF6000-memory.dmp

      Filesize

      408KB

    • memory/4488-74-0x0000000004F10000-0x0000000004F46000-memory.dmp

      Filesize

      216KB

    • memory/4488-80-0x0000000005E20000-0x0000000005E86000-memory.dmp

      Filesize

      408KB

    • memory/4488-103-0x0000000006540000-0x000000000658C000-memory.dmp

      Filesize

      304KB

    • memory/4492-86-0x00000000763C0000-0x00000000765D5000-memory.dmp

      Filesize

      2.1MB

    • memory/4492-84-0x00007FFEE92B0000-0x00007FFEE94A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4492-70-0x00000000006B0000-0x00000000006B9000-memory.dmp

      Filesize

      36KB

    • memory/4492-83-0x0000000002370000-0x0000000002770000-memory.dmp

      Filesize

      4.0MB

    • memory/4552-52-0x00000000008D0000-0x0000000000909000-memory.dmp

      Filesize

      228KB

    • memory/4552-73-0x0000000004A60000-0x0000000004A82000-memory.dmp

      Filesize

      136KB

    • memory/4552-76-0x0000000005060000-0x0000000005067000-memory.dmp

      Filesize

      28KB

    • memory/4552-68-0x00000000049F0000-0x0000000004A58000-memory.dmp

      Filesize

      416KB

    • memory/4636-104-0x0000000005700000-0x000000000579C000-memory.dmp

      Filesize

      624KB