Malware Analysis Report

2024-11-13 13:54

Sample ID 240913-f6ykmswgqk
Target 2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys
SHA256 0d9ee9b2c72c983eb0c90851a353b5ca9f2a66e70453c822916c3c4464aeaab8
Tags
rhadamanthys discovery stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0d9ee9b2c72c983eb0c90851a353b5ca9f2a66e70453c822916c3c4464aeaab8

Threat Level: Known bad

The file 2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys was found to be: Known bad.

Malicious Activity Summary

rhadamanthys discovery stealer

Rhadamanthys

Suspicious use of NtCreateUserProcessOtherParentProcess

Program crash

System Location Discovery: System Language Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-13 05:29

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-13 05:29

Reported

2024-09-13 05:32

Platform

win7-20240704-en

Max time kernel

121s

Max time network

123s

Command Line

C:\Windows\Explorer.EXE

Signatures

Rhadamanthys

stealer rhadamanthys

Suspicious use of NtCreateUserProcessOtherParentProcess

Description Indicator Process Target
PID 2880 created 1208 N/A C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe C:\Windows\Explorer.EXE

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\dialer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe N/A

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe

"C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe"

C:\Windows\SysWOW64\dialer.exe

"C:\Windows\system32\dialer.exe"

Network

N/A

Files

memory/2880-1-0x000000000040C000-0x0000000000427000-memory.dmp

memory/2880-0-0x0000000000400000-0x0000000000FC2000-memory.dmp

memory/2880-3-0x0000000000240000-0x000000000024A000-memory.dmp

memory/2880-2-0x0000000000240000-0x000000000024A000-memory.dmp

memory/2880-9-0x0000000000280000-0x0000000000297000-memory.dmp

memory/2880-8-0x0000000000280000-0x0000000000297000-memory.dmp

memory/2880-7-0x0000000000270000-0x0000000000274000-memory.dmp

memory/2880-6-0x0000000000270000-0x0000000000274000-memory.dmp

memory/2880-5-0x0000000000260000-0x0000000000267000-memory.dmp

memory/2880-4-0x0000000000260000-0x0000000000267000-memory.dmp

memory/2880-10-0x0000000003BD0000-0x0000000003FD0000-memory.dmp

memory/2880-11-0x0000000003BD0000-0x0000000003FD0000-memory.dmp

memory/2940-15-0x0000000000080000-0x0000000000089000-memory.dmp

memory/2880-16-0x000000000040C000-0x0000000000427000-memory.dmp

memory/2880-14-0x0000000075310000-0x0000000075357000-memory.dmp

memory/2880-12-0x0000000077100000-0x00000000772A9000-memory.dmp

memory/2940-21-0x0000000075310000-0x0000000075357000-memory.dmp

memory/2940-23-0x0000000077101000-0x0000000077202000-memory.dmp

memory/2940-22-0x0000000001BE0000-0x0000000001FE0000-memory.dmp

memory/2940-19-0x0000000077100000-0x00000000772A9000-memory.dmp

memory/2940-18-0x0000000001BE0000-0x0000000001FE0000-memory.dmp

memory/2940-24-0x0000000001BE0000-0x0000000001FE0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-09-13 05:29

Reported

2024-09-13 05:32

Platform

win10v2004-20240802-en

Max time kernel

150s

Max time network

150s

Command Line

sihost.exe

Signatures

Rhadamanthys

stealer rhadamanthys

Suspicious use of NtCreateUserProcessOtherParentProcess

Description Indicator Process Target
PID 4872 created 2848 N/A C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe C:\Windows\system32\sihost.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\openwith.exe N/A

Processes

C:\Windows\system32\sihost.exe

sihost.exe

C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe

"C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe"

C:\Windows\SysWOW64\openwith.exe

"C:\Windows\system32\openwith.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4872 -ip 4872

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 540

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4872 -ip 4872

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 536

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

memory/4872-1-0x000000000040C000-0x0000000000427000-memory.dmp

memory/4872-3-0x0000000000FD0000-0x0000000000FDA000-memory.dmp

memory/4872-0-0x0000000000400000-0x0000000000FC2000-memory.dmp

memory/4872-9-0x0000000002D50000-0x0000000002D67000-memory.dmp

memory/4872-8-0x0000000002D50000-0x0000000002D67000-memory.dmp

memory/4872-7-0x0000000002D40000-0x0000000002D44000-memory.dmp

memory/4872-6-0x0000000002D40000-0x0000000002D44000-memory.dmp

memory/4872-5-0x0000000002D30000-0x0000000002D37000-memory.dmp

memory/4872-4-0x0000000002D30000-0x0000000002D37000-memory.dmp

memory/4872-2-0x0000000000FD0000-0x0000000000FDA000-memory.dmp

memory/4872-10-0x0000000004030000-0x0000000004430000-memory.dmp

memory/4872-11-0x0000000004030000-0x0000000004430000-memory.dmp

memory/4872-12-0x00007FF9F2B50000-0x00007FF9F2D45000-memory.dmp

memory/4872-14-0x0000000076200000-0x0000000076415000-memory.dmp

memory/4688-15-0x0000000000B00000-0x0000000000B09000-memory.dmp

memory/4688-17-0x00000000027E0000-0x0000000002BE0000-memory.dmp

memory/4688-20-0x0000000076200000-0x0000000076415000-memory.dmp

memory/4872-23-0x0000000004030000-0x0000000004430000-memory.dmp

memory/4688-22-0x00000000027E0000-0x0000000002BE0000-memory.dmp

memory/4688-21-0x00000000027E0000-0x0000000002BE0000-memory.dmp

memory/4688-18-0x00007FF9F2B50000-0x00007FF9F2D45000-memory.dmp

memory/4688-24-0x00000000027E0000-0x0000000002BE0000-memory.dmp

memory/4872-25-0x000000000040C000-0x0000000000427000-memory.dmp