Analysis Overview
SHA256
0d9ee9b2c72c983eb0c90851a353b5ca9f2a66e70453c822916c3c4464aeaab8
Threat Level: Known bad
The file 2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys was found to be: Known bad.
Malicious Activity Summary
Rhadamanthys
Suspicious use of NtCreateUserProcessOtherParentProcess
Program crash
System Location Discovery: System Language Discovery
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-09-13 05:29
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-09-13 05:29
Reported
2024-09-13 05:32
Platform
win7-20240704-en
Max time kernel
121s
Max time network
123s
Command Line
Signatures
Rhadamanthys
Suspicious use of NtCreateUserProcessOtherParentProcess
| Description | Indicator | Process | Target |
| PID 2880 created 1208 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | C:\Windows\Explorer.EXE |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\dialer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\dialer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\dialer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\dialer.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\dialer.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe
"C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe"
C:\Windows\SysWOW64\dialer.exe
"C:\Windows\system32\dialer.exe"
Network
Files
memory/2880-1-0x000000000040C000-0x0000000000427000-memory.dmp
memory/2880-0-0x0000000000400000-0x0000000000FC2000-memory.dmp
memory/2880-3-0x0000000000240000-0x000000000024A000-memory.dmp
memory/2880-2-0x0000000000240000-0x000000000024A000-memory.dmp
memory/2880-9-0x0000000000280000-0x0000000000297000-memory.dmp
memory/2880-8-0x0000000000280000-0x0000000000297000-memory.dmp
memory/2880-7-0x0000000000270000-0x0000000000274000-memory.dmp
memory/2880-6-0x0000000000270000-0x0000000000274000-memory.dmp
memory/2880-5-0x0000000000260000-0x0000000000267000-memory.dmp
memory/2880-4-0x0000000000260000-0x0000000000267000-memory.dmp
memory/2880-10-0x0000000003BD0000-0x0000000003FD0000-memory.dmp
memory/2880-11-0x0000000003BD0000-0x0000000003FD0000-memory.dmp
memory/2940-15-0x0000000000080000-0x0000000000089000-memory.dmp
memory/2880-16-0x000000000040C000-0x0000000000427000-memory.dmp
memory/2880-14-0x0000000075310000-0x0000000075357000-memory.dmp
memory/2880-12-0x0000000077100000-0x00000000772A9000-memory.dmp
memory/2940-21-0x0000000075310000-0x0000000075357000-memory.dmp
memory/2940-23-0x0000000077101000-0x0000000077202000-memory.dmp
memory/2940-22-0x0000000001BE0000-0x0000000001FE0000-memory.dmp
memory/2940-19-0x0000000077100000-0x00000000772A9000-memory.dmp
memory/2940-18-0x0000000001BE0000-0x0000000001FE0000-memory.dmp
memory/2940-24-0x0000000001BE0000-0x0000000001FE0000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-09-13 05:29
Reported
2024-09-13 05:32
Platform
win10v2004-20240802-en
Max time kernel
150s
Max time network
150s
Command Line
Signatures
Rhadamanthys
Suspicious use of NtCreateUserProcessOtherParentProcess
| Description | Indicator | Process | Target |
| PID 4872 created 2848 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | C:\Windows\system32\sihost.exe |
Program crash
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\openwith.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\openwith.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\openwith.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\openwith.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\openwith.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4872 wrote to memory of 4688 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | C:\Windows\SysWOW64\openwith.exe |
| PID 4872 wrote to memory of 4688 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | C:\Windows\SysWOW64\openwith.exe |
| PID 4872 wrote to memory of 4688 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | C:\Windows\SysWOW64\openwith.exe |
| PID 4872 wrote to memory of 4688 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | C:\Windows\SysWOW64\openwith.exe |
| PID 4872 wrote to memory of 4688 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe | C:\Windows\SysWOW64\openwith.exe |
Processes
C:\Windows\system32\sihost.exe
sihost.exe
C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe
"C:\Users\Admin\AppData\Local\Temp\2024-09-13_8baf3220e481a325efed9bd618f10447_hijackloader_icedid_rhadamanthys.exe"
C:\Windows\SysWOW64\openwith.exe
"C:\Windows\system32\openwith.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4872 -ip 4872
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 540
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4872 -ip 4872
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 536
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
memory/4872-1-0x000000000040C000-0x0000000000427000-memory.dmp
memory/4872-3-0x0000000000FD0000-0x0000000000FDA000-memory.dmp
memory/4872-0-0x0000000000400000-0x0000000000FC2000-memory.dmp
memory/4872-9-0x0000000002D50000-0x0000000002D67000-memory.dmp
memory/4872-8-0x0000000002D50000-0x0000000002D67000-memory.dmp
memory/4872-7-0x0000000002D40000-0x0000000002D44000-memory.dmp
memory/4872-6-0x0000000002D40000-0x0000000002D44000-memory.dmp
memory/4872-5-0x0000000002D30000-0x0000000002D37000-memory.dmp
memory/4872-4-0x0000000002D30000-0x0000000002D37000-memory.dmp
memory/4872-2-0x0000000000FD0000-0x0000000000FDA000-memory.dmp
memory/4872-10-0x0000000004030000-0x0000000004430000-memory.dmp
memory/4872-11-0x0000000004030000-0x0000000004430000-memory.dmp
memory/4872-12-0x00007FF9F2B50000-0x00007FF9F2D45000-memory.dmp
memory/4872-14-0x0000000076200000-0x0000000076415000-memory.dmp
memory/4688-15-0x0000000000B00000-0x0000000000B09000-memory.dmp
memory/4688-17-0x00000000027E0000-0x0000000002BE0000-memory.dmp
memory/4688-20-0x0000000076200000-0x0000000076415000-memory.dmp
memory/4872-23-0x0000000004030000-0x0000000004430000-memory.dmp
memory/4688-22-0x00000000027E0000-0x0000000002BE0000-memory.dmp
memory/4688-21-0x00000000027E0000-0x0000000002BE0000-memory.dmp
memory/4688-18-0x00007FF9F2B50000-0x00007FF9F2D45000-memory.dmp
memory/4688-24-0x00000000027E0000-0x0000000002BE0000-memory.dmp
memory/4872-25-0x000000000040C000-0x0000000000427000-memory.dmp