Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
Installer_Kms.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Installer_Kms.exe
Resource
win11-20240802-en
General
-
Target
Installer_Kms.exe
-
Size
68.0MB
-
MD5
f53efc191a90dd0ba78c961b513efb56
-
SHA1
0a30f6b17900dd62ba3c76289ae7f427dd8c26cd
-
SHA256
9f18caf887db4cccec90f1d018538b77fd5b6e2f7bcaaecbd66fee016f98e10d
-
SHA512
a4b05a36ce2b58821a14d2f13d176756e0293e777e50e052a52a0543cc2fbee93ae4b0f46af21aa4b5ba86a5414ebc400da60201f25c1da8820620ad408e67a7
-
SSDEEP
786432:qxGBxG0xG4xGRxGXxGWxGmxGjxGBxG/xG8xGvxGqxGixG:qEBE0E4EREXEWEmEjEBE/E8EvEqEiE
Malware Config
Extracted
rhadamanthys
https://185.184.26.10:4928/e4eb12414c95175ccfd/15_SEP
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1788 created 2452 1788 RegSvcs.exe 42 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 bitbucket.org 6 bitbucket.org -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll Installer_Kms.exe File created C:\Windows\SysWOW64\temp.000 Installer_Kms.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2508 set thread context of 1788 2508 Installer_Kms.exe 87 -
Program crash 2 IoCs
pid pid_target Process procid_target 1804 1788 WerFault.exe 87 956 1788 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer_Kms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1788 RegSvcs.exe 1788 RegSvcs.exe 2212 openwith.exe 2212 openwith.exe 2212 openwith.exe 2212 openwith.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe 87 PID 1788 wrote to memory of 2212 1788 RegSvcs.exe 89 PID 1788 wrote to memory of 2212 1788 RegSvcs.exe 89 PID 1788 wrote to memory of 2212 1788 RegSvcs.exe 89 PID 1788 wrote to memory of 2212 1788 RegSvcs.exe 89 PID 1788 wrote to memory of 2212 1788 RegSvcs.exe 89
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2452
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\Installer_Kms.exe"C:\Users\Admin\AppData\Local\Temp\Installer_Kms.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 4323⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 4203⤵
- Program crash
PID:956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1788 -ip 17881⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1788 -ip 17881⤵PID:4272