Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
Installer_Kms.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Installer_Kms.exe
Resource
win11-20240802-en
General
-
Target
Installer_Kms.exe
-
Size
68.0MB
-
MD5
f53efc191a90dd0ba78c961b513efb56
-
SHA1
0a30f6b17900dd62ba3c76289ae7f427dd8c26cd
-
SHA256
9f18caf887db4cccec90f1d018538b77fd5b6e2f7bcaaecbd66fee016f98e10d
-
SHA512
a4b05a36ce2b58821a14d2f13d176756e0293e777e50e052a52a0543cc2fbee93ae4b0f46af21aa4b5ba86a5414ebc400da60201f25c1da8820620ad408e67a7
-
SSDEEP
786432:qxGBxG0xG4xGRxGXxGWxGmxGjxGBxG/xG8xGvxGqxGixG:qEBE0E4EREXEWEmEjEBE/E8EvEqEiE
Malware Config
Extracted
rhadamanthys
https://185.184.26.10:4928/e4eb12414c95175ccfd/15_SEP
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RegSvcs.exedescription pid process target process PID 1788 created 2452 1788 RegSvcs.exe sihost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in System32 directory 2 IoCs
Processes:
Installer_Kms.exedescription ioc process File opened for modification C:\Windows\SysWOW64\shell32.dll Installer_Kms.exe File created C:\Windows\SysWOW64\temp.000 Installer_Kms.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Installer_Kms.exedescription pid process target process PID 2508 set thread context of 1788 2508 Installer_Kms.exe RegSvcs.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1804 1788 WerFault.exe RegSvcs.exe 956 1788 WerFault.exe RegSvcs.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
openwith.exeInstaller_Kms.exeRegSvcs.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer_Kms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RegSvcs.exeopenwith.exepid process 1788 RegSvcs.exe 1788 RegSvcs.exe 2212 openwith.exe 2212 openwith.exe 2212 openwith.exe 2212 openwith.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
Installer_Kms.exedescription pid process Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe Token: SeShutdownPrivilege 2508 Installer_Kms.exe Token: SeCreatePagefilePrivilege 2508 Installer_Kms.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Installer_Kms.exeRegSvcs.exedescription pid process target process PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 2508 wrote to memory of 1788 2508 Installer_Kms.exe RegSvcs.exe PID 1788 wrote to memory of 2212 1788 RegSvcs.exe openwith.exe PID 1788 wrote to memory of 2212 1788 RegSvcs.exe openwith.exe PID 1788 wrote to memory of 2212 1788 RegSvcs.exe openwith.exe PID 1788 wrote to memory of 2212 1788 RegSvcs.exe openwith.exe PID 1788 wrote to memory of 2212 1788 RegSvcs.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2452
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\Installer_Kms.exe"C:\Users\Admin\AppData\Local\Temp\Installer_Kms.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 4323⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 4203⤵
- Program crash
PID:956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1788 -ip 17881⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1788 -ip 17881⤵PID:4272