Analysis
-
max time kernel
95s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 03:59
Static task
static1
Behavioral task
behavioral1
Sample
InstallerKms.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
InstallerKms.exe
Resource
win10v2004-20240802-en
General
-
Target
InstallerKms.exe
-
Size
68.0MB
-
MD5
f53efc191a90dd0ba78c961b513efb56
-
SHA1
0a30f6b17900dd62ba3c76289ae7f427dd8c26cd
-
SHA256
9f18caf887db4cccec90f1d018538b77fd5b6e2f7bcaaecbd66fee016f98e10d
-
SHA512
a4b05a36ce2b58821a14d2f13d176756e0293e777e50e052a52a0543cc2fbee93ae4b0f46af21aa4b5ba86a5414ebc400da60201f25c1da8820620ad408e67a7
-
SSDEEP
786432:qxGBxG0xG4xGRxGXxGWxGmxGjxGBxG/xG8xGvxGqxGixG:qEBE0E4EREXEWEmEjEBE/E8EvEqEiE
Malware Config
Extracted
rhadamanthys
https://185.184.26.10:4928/e4eb12414c95175ccfd/15_SEP
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
CasPol.exedescription pid process target process PID 2252 created 2588 2252 CasPol.exe sihost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in System32 directory 2 IoCs
Processes:
InstallerKms.exedescription ioc process File opened for modification C:\Windows\SysWOW64\shell32.dll InstallerKms.exe File created C:\Windows\SysWOW64\temp.000 InstallerKms.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
InstallerKms.exedescription pid process target process PID 3180 set thread context of 2252 3180 InstallerKms.exe CasPol.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2920 2252 WerFault.exe CasPol.exe 4848 2252 WerFault.exe CasPol.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
InstallerKms.exeCasPol.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallerKms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
CasPol.exeopenwith.exepid process 2252 CasPol.exe 2252 CasPol.exe 4916 openwith.exe 4916 openwith.exe 4916 openwith.exe 4916 openwith.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
InstallerKms.exedescription pid process Token: SeShutdownPrivilege 3180 InstallerKms.exe Token: SeCreatePagefilePrivilege 3180 InstallerKms.exe Token: SeShutdownPrivilege 3180 InstallerKms.exe Token: SeCreatePagefilePrivilege 3180 InstallerKms.exe Token: SeShutdownPrivilege 3180 InstallerKms.exe Token: SeCreatePagefilePrivilege 3180 InstallerKms.exe Token: SeShutdownPrivilege 3180 InstallerKms.exe Token: SeCreatePagefilePrivilege 3180 InstallerKms.exe Token: SeShutdownPrivilege 3180 InstallerKms.exe Token: SeCreatePagefilePrivilege 3180 InstallerKms.exe Token: SeShutdownPrivilege 3180 InstallerKms.exe Token: SeCreatePagefilePrivilege 3180 InstallerKms.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
InstallerKms.exeCasPol.exedescription pid process target process PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 3180 wrote to memory of 2252 3180 InstallerKms.exe CasPol.exe PID 2252 wrote to memory of 4916 2252 CasPol.exe openwith.exe PID 2252 wrote to memory of 4916 2252 CasPol.exe openwith.exe PID 2252 wrote to memory of 4916 2252 CasPol.exe openwith.exe PID 2252 wrote to memory of 4916 2252 CasPol.exe openwith.exe PID 2252 wrote to memory of 4916 2252 CasPol.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2588
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\InstallerKms.exe"C:\Users\Admin\AppData\Local\Temp\InstallerKms.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 4323⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 4283⤵
- Program crash
PID:4848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2252 -ip 22521⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2252 -ip 22521⤵PID:2724