Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe
Resource
win10v2004-20240802-en
General
-
Target
5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe
-
Size
1.6MB
-
MD5
fa000351e26e17543f67e3dedc97d37e
-
SHA1
c59fc4f489ac15d5a1d455abbf0c3c5ad6fcc189
-
SHA256
5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350
-
SHA512
1bf517f2b0d3c156c2850f161f4bedf735361a8951d807b05eeaa711a0720031e545d5dd56f46337f059ef18bea1523ec1f5a5b96e83d6380eb74e6526bd0025
-
SSDEEP
49152:cpUlRhQMnbfKk8QkwCRYhtkp0d0X1zJ5w+ufya5h:cpUlYEfKk8DTROk6dK1l5wF
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RegSvcs.exedescription pid Process procid_target PID 4760 created 2608 4760 RegSvcs.exe 44 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exeWScript.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
Processes:
qwlvpmrupf.mp3RegSvcs.exepid Process 2124 qwlvpmrupf.mp3 4760 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
qwlvpmrupf.mp3description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\wlnk\\QWLVPM~1.EXE C:\\Users\\Admin\\AppData\\Roaming\\wlnk\\tnlupe.mp3" qwlvpmrupf.mp3 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
qwlvpmrupf.mp3description pid Process procid_target PID 2124 set thread context of 4760 2124 qwlvpmrupf.mp3 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exeopenwith.exeqwlvpmrupf.mp3cmd.exeipconfig.exeRegSvcs.exeWScript.execmd.execmd.exeipconfig.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qwlvpmrupf.mp3 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid Process 3720 ipconfig.exe 4224 ipconfig.exe -
Modifies registry class 1 IoCs
Processes:
5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings 5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
qwlvpmrupf.mp3RegSvcs.exeopenwith.exepid Process 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 2124 qwlvpmrupf.mp3 4760 RegSvcs.exe 4760 RegSvcs.exe 452 openwith.exe 452 openwith.exe 452 openwith.exe 452 openwith.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exeWScript.execmd.execmd.execmd.exeqwlvpmrupf.mp3RegSvcs.exedescription pid Process procid_target PID 3656 wrote to memory of 992 3656 5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe 89 PID 3656 wrote to memory of 992 3656 5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe 89 PID 3656 wrote to memory of 992 3656 5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe 89 PID 992 wrote to memory of 1336 992 WScript.exe 91 PID 992 wrote to memory of 1336 992 WScript.exe 91 PID 992 wrote to memory of 1336 992 WScript.exe 91 PID 992 wrote to memory of 3988 992 WScript.exe 93 PID 992 wrote to memory of 3988 992 WScript.exe 93 PID 992 wrote to memory of 3988 992 WScript.exe 93 PID 1336 wrote to memory of 3720 1336 cmd.exe 95 PID 1336 wrote to memory of 3720 1336 cmd.exe 95 PID 1336 wrote to memory of 3720 1336 cmd.exe 95 PID 3988 wrote to memory of 2124 3988 cmd.exe 96 PID 3988 wrote to memory of 2124 3988 cmd.exe 96 PID 3988 wrote to memory of 2124 3988 cmd.exe 96 PID 992 wrote to memory of 840 992 WScript.exe 97 PID 992 wrote to memory of 840 992 WScript.exe 97 PID 992 wrote to memory of 840 992 WScript.exe 97 PID 840 wrote to memory of 4224 840 cmd.exe 99 PID 840 wrote to memory of 4224 840 cmd.exe 99 PID 840 wrote to memory of 4224 840 cmd.exe 99 PID 2124 wrote to memory of 4760 2124 qwlvpmrupf.mp3 100 PID 2124 wrote to memory of 4760 2124 qwlvpmrupf.mp3 100 PID 2124 wrote to memory of 4760 2124 qwlvpmrupf.mp3 100 PID 2124 wrote to memory of 4760 2124 qwlvpmrupf.mp3 100 PID 2124 wrote to memory of 4760 2124 qwlvpmrupf.mp3 100 PID 4760 wrote to memory of 452 4760 RegSvcs.exe 101 PID 4760 wrote to memory of 452 4760 RegSvcs.exe 101 PID 4760 wrote to memory of 452 4760 RegSvcs.exe 101 PID 4760 wrote to memory of 452 4760 RegSvcs.exe 101 PID 4760 wrote to memory of 452 4760 RegSvcs.exe 101
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2608
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe"C:\Users\Admin\AppData\Local\Temp\5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rmxb.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3720
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c qwlvpmrupf.mp3 tnlupe.mp33⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwlvpmrupf.mp3qwlvpmrupf.mp3 tnlupe.mp34⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4760
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4224
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4352,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=3004 /prefetch:81⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
508B
MD5d391f8b614a342cff9fcbf8f4e41c934
SHA1fc045f44973b9000f63808abd1e59c66ed6755b7
SHA25636568784a413d46056fac31e259c41f4429f08b1564a72ceb777cc80a0aa9f1c
SHA512e446d6f17e9765ac260f4bd429ffe901c47c46fdfdefba25269a33e570e98b24469b529b815322e1d17ae3b4589ecf5561519d39d3ad65fd164aa8fca50e62ad
-
Filesize
624B
MD5c3a02fe4f358078606a02b7d8c069957
SHA14cb6fc80ac829fcdb8088cc95f6c109c719cfa5d
SHA256d8abe1326e449ca4d9c330a900ce393ee32101793d91e7f556d0c87e77adba0c
SHA512c016ded65e5a728e3eff1e66ae913ff81677b197b4c809a9f9e509304dc2747a581597760b0d4b79e60c03647dc3569cae21c413152c6e4af8b4dede10e8bb9d
-
Filesize
528B
MD583ca8d8bac38af12453f9d9ff1d02916
SHA1dcc6e7ab9858eb9ff63f4cd2dd7e9b84ec694a22
SHA25658412d427987a11c362fc7d921804f58277c3a5e4ea7ce98d4dc260e9aeb6302
SHA5121bf89f1196b9c41e5781f118ce657aec2194d48b0c4d15672a55093778c660e609626a9e5ea5336064590a9bd21f8fa1d9cf6f6435e866a0facf50e438d5d3f0
-
Filesize
532B
MD58344337d8607eef8ba26fc751f8e0122
SHA12ab2afce50e3553637aec0b5a65aa2e72d0ce51a
SHA256ecb2d582d697d033a5e5bd06387df5725af74707c0e4b596d564be2bdb1221a7
SHA512da3cab35922c97d3d03c073f51915792278919775c9690ad95a8bd7143cd45a5b0fcbb5216ed53dfc3eee1265bb91ddcdd875699ab23b3d95fccc991190caf2b
-
Filesize
609B
MD573cdc398766b26d5b3fc2a732b633e80
SHA14e8178167362c791d19b8dd90284751e6294c041
SHA256d078345688738bc731ee73004ac6ad2670cfd6343b570fa5b7c0ab7ad30f0b48
SHA512ab55cecf628450ee0e07591c8a6b7e1ebd6f1e1ff0c3184a14bf297c64153c8507b331a391020a5068d7c23cb55e73125e7582d204ce6f5c1e26f3ee3cd32705
-
Filesize
522B
MD525b3d4f1279923fd4780981605bce9fb
SHA112257bd64a5ab12eafd4679bdbdf9bcf2903b160
SHA256df4f76d702170095fa752d69f1ab793604e9dcce7adcad7c83fdae623f0c0093
SHA512f3579a94ebabd59b055d7170e3f9fbaec7d645e3cbe0eff514413621fec6811fb07264e4a5048222e8a84bdeb671d7580989b7e2d6b8987795782b4c7c7e9920
-
Filesize
586B
MD5ac53ee172cc20f1bc979fd4710cbfa00
SHA15c83524e42270883ff05c434f3ab62ada8931f51
SHA256774c4cc458e33020b29fa28fc91db540c86f55142d716ca1613da20670435198
SHA51270df2bfe2300aae5bec804e7f0235c1b9601fc1447df84248b6eff030a4f36b908d00d089911d082c7ca10f7f9d30239b1414b754b32cb1adc8f8a5a7286341d
-
Filesize
588B
MD562a55b40d10bc4ccdf643e624b90d003
SHA11aafd527e1b40b555b1e68e1f6d9f6c594586913
SHA2569401c3d0cbd1fbb5fb740ea9eff7b4f7af764574a6cbc487c97f99f610ba9852
SHA512421b3694a2f2e080a03459973fe05a2b23f4fa67323529ee8d9afdb6b5e9b8d082193a31f7c2b58d3368158fcdef49d60dbabd3a4f7e656c8ed5b3b95f6bb181
-
Filesize
1.3MB
MD535a5cc0e4d021890e72a070ee02dfdc4
SHA1ba20de52cdc21e3d8bd69470381b7d0cb53f1d05
SHA25651e725c19b88d14e3d978b54d810398993242c959145f323fde92cfa55557ada
SHA512afe5510b3a27cf5e308cde1e000289777ab9cfd592052b37c990028f51f4d5113e15fccf7b13cf9a13ed06e3d134ed2009bbd18ddd5b508fa20d050d8d2719c2
-
Filesize
579B
MD5e3c40d261a890a50e8616efbce725df6
SHA151087dd64e5c3f673c47a3b03ccaffadb77dce6d
SHA256a1c8b7a1408638a385956edaaf4ec1defb98e94784a5aeaec9f63fd24cf3f83b
SHA512114de87085139632a912f2bdc2700eb60f166623641c460e818ce7a29edc2dac24f9c01b186cfb268976b7605fe496addb4300e6ec20507b101659df2add69f8
-
Filesize
512B
MD5c4cea733ef0f8c84e8c7081cdcb01b5e
SHA166050a0f1a5c5a17532e8d449573a31be8e8c693
SHA256b75166289cc3acd2e7ecb722f91792cead7bccbe5d230a3aaf211c2027f7e8b4
SHA512013a885c743cae8bc941d76374745d18498cf5f53aeb7c4e02232130a552cc1553c2d3051d85b0494033da2f5367ba078333659823a7ac236254420eea0706da
-
Filesize
562B
MD54c854c21a4e83906af7ae0b83d1d797b
SHA152a423c95344186d45c66780cd55890820e755e0
SHA256613c53a8e742366747a9253dd19fab2527258f08e40699aaab85d920787a717b
SHA512bfea86080cffec1e69ec7f5a1371796a656b8a129a1fef437fadc8d170cdfd07c6f1ba514fcd14a138d943d89e26621686c366592d9bf6890c83c22a0efa1963
-
Filesize
648B
MD5135f39e327b474dfcf9139f5a9de5a9b
SHA10d70afd4762c1296355dd9e7579eb57b833d4c0c
SHA2560988ff10c9f291f32009ca04929c0156a0e10c5003d30ae266b865e56c064b17
SHA5124cd5747c41ef013c5cc884536864c35c45beeb3fbb794ca6cd891c1f787ace6a261a0b2e45bbc87677cf6540e5413564d98c2510ee30ec163e8ee3d0e4863e2b
-
Filesize
633B
MD50e969295487775daa7d03b33829684f8
SHA1613cf0518a258ce3ed5bb2aac7bac1fda71b1ec4
SHA2565badefdf6c9490d5ed3a5181bb87a30536776827bf7a155957c62b01028fd4fb
SHA5127efcfcee6e15af372a6a57f66531feb1c1873dc22399ce05228369ee3e7e49d69453d75d78131d50217761539bfce82245140163c50abafa1790eec69f1665e1
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
88KB
MD5be932d231ef60dcf6ad6c579873b550c
SHA1ca37ae517c7d341e008cbd71beab29aca839002c
SHA256d47ed1047e043162e221d1a21b5e19d8a24641442bcb17c6c8a51f9456998751
SHA51221385ada5436112899aaa4651a6d561499735e6e59674258c9de6b38a50e671276ae9e8b5c7f70e60321cf41846ae34e299d179fbf6226027d9a9c99751ad09b
-
Filesize
609B
MD5834d7436b1908047fbc4801e3d9ea735
SHA18cc6441f6a4a65902ae20c8d0d73a59048227253
SHA256056d4c251de76715737124ccb63e6652840ee3ee66a41f45b109b3f413ee864b
SHA512effc86ef8949e1c231f9c18c807afc39882cafa2beb5e87f10e2ac5d8378d2f2ac3c94679eefcfe9f4af6c260e524bac051fc789d147215ccd552a1d44edae7a
-
Filesize
40KB
MD5f1d3c3dae4987deb8f2b79c08da81b67
SHA1f5809aebc70a2f23c8ee6b466b5293199545bcf4
SHA256fd491ea65d887c3f3fc2aac3197280e4135c8f571b7d6df63212097783254ea5
SHA512e552d8114e09ab7655e7fcb1549e1f18b3027558024a0e565a1261f7f075e56ce40b37fe70893875da75ca298bf174940756b91ffbf8e991b13bc02da3d4c00c
-
Filesize
40KB
MD55fe3c2e677e90b8971dcaec9d9cf973d
SHA1cccefd97b61b17f2bc60983d2437925a7b063b20
SHA256762982a2b57b2a93dd63fbf230da414b6c3abc6240d4b0af7bb940dc81b74512
SHA5122c204731cc1bdb18259e737cdce622833367413bf10a75a73e23d3c531e3739093d0e4227c032aab61ea8f26a8d65175ac3072eaf61116ff07bc623e0d402727
-
Filesize
517B
MD54daa3e600c4d2c162ffe78c5df68ab8e
SHA1c1f052eb1577599b89b70ae99bd9e6c8dde4f822
SHA256c2b1869137e2e69e3969c50a0918eb71c5797f84faf4093aef0c890957a193ea
SHA51235c537693df896c6b62118bd38bbdc6c0b4233c391fa11fec0e49373e08e7baedc9fab07489bc9c55d7d69797820aefc6c21c62b5a8669ee8aef297dbf89ed6f
-
Filesize
507B
MD5992c91b45a9f3472868d47e61cb8675e
SHA1fcdfbc8ec428982b4cb0b09fb00244de0bc78073
SHA256a8a5116542d33261544e18c4431c11a45f77ab24a7f06a2c1d06480066ec6e62
SHA51224054844512035ab6962f3abe2da36d56ac7e182a72a19d8a38f1c356d7bde30f14fe6fe3ef057c602a73e53a5d9131676c01f1ef99b545877015a4d3243b9eb
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b