Analysis

  • max time kernel
    121s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 12:32

General

  • Target

    8837df25aabc4fad85e851aca192f714.exe

  • Size

    2.2MB

  • MD5

    8837df25aabc4fad85e851aca192f714

  • SHA1

    c4fbd38356b7ee16eaf21deb83170bbcb0fe566a

  • SHA256

    741cee2c6f6f8ee8a54923fa2a0c88085cede35bdc2e95b1b9f1800e894e6c19

  • SHA512

    93f712ae3ca726b090df270feb1421ea98778260b7fe309e06ac3887b396d3dc8ab41655ec7d15a57cac8b467cca0395a52ef965765a26c9597f6512fdad88e2

  • SSDEEP

    49152:fIGHiuBfswUwl+GdRI2UET1SUvj0Ug6j9iuXWvpAqahtX8+34+vSVHstzn+qpEjs:fNCuBfZ4GdfUaj0UgM5WviXtT34+vBJV

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to execute payload.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2576
      • C:\Windows\system32\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1412
    • C:\Users\Admin\AppData\Local\Temp\8837df25aabc4fad85e851aca192f714.exe
      "C:\Users\Admin\AppData\Local\Temp\8837df25aabc4fad85e851aca192f714.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\Admin\AppData/Roaming/2CCk.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{44C80840-CC84-40CC-880C-408084C804C8}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4448
      • C:\Windows\system32\regsvr32.exe
        "regsvr32" /s /i:INSTALL C:\Users\Admin\AppData/Roaming/2CCk.ini
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1328
    • C:\Windows\system32\regsvr32.EXE
      C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData/Roaming/2CCk.ini
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:4320
    • C:\Windows\system32\regsvr32.EXE
      C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData/Roaming/2CCk.ini
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:1124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.EXE.log

      Filesize

      434B

      MD5

      55cd82f1f37f86716011f6271ae32817

      SHA1

      c9206205ef4c787cf9fa55456dbfd29de3d685b5

      SHA256

      c66fe4787c6333e4e0759b3f041fea3c5abff4cebe577679308b5d09e284bc4f

      SHA512

      aa2a89420e046f0415bfbd4f88ba337c0b667da3a45c7968e80d463adbc583921cc32127d9b3a709d7040e78c82a913ee00f6195487c2020b6f178a6629d9a8c

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_k44ian3c.3jn.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\2CCk.ini

      Filesize

      1.0MB

      MD5

      60a55b1d8e739216cadd3e31d7412f03

      SHA1

      8b5c284796a1efa1df8a3eddd27070d374e1cc54

      SHA256

      be86e0357748f3b4fa166342f284800a83c955c2c8b197475c2450613a6eed67

      SHA512

      c06cb2b86f7a9de5243f4395fb40fa88a7669f3e427d427afb95801de447beb8f616847890ae12cfc6060ec7215ceb370cd61b5cf0395eab81312121060dc7ab

    • memory/1124-63-0x000000001B1D0000-0x000000001B5D0000-memory.dmp

      Filesize

      4.0MB

    • memory/1124-61-0x000000001AF70000-0x000000001AF80000-memory.dmp

      Filesize

      64KB

    • memory/1328-32-0x000000001BB00000-0x000000001BF00000-memory.dmp

      Filesize

      4.0MB

    • memory/1328-36-0x00007FFEE6C30000-0x00007FFEE6EF9000-memory.dmp

      Filesize

      2.8MB

    • memory/1328-35-0x00007FFEE8320000-0x00007FFEE83DE000-memory.dmp

      Filesize

      760KB

    • memory/1328-43-0x00007FFECAD10000-0x00007FFECB7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/1328-25-0x000000001B860000-0x000000001B910000-memory.dmp

      Filesize

      704KB

    • memory/1328-26-0x00007FFECAD10000-0x00007FFECB7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/1328-27-0x00007FFECAD10000-0x00007FFECB7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/1328-28-0x00007FFECAD10000-0x00007FFECB7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/1328-29-0x0000000003000000-0x0000000003008000-memory.dmp

      Filesize

      32KB

    • memory/1328-30-0x0000000003010000-0x0000000003020000-memory.dmp

      Filesize

      64KB

    • memory/1328-31-0x000000001BB00000-0x000000001BF00000-memory.dmp

      Filesize

      4.0MB

    • memory/1328-34-0x00007FFEE92B0000-0x00007FFEE94A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1328-33-0x00007FFECAD10000-0x00007FFECB7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/1412-42-0x000001DD52DD0000-0x000001DD531D0000-memory.dmp

      Filesize

      4.0MB

    • memory/1412-37-0x000001DD51260000-0x000001DD5126A000-memory.dmp

      Filesize

      40KB

    • memory/1412-46-0x00007FFEE6C30000-0x00007FFEE6EF9000-memory.dmp

      Filesize

      2.8MB

    • memory/1412-45-0x00007FFEE8320000-0x00007FFEE83DE000-memory.dmp

      Filesize

      760KB

    • memory/1412-44-0x00007FFEE92B0000-0x00007FFEE94A5000-memory.dmp

      Filesize

      2.0MB

    • memory/3076-49-0x00007FF7C2760000-0x00007FF7C2942000-memory.dmp

      Filesize

      1.9MB

    • memory/4320-56-0x000000001BAD0000-0x000000001BED0000-memory.dmp

      Filesize

      4.0MB

    • memory/4320-54-0x0000000003110000-0x0000000003120000-memory.dmp

      Filesize

      64KB

    • memory/4448-19-0x00007FFECB2B0000-0x00007FFECBD71000-memory.dmp

      Filesize

      10.8MB

    • memory/4448-15-0x00007FFECB2B0000-0x00007FFECBD71000-memory.dmp

      Filesize

      10.8MB

    • memory/4448-13-0x00007FFECB2B0000-0x00007FFECBD71000-memory.dmp

      Filesize

      10.8MB

    • memory/4448-1-0x00007FFECB2B3000-0x00007FFECB2B5000-memory.dmp

      Filesize

      8KB

    • memory/4448-14-0x00007FFECB2B0000-0x00007FFECBD71000-memory.dmp

      Filesize

      10.8MB

    • memory/4448-12-0x00007FFECB2B0000-0x00007FFECBD71000-memory.dmp

      Filesize

      10.8MB

    • memory/4448-2-0x000001FD2CF40000-0x000001FD2CF62000-memory.dmp

      Filesize

      136KB