Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
launcher.exe
Resource
win7-20240903-en
General
-
Target
launcher.exe
-
Size
35.9MB
-
MD5
6f144d970006586fda9cea641fb399a8
-
SHA1
95fba60a66ca038f1dcb36ab2cd20261d5ea26bc
-
SHA256
4ff60e1c1c7286005832d86970414bc4236f31bfcbe261f44ed7e0b7ce78fddd
-
SHA512
61da15b19e4d92026bf70dd3530c283c7c4d118960bb14f01c063e95f361b2921ca9065bf8902e33616f90005086b28a3c1b48abdbc839a6e3b54a8942b1e1b4
-
SSDEEP
393216:n1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfS:nMguj8Q4VfvXqFTrYF
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1288 created 2452 1288 WzxZnsQ4n2.exe 42 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WzxZnsQ4n2.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2968 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WzxZnsQ4n2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WzxZnsQ4n2.exe -
Executes dropped EXE 1 IoCs
pid Process 1288 WzxZnsQ4n2.exe -
resource yara_rule behavioral2/files/0x0008000000023432-20.dat themida behavioral2/memory/1288-21-0x0000000000D50000-0x00000000011E9000-memory.dmp themida behavioral2/memory/1288-23-0x0000000000D50000-0x00000000011E9000-memory.dmp themida behavioral2/memory/1288-24-0x0000000000D50000-0x00000000011E9000-memory.dmp themida behavioral2/memory/1288-25-0x0000000000D50000-0x00000000011E9000-memory.dmp themida behavioral2/memory/1288-26-0x0000000000D50000-0x00000000011E9000-memory.dmp themida behavioral2/memory/1288-36-0x0000000000D50000-0x00000000011E9000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WzxZnsQ4n2.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WzxZnsQ4n2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2968 powershell.exe 2968 powershell.exe 1288 WzxZnsQ4n2.exe 1288 WzxZnsQ4n2.exe 2276 openwith.exe 2276 openwith.exe 2276 openwith.exe 2276 openwith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2968 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1812 wrote to memory of 4832 1812 launcher.exe 83 PID 1812 wrote to memory of 4832 1812 launcher.exe 83 PID 4832 wrote to memory of 2968 4832 cmd.exe 84 PID 4832 wrote to memory of 2968 4832 cmd.exe 84 PID 1812 wrote to memory of 3128 1812 launcher.exe 85 PID 1812 wrote to memory of 3128 1812 launcher.exe 85 PID 3128 wrote to memory of 1288 3128 cmd.exe 86 PID 3128 wrote to memory of 1288 3128 cmd.exe 86 PID 3128 wrote to memory of 1288 3128 cmd.exe 86 PID 1288 wrote to memory of 2276 1288 WzxZnsQ4n2.exe 89 PID 1288 wrote to memory of 2276 1288 WzxZnsQ4n2.exe 89 PID 1288 wrote to memory of 2276 1288 WzxZnsQ4n2.exe 89 PID 1288 wrote to memory of 2276 1288 WzxZnsQ4n2.exe 89 PID 1288 wrote to memory of 2276 1288 WzxZnsQ4n2.exe 89
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2452
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\launcher.exe"C:\Users\Admin\AppData\Local\Temp\launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData'; Add-MpPreference -ExclusionPath 'C:\ProgramData'""2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData'; Add-MpPreference -ExclusionPath 'C:\ProgramData'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\WzxZnsQ4n2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\WzxZnsQ4n2.exeC:\Users\Admin\AppData\Local\Temp\WzxZnsQ4n2.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD52131426d8a3c01e0073772820265b4bd
SHA1bac33ac453609577cccd2c6b1fb4981ff634e795
SHA2561f53511b847a01a45e3d5d48f40dce79500175275dcf9606da1ee4864099ad8a
SHA5129a24b0a26fed3730d301a4c56412f2df7a7505184ba848b9a38f21af48fd82ed549b6d56383bf119c712b663900a006e2016e04e958e40c5f529a22fb7bfb22b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82