Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2024 01:15

General

  • Target

    741cee2c6f6f8ee8a54923fa2a0c88085cede35bdc2e95b1b9f1800e894e6c19.exe

  • Size

    2.2MB

  • MD5

    8837df25aabc4fad85e851aca192f714

  • SHA1

    c4fbd38356b7ee16eaf21deb83170bbcb0fe566a

  • SHA256

    741cee2c6f6f8ee8a54923fa2a0c88085cede35bdc2e95b1b9f1800e894e6c19

  • SHA512

    93f712ae3ca726b090df270feb1421ea98778260b7fe309e06ac3887b396d3dc8ab41655ec7d15a57cac8b467cca0395a52ef965765a26c9597f6512fdad88e2

  • SSDEEP

    49152:fIGHiuBfswUwl+GdRI2UET1SUvj0Ug6j9iuXWvpAqahtX8+34+vSVHstzn+qpEjs:fNCuBfZ4GdfUaj0UgM5WviXtT34+vBJV

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2764
      • C:\Windows\system32\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1304
    • C:\Users\Admin\AppData\Local\Temp\741cee2c6f6f8ee8a54923fa2a0c88085cede35bdc2e95b1b9f1800e894e6c19.exe
      "C:\Users\Admin\AppData\Local\Temp\741cee2c6f6f8ee8a54923fa2a0c88085cede35bdc2e95b1b9f1800e894e6c19.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\Admin\AppData/Roaming/kiE0.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{08884CCC-4400-4CC8-8440-400CC8884400}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3356
      • C:\Windows\system32\regsvr32.exe
        "regsvr32" /s /i:INSTALL C:\Users\Admin\AppData/Roaming/kiE0.ini
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1188
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4116,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4448 /prefetch:8
      1⤵
        PID:2256
      • C:\Windows\system32\regsvr32.EXE
        C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData/Roaming/kiE0.ini
        1⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:532
      • C:\Windows\system32\regsvr32.EXE
        C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData/Roaming/kiE0.ini
        1⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:4856

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.EXE.log

        Filesize

        434B

        MD5

        55cd82f1f37f86716011f6271ae32817

        SHA1

        c9206205ef4c787cf9fa55456dbfd29de3d685b5

        SHA256

        c66fe4787c6333e4e0759b3f041fea3c5abff4cebe577679308b5d09e284bc4f

        SHA512

        aa2a89420e046f0415bfbd4f88ba337c0b667da3a45c7968e80d463adbc583921cc32127d9b3a709d7040e78c82a913ee00f6195487c2020b6f178a6629d9a8c

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zvcagi1i.iiy.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\kiE0.ini

        Filesize

        1.0MB

        MD5

        60a55b1d8e739216cadd3e31d7412f03

        SHA1

        8b5c284796a1efa1df8a3eddd27070d374e1cc54

        SHA256

        be86e0357748f3b4fa166342f284800a83c955c2c8b197475c2450613a6eed67

        SHA512

        c06cb2b86f7a9de5243f4395fb40fa88a7669f3e427d427afb95801de447beb8f616847890ae12cfc6060ec7215ceb370cd61b5cf0395eab81312121060dc7ab

      • memory/532-58-0x000000001B220000-0x000000001B620000-memory.dmp

        Filesize

        4.0MB

      • memory/532-56-0x000000001B070000-0x000000001B080000-memory.dmp

        Filesize

        64KB

      • memory/1188-33-0x000000001B820000-0x000000001BC20000-memory.dmp

        Filesize

        4.0MB

      • memory/1188-37-0x00007FFBD9CF0000-0x00007FFBD9DAE000-memory.dmp

        Filesize

        760KB

      • memory/1188-47-0x00007FFBBCB60000-0x00007FFBBD621000-memory.dmp

        Filesize

        10.8MB

      • memory/1188-32-0x0000000002C40000-0x0000000002C50000-memory.dmp

        Filesize

        64KB

      • memory/1188-25-0x000000001B550000-0x000000001B600000-memory.dmp

        Filesize

        704KB

      • memory/1188-26-0x00007FFBBCB60000-0x00007FFBBD621000-memory.dmp

        Filesize

        10.8MB

      • memory/1188-27-0x00007FFBBCB60000-0x00007FFBBD621000-memory.dmp

        Filesize

        10.8MB

      • memory/1188-28-0x00007FFBBCB60000-0x00007FFBBD621000-memory.dmp

        Filesize

        10.8MB

      • memory/1188-29-0x00007FFBBCB60000-0x00007FFBBD621000-memory.dmp

        Filesize

        10.8MB

      • memory/1188-30-0x00007FFBBCB60000-0x00007FFBBD621000-memory.dmp

        Filesize

        10.8MB

      • memory/1188-31-0x0000000002C30000-0x0000000002C38000-memory.dmp

        Filesize

        32KB

      • memory/1188-34-0x000000001B820000-0x000000001BC20000-memory.dmp

        Filesize

        4.0MB

      • memory/1188-35-0x00007FFBBCB60000-0x00007FFBBD621000-memory.dmp

        Filesize

        10.8MB

      • memory/1188-36-0x00007FFBDB7B0000-0x00007FFBDB9A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1188-38-0x00007FFBD8ED0000-0x00007FFBD9199000-memory.dmp

        Filesize

        2.8MB

      • memory/1304-46-0x00007FFBD9CF0000-0x00007FFBD9DAE000-memory.dmp

        Filesize

        760KB

      • memory/1304-39-0x0000020DF1300000-0x0000020DF130A000-memory.dmp

        Filesize

        40KB

      • memory/1304-44-0x0000020DF2D70000-0x0000020DF3170000-memory.dmp

        Filesize

        4.0MB

      • memory/1304-45-0x00007FFBDB7B0000-0x00007FFBDB9A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1304-48-0x00007FFBD8ED0000-0x00007FFBD9199000-memory.dmp

        Filesize

        2.8MB

      • memory/3356-14-0x00007FFBBD000000-0x00007FFBBDAC1000-memory.dmp

        Filesize

        10.8MB

      • memory/3356-19-0x00007FFBBD000000-0x00007FFBBDAC1000-memory.dmp

        Filesize

        10.8MB

      • memory/3356-15-0x00007FFBBD000000-0x00007FFBBDAC1000-memory.dmp

        Filesize

        10.8MB

      • memory/3356-1-0x00007FFBBD003000-0x00007FFBBD005000-memory.dmp

        Filesize

        8KB

      • memory/3356-13-0x00007FFBBD000000-0x00007FFBBDAC1000-memory.dmp

        Filesize

        10.8MB

      • memory/3356-12-0x00007FFBBD000000-0x00007FFBBDAC1000-memory.dmp

        Filesize

        10.8MB

      • memory/3356-2-0x000001E12C2E0000-0x000001E12C302000-memory.dmp

        Filesize

        136KB

      • memory/4856-51-0x00007FF7BBDE0000-0x00007FF7BBFC2000-memory.dmp

        Filesize

        1.9MB

      • memory/4856-63-0x000000001C020000-0x000000001C030000-memory.dmp

        Filesize

        64KB

      • memory/4856-65-0x000000001BA50000-0x000000001BE50000-memory.dmp

        Filesize

        4.0MB