Analysis
-
max time kernel
11s -
max time network
8s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-10-2024 01:17
Static task
static1
General
-
Target
launcher.exe
-
Size
35.9MB
-
MD5
6f144d970006586fda9cea641fb399a8
-
SHA1
95fba60a66ca038f1dcb36ab2cd20261d5ea26bc
-
SHA256
4ff60e1c1c7286005832d86970414bc4236f31bfcbe261f44ed7e0b7ce78fddd
-
SHA512
61da15b19e4d92026bf70dd3530c283c7c4d118960bb14f01c063e95f361b2921ca9065bf8902e33616f90005086b28a3c1b48abdbc839a6e3b54a8942b1e1b4
-
SSDEEP
393216:n1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfS:nMguj8Q4VfvXqFTrYF
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
gWzD7tXPah.exedescription pid process target process PID 2872 created 2708 2872 gWzD7tXPah.exe sihost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
gWzD7tXPah.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gWzD7tXPah.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
gWzD7tXPah.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gWzD7tXPah.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gWzD7tXPah.exe -
Executes dropped EXE 1 IoCs
Processes:
gWzD7tXPah.exepid process 2872 gWzD7tXPah.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\gWzD7tXPah.exe themida behavioral1/memory/2872-22-0x0000000000C50000-0x00000000010E9000-memory.dmp themida behavioral1/memory/2872-24-0x0000000000C50000-0x00000000010E9000-memory.dmp themida behavioral1/memory/2872-23-0x0000000000C50000-0x00000000010E9000-memory.dmp themida behavioral1/memory/2872-26-0x0000000000C50000-0x00000000010E9000-memory.dmp themida behavioral1/memory/2872-25-0x0000000000C50000-0x00000000010E9000-memory.dmp themida behavioral1/memory/2872-36-0x0000000000C50000-0x00000000010E9000-memory.dmp themida -
Processes:
gWzD7tXPah.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gWzD7tXPah.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
gWzD7tXPah.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gWzD7tXPah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exegWzD7tXPah.exeopenwith.exepid process 5564 powershell.exe 5564 powershell.exe 2872 gWzD7tXPah.exe 2872 gWzD7tXPah.exe 1884 openwith.exe 1884 openwith.exe 1884 openwith.exe 1884 openwith.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 5564 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
launcher.execmd.execmd.exegWzD7tXPah.exedescription pid process target process PID 5728 wrote to memory of 6036 5728 launcher.exe cmd.exe PID 5728 wrote to memory of 6036 5728 launcher.exe cmd.exe PID 6036 wrote to memory of 5564 6036 cmd.exe powershell.exe PID 6036 wrote to memory of 5564 6036 cmd.exe powershell.exe PID 5728 wrote to memory of 1616 5728 launcher.exe cmd.exe PID 5728 wrote to memory of 1616 5728 launcher.exe cmd.exe PID 1616 wrote to memory of 2872 1616 cmd.exe gWzD7tXPah.exe PID 1616 wrote to memory of 2872 1616 cmd.exe gWzD7tXPah.exe PID 1616 wrote to memory of 2872 1616 cmd.exe gWzD7tXPah.exe PID 2872 wrote to memory of 1884 2872 gWzD7tXPah.exe openwith.exe PID 2872 wrote to memory of 1884 2872 gWzD7tXPah.exe openwith.exe PID 2872 wrote to memory of 1884 2872 gWzD7tXPah.exe openwith.exe PID 2872 wrote to memory of 1884 2872 gWzD7tXPah.exe openwith.exe PID 2872 wrote to memory of 1884 2872 gWzD7tXPah.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2708
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\launcher.exe"C:\Users\Admin\AppData\Local\Temp\launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5728 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData'; Add-MpPreference -ExclusionPath 'C:\ProgramData'""2⤵
- Suspicious use of WriteProcessMemory
PID:6036 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData'; Add-MpPreference -ExclusionPath 'C:\ProgramData'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\gWzD7tXPah.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\gWzD7tXPah.exeC:\Users\Admin\AppData\Local\Temp\gWzD7tXPah.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.4MB
MD52131426d8a3c01e0073772820265b4bd
SHA1bac33ac453609577cccd2c6b1fb4981ff634e795
SHA2561f53511b847a01a45e3d5d48f40dce79500175275dcf9606da1ee4864099ad8a
SHA5129a24b0a26fed3730d301a4c56412f2df7a7505184ba848b9a38f21af48fd82ed549b6d56383bf119c712b663900a006e2016e04e958e40c5f529a22fb7bfb22b