Analysis
-
max time kernel
17s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
Setup.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Setup.zip
Resource
win10v2004-20241007-en
General
-
Target
Setup.zip
-
Size
74.8MB
-
MD5
e874d098f773b601430b0f76a0148eab
-
SHA1
4873d7d73500323342a3cc0a94107ab52585ffd7
-
SHA256
f4e3d73eac0f751a9d519e5a8eaff679837413c069a8f0a614d2792d899e44c3
-
SHA512
ebe031951937cca71f24788399a22a14d800727161c9d52cc70e6104faa24e836ecc3a5951afabeb2c2c9ce2aa1fa15917ef7f43449b3682288cebe4011aa221
-
SSDEEP
1572864:HdHhu/c91wW7MJh9+XigReAs1g/HvYEyGLKPa0iHDP0:HxgS1nCh9+yydveGLmiHL0
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/rt8egk5u.wu267
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1992 created 1184 1992 RegAsm.exe 21 -
Executes dropped EXE 2 IoCs
pid Process 2180 setup.exe 2668 setup.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2180 set thread context of 1992 2180 setup.exe 33 PID 2668 set thread context of 1288 2668 setup.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2412 7zFM.exe 1992 RegAsm.exe 1992 RegAsm.exe 2412 7zFM.exe 2740 dialer.exe 2740 dialer.exe 2740 dialer.exe 2740 dialer.exe 2412 7zFM.exe 2412 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2412 7zFM.exe Token: 35 2412 7zFM.exe Token: SeSecurityPrivilege 2412 7zFM.exe Token: SeSecurityPrivilege 2412 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2412 7zFM.exe 2412 7zFM.exe 2412 7zFM.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2180 2412 7zFM.exe 31 PID 2412 wrote to memory of 2180 2412 7zFM.exe 31 PID 2412 wrote to memory of 2180 2412 7zFM.exe 31 PID 2412 wrote to memory of 2180 2412 7zFM.exe 31 PID 2412 wrote to memory of 2180 2412 7zFM.exe 31 PID 2412 wrote to memory of 2180 2412 7zFM.exe 31 PID 2412 wrote to memory of 2180 2412 7zFM.exe 31 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 2180 wrote to memory of 1992 2180 setup.exe 33 PID 1992 wrote to memory of 2740 1992 RegAsm.exe 34 PID 1992 wrote to memory of 2740 1992 RegAsm.exe 34 PID 1992 wrote to memory of 2740 1992 RegAsm.exe 34 PID 1992 wrote to memory of 2740 1992 RegAsm.exe 34 PID 1992 wrote to memory of 2740 1992 RegAsm.exe 34 PID 1992 wrote to memory of 2740 1992 RegAsm.exe 34 PID 2412 wrote to memory of 2668 2412 7zFM.exe 35 PID 2412 wrote to memory of 2668 2412 7zFM.exe 35 PID 2412 wrote to memory of 2668 2412 7zFM.exe 35 PID 2412 wrote to memory of 2668 2412 7zFM.exe 35 PID 2412 wrote to memory of 2668 2412 7zFM.exe 35 PID 2412 wrote to memory of 2668 2412 7zFM.exe 35 PID 2412 wrote to memory of 2668 2412 7zFM.exe 35 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37 PID 2668 wrote to memory of 1288 2668 setup.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Setup.zip"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\7zOC69477F6\setup.exe"C:\Users\Admin\AppData\Local\Temp\7zOC69477F6\setup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC690C807\setup.exe"C:\Users\Admin\AppData\Local\Temp\7zOC690C807\setup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1288
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5afb79f1d95495834c928ccffcf8f4e5e
SHA1c0ffe0908b25d5de8428a198ef0d1e6c475c99c0
SHA256b0f1b0fdf69a3465c8fa29905a4ae69e4d28d9e916619f6034787a9d684db796
SHA51255f566cf6624e7f542875cdb7565f4d12b8b05b6a7d6e31a02de83a212cbde9de33c0d41a80dba5397a77a326919306f6edfd884ae8b7f277a855703b672ecfa