Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 08:34
Behavioral task
behavioral1
Sample
ram.exe
Resource
win10v2004-20241007-en
General
-
Target
ram.exe
-
Size
9.4MB
-
MD5
ba0767946d9cac95fd727d7076c7fec1
-
SHA1
31c713eabc90f61b44703a8d30e7ced6e2941f23
-
SHA256
2853a61188b4446be57543858adcc704e8534326d4d84ac44a60743b1a44cbfe
-
SHA512
cd9398e8319068d44149fad6329c788d83ff400be30d29b89f0151aabfd9b340c0beb6f2773f2530a098e0cd304990f919f7c84536d719f46650fe99766ef048
-
SSDEEP
196608:1LX8vpjby5OkoeYXp0leGQ7WWb+6otLwGwP55ar9kCmlwe1Xf/Ohz2+lLqKj:1Ivxy58eYXm7Q7WWb+5L+5Mr9k3d1XfN
Malware Config
Extracted
rhadamanthys
http://91.103.140.200:9078/3936a074a2f65761a5eb8/6fmfpmi7.fwf4p
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/3388-0-0x0000000000430000-0x0000000000DAC000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3528 created 2500 3528 explorer.exe 42 -
Deletes itself 1 IoCs
pid Process 3232 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3388 set thread context of 3232 3388 ram.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ram.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3388 ram.exe 3388 ram.exe 3232 cmd.exe 3232 cmd.exe 3528 explorer.exe 3528 explorer.exe 3004 openwith.exe 3004 openwith.exe 3004 openwith.exe 3004 openwith.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3388 ram.exe 3232 cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3388 wrote to memory of 3232 3388 ram.exe 86 PID 3388 wrote to memory of 3232 3388 ram.exe 86 PID 3388 wrote to memory of 3232 3388 ram.exe 86 PID 3388 wrote to memory of 3232 3388 ram.exe 86 PID 3232 wrote to memory of 3528 3232 cmd.exe 100 PID 3232 wrote to memory of 3528 3232 cmd.exe 100 PID 3232 wrote to memory of 3528 3232 cmd.exe 100 PID 3232 wrote to memory of 3528 3232 cmd.exe 100 PID 3528 wrote to memory of 3004 3528 explorer.exe 102 PID 3528 wrote to memory of 3004 3528 explorer.exe 102 PID 3528 wrote to memory of 3004 3528 explorer.exe 102 PID 3528 wrote to memory of 3004 3528 explorer.exe 102 PID 3528 wrote to memory of 3004 3528 explorer.exe 102
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2500
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\ram.exe"C:\Users\Admin\AppData\Local\Temp\ram.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56230e2981dc0f08903655a52ee22354d
SHA1ab0ead346e918b698a75abf8eeab5a841cdb58b0
SHA2562ad7efaee2f86810f85a38db38272400735b29d5ebe4ebf47ff5847901b899e3
SHA512b25fc9220d40946e14c6a5d59fec16f72f1db5d84e8963fbf9bd331a230c78fc9cae3757d8f2521ab8ee71e0fbb6ea6c9e19aa7e0d81a63977fd05f844d657d3