Analysis

  • max time kernel
    142s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • submitted
    18-10-2024 10:06

General

  • Target

    406a4764d296c18cb477a8c3d1ae1a585207e701239533c01ecb4988ef8809a0.msi

  • Size

    2.5MB

  • MD5

    e0808992ec58411df693995c7edae88c

  • SHA1

    00e02a807c815debbdfec793f785aaa4b7d1609e

  • SHA256

    406a4764d296c18cb477a8c3d1ae1a585207e701239533c01ecb4988ef8809a0

  • SHA512

    bf2a3eb0fbba84cfab2e04250a888a0bfbdac53d632ca77bbad23908eb93ec8a97bf14c41773276e47f7c202930153e29ce2fbd6f4600dd27da39ef6b2511ed2

  • SSDEEP

    49152:ZiSoOl+YyNuCClJkqr6zeM4I/157fW8KvK18hZ6/MJ5:Zt7+YJCCvkP4Id59KvKiZCMf

Malware Config

Extracted

Family

rhadamanthys

C2

https://193.201.9.187:2049/702b68a7ca7f5b9/kep2tv4g.ckevt

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 18 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2656
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5016
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\406a4764d296c18cb477a8c3d1ae1a585207e701239533c01ecb4988ef8809a0.msi
      1⤵
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1244
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
          PID:3228
        • C:\Users\Admin\AppData\Local\Eponychium\ManyCam.exe
          "C:\Users\Admin\AppData\Local\Eponychium\ManyCam.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Windows\system32\pcaui.exe
            "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Eponychium\ManyCam.exe"
            3⤵
              PID:3276
            • C:\Users\Admin\AppData\Roaming\browserservice_op5\ManyCam.exe
              C:\Users\Admin\AppData\Roaming\browserservice_op5\ManyCam.exe
              3⤵
              • Suspicious use of SetThreadContext
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:4612
              • C:\Windows\system32\pcaui.exe
                "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Roaming\browserservice_op5\ManyCam.exe"
                4⤵
                  PID:1156
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\SysWOW64\cmd.exe
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of WriteProcessMemory
                  PID:4340
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    5⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:4020
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Checks SCSI registry key(s)
            • Suspicious use of AdjustPrivilegeToken
            PID:704

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e57f0ba.rbs

            Filesize

            9KB

            MD5

            81e2f57d2ef8118a505771508f1c031a

            SHA1

            5cd2f55b53b0cdc4207cb78f2efc3e6c1960bd93

            SHA256

            814cd5a29dc7fdacdcb09c03282a3d1d1a4d6bdce3d76beb771149159a07dba3

            SHA512

            31694947ed7749bf4f10337ca1c735c9846c217e121dcd271959ce5f6940814a38e699bb16841fcf27913ea665252aa2b627e53d6a06ebb0b4a84ad0da2b33db

          • C:\Users\Admin\AppData\Local\Eponychium\CrashRpt.dll

            Filesize

            121KB

            MD5

            b2d1f5e4a1f0e8d85f0a8aeb7b8148c7

            SHA1

            871078213fcc0ce143f518bd69caa3156b385415

            SHA256

            c28e0aec124902e948c554436c0ebbebba9fc91c906ce2cd887fada0c64e3386

            SHA512

            1f6d97e02cd684cf4f4554b0e819196bd2811e19b964a680332268bcbb6dee0e17b2b35b6e66f0fe5622dffb0a734f39f8e49637a38e4fe7f10d3b5182b30260

          • C:\Users\Admin\AppData\Local\Eponychium\ManyCam.exe

            Filesize

            1.7MB

            MD5

            ba699791249c311883baa8ce3432703b

            SHA1

            f8734601f9397cb5ebb8872af03f5b0639c2eac6

            SHA256

            7c4eb51a737a81c163f95b50ec54518b82fcf91389d0560e855f3e26cec07282

            SHA512

            6a0386424c61fbf525625ebe53bb2193accd51c2be9a2527fd567d0a6e112b0d1a047d8f7266d706b726e9c41ea77496e1ede186a5e59f5311eeea829a302325

          • C:\Users\Admin\AppData\Local\Eponychium\cv099.dll

            Filesize

            664KB

            MD5

            2a8b33fee2f84490d52a3a7c75254971

            SHA1

            16ce2b1632a17949b92ce32a6211296fee431dca

            SHA256

            faff6a0745e1720413a028f77583fff013c3f4682756dc717a0549f1be3fefc2

            SHA512

            8daf104582547d6b3a6d8698836e279d88ad9a870e9fdd66c319ecada3757a3997f411976461ed30a5d24436baa7504355b49d4acec2f7cdfe10e1e392e0f7fb

          • C:\Users\Admin\AppData\Local\Eponychium\cxcore099.dll

            Filesize

            908KB

            MD5

            286284d4ae1c67d0d5666b1417dcd575

            SHA1

            8b8a32577051823b003c78c86054874491e9ecfa

            SHA256

            37d9a8057d58b043ad037e9905797c215cd0832d48a29731c1687b23447ce298

            SHA512

            2efc47a8e104baa13e19bee3b3b3364da09cea80601bc87492de348f1c8d61008002540ba8f0df99b2d20e333d09ea8e097a87c97e91910d7d592d11a953917a

          • C:\Users\Admin\AppData\Local\Eponychium\cximagecrt.dll

            Filesize

            487KB

            MD5

            c36f6e088c6457a43adb7edcd17803f3

            SHA1

            b25b9fb4c10b8421c8762c7e7b3747113d5702de

            SHA256

            8e1243454a29998cc7dc89caecfadc0d29e00e5776a8b5777633238b8cd66f72

            SHA512

            87cad4c3059bd7de02338922cf14e515af5cad663d473b19dd66a4c8befc8bce61c9c2b5a14671bc71951fdff345e4ca7a799250d622e2c9236ec03d74d4fe4e

          • C:\Users\Admin\AppData\Local\Eponychium\dbghelp.dll

            Filesize

            478KB

            MD5

            aa1594596fa19609555e317d9b64be6a

            SHA1

            924b08d85b537be52142965c3ad33c01b457ea83

            SHA256

            5139413ea54dee9ec4f13b193d88ccae9adb8f0d8c1e2ba1aee460d8a0d5bb79

            SHA512

            759209846039d1efb2f6ddf3501f1f868989e81752bb7d617afd9fd4238c52162167b1a1732ec81bdfce469856c78439cc7c8d173b1f48de499dfee725b192dc

          • C:\Users\Admin\AppData\Local\Eponychium\gxfiogr

            Filesize

            51KB

            MD5

            b590c33dd2a4c8ddedda46028181a405

            SHA1

            b0949a3396d84b8e4dca5d5026eb3b6c0679f7e3

            SHA256

            862aadcb096647394a5f6f5e646bf57b52567180505b6026e59539f6ded1eaa8

            SHA512

            e72b33ca405b551532a855a74f99aab1850756cbaefb9421d6e480e719b6ceead1d728dbc786d76d91532f0bbdcc241039dac35479bf90f7d2d665c6ab9f8da7

          • C:\Users\Admin\AppData\Local\Eponychium\highgui099.dll

            Filesize

            388KB

            MD5

            a354c42fcb37a50ecad8dde250f6119e

            SHA1

            0eb4ad5e90d28a4a8553d82cec53072279af1961

            SHA256

            89db6973f4ec5859792bcd8a50cd10db6b847613f2cea5adef740eec141673b2

            SHA512

            981c82f6334961c54c80009b14a0c2cd48067baf6d502560d508be86f5185374a422609c7fdc9a2cde9b98a7061efab7fd9b1f4f421436a9112833122bc35059

          • C:\Users\Admin\AppData\Local\Eponychium\rsjddfw

            Filesize

            896KB

            MD5

            666447d9f86fa84149f374c0f1eb2f90

            SHA1

            9eb18eb892756e48428767d11435750ca458c9fb

            SHA256

            a25f6e74e4742ec3837ba08b63b89b05e66cd8b00e2c209b2adc9242cd8e7011

            SHA512

            dd78afe71ad80ac8788f8aed81d3538c904da76fa62f9fecb6c54bee545e6e7816ff30dd6e2fcc1999508a62c327afcbf8cf586830104abe5fb6b18ac1a87fff

          • C:\Users\Admin\AppData\Local\Temp\b15873e0

            Filesize

            1.1MB

            MD5

            300012e9a9b98ca0dff2c6be3e842524

            SHA1

            2f71221ea35c78baa49f88b464af29ad90a10295

            SHA256

            5a6ba76b157f07f8f152c8f5bbd76dca9fcc4e40c1622f54644dae639d5f2a68

            SHA512

            fcdb28ea94e7c7cb21d1c369abb19b237969a9749e54906c23122acff5b3b57475a4c7f241efb932a0893dbdee15fd69833e14b3b8e601b14b95c81a4d420e63

          • C:\Windows\Installer\e57f0b9.msi

            Filesize

            2.5MB

            MD5

            e0808992ec58411df693995c7edae88c

            SHA1

            00e02a807c815debbdfec793f785aaa4b7d1609e

            SHA256

            406a4764d296c18cb477a8c3d1ae1a585207e701239533c01ecb4988ef8809a0

            SHA512

            bf2a3eb0fbba84cfab2e04250a888a0bfbdac53d632ca77bbad23908eb93ec8a97bf14c41773276e47f7c202930153e29ce2fbd6f4600dd27da39ef6b2511ed2

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            24.1MB

            MD5

            46c57a9ecd7e7e0b697cca1da2b34bbb

            SHA1

            78f0089fde19549ed7b289da07f7bd4e917348c3

            SHA256

            43045b7d2705912333199d88d537cbab8b8d35cc7c243998f8c05a9fdf9ab2da

            SHA512

            6e799c878d487b18bbc01ab55cbb8df490b86657394c23fc297cf716c7a03c52c98f34d023480b96e4c95a159e68a2ed7139afbd3e93c0998b1a10f63a9889c4

          • \??\Volume{ff55cfe6-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c8a850c7-8bea-4a1c-85bb-2b2dea785610}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            e8bac231baccea7ac4769494df1fff84

            SHA1

            602cd2f83a7f57ef5897f9b7de535c90e630c462

            SHA256

            b8fd821f58daf81a3f3d98c0d12b5804c7553e691b6a74622357a03186a25f16

            SHA512

            fa01e2e21d413e48df50b6ed409f021402b03bc9994ff5a80c1a9abe76254c1fb8fc84f0a9f66340deea4767c90c3298acd7239faf0ce8efd56d54318c12021b

          • memory/1908-48-0x0000000001BF0000-0x0000000001C9D000-memory.dmp

            Filesize

            692KB

          • memory/1908-51-0x0000000001CA0000-0x0000000001D8C000-memory.dmp

            Filesize

            944KB

          • memory/1908-54-0x0000000001D90000-0x0000000001DF2000-memory.dmp

            Filesize

            392KB

          • memory/1908-58-0x0000000074290000-0x000000007440B000-memory.dmp

            Filesize

            1.5MB

          • memory/1908-59-0x00007FF9F7B50000-0x00007FF9F7D45000-memory.dmp

            Filesize

            2.0MB

          • memory/4020-103-0x0000000000C30000-0x0000000000CB0000-memory.dmp

            Filesize

            512KB

          • memory/4020-112-0x0000000003F30000-0x0000000004330000-memory.dmp

            Filesize

            4.0MB

          • memory/4020-117-0x0000000000C30000-0x0000000000CB0000-memory.dmp

            Filesize

            512KB

          • memory/4020-115-0x0000000075680000-0x0000000075895000-memory.dmp

            Filesize

            2.1MB

          • memory/4020-111-0x0000000003F30000-0x0000000004330000-memory.dmp

            Filesize

            4.0MB

          • memory/4020-110-0x0000000000C30000-0x0000000000CB0000-memory.dmp

            Filesize

            512KB

          • memory/4020-105-0x0000000000C30000-0x0000000000CB0000-memory.dmp

            Filesize

            512KB

          • memory/4020-104-0x00007FF9F7B50000-0x00007FF9F7D45000-memory.dmp

            Filesize

            2.0MB

          • memory/4340-101-0x0000000074290000-0x000000007440B000-memory.dmp

            Filesize

            1.5MB

          • memory/4340-100-0x00007FF9F7B50000-0x00007FF9F7D45000-memory.dmp

            Filesize

            2.0MB

          • memory/4612-95-0x0000000074290000-0x000000007440B000-memory.dmp

            Filesize

            1.5MB

          • memory/4612-96-0x00007FF9F7B50000-0x00007FF9F7D45000-memory.dmp

            Filesize

            2.0MB

          • memory/4612-97-0x0000000074290000-0x000000007440B000-memory.dmp

            Filesize

            1.5MB

          • memory/4612-91-0x0000000001830000-0x0000000001892000-memory.dmp

            Filesize

            392KB

          • memory/4612-85-0x0000000001690000-0x000000000173D000-memory.dmp

            Filesize

            692KB

          • memory/4612-88-0x0000000001740000-0x000000000182C000-memory.dmp

            Filesize

            944KB

          • memory/5016-116-0x0000000000480000-0x0000000000489000-memory.dmp

            Filesize

            36KB

          • memory/5016-120-0x00007FF9F7B50000-0x00007FF9F7D45000-memory.dmp

            Filesize

            2.0MB

          • memory/5016-122-0x0000000075680000-0x0000000075895000-memory.dmp

            Filesize

            2.1MB

          • memory/5016-119-0x0000000002140000-0x0000000002540000-memory.dmp

            Filesize

            4.0MB