Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 01:28

General

  • Target

    406a4764d296c18cb477a8c3d1ae1a585207e701239533c01ecb4988ef8809a0.msi

  • Size

    2.5MB

  • MD5

    e0808992ec58411df693995c7edae88c

  • SHA1

    00e02a807c815debbdfec793f785aaa4b7d1609e

  • SHA256

    406a4764d296c18cb477a8c3d1ae1a585207e701239533c01ecb4988ef8809a0

  • SHA512

    bf2a3eb0fbba84cfab2e04250a888a0bfbdac53d632ca77bbad23908eb93ec8a97bf14c41773276e47f7c202930153e29ce2fbd6f4600dd27da39ef6b2511ed2

  • SSDEEP

    49152:ZiSoOl+YyNuCClJkqr6zeM4I/157fW8KvK18hZ6/MJ5:Zt7+YJCCvkP4Id59KvKiZCMf

Malware Config

Extracted

Family

rhadamanthys

C2

https://193.201.9.187:2049/702b68a7ca7f5b9/kep2tv4g.ckevt

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 18 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2608
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3932
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\406a4764d296c18cb477a8c3d1ae1a585207e701239533c01ecb4988ef8809a0.msi
      1⤵
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3244
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
          PID:372
        • C:\Users\Admin\AppData\Local\Eponychium\ManyCam.exe
          "C:\Users\Admin\AppData\Local\Eponychium\ManyCam.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\Windows\system32\pcaui.exe
            "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Eponychium\ManyCam.exe"
            3⤵
              PID:4016
            • C:\Users\Admin\AppData\Roaming\browserservice_op5\ManyCam.exe
              C:\Users\Admin\AppData\Roaming\browserservice_op5\ManyCam.exe
              3⤵
              • Suspicious use of SetThreadContext
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:4304
              • C:\Windows\system32\pcaui.exe
                "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Roaming\browserservice_op5\ManyCam.exe"
                4⤵
                  PID:2064
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\SysWOW64\cmd.exe
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of WriteProcessMemory
                  PID:3828
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    5⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:5064
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Checks SCSI registry key(s)
            • Suspicious use of AdjustPrivilegeToken
            PID:1412

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e57e1c6.rbs

            Filesize

            9KB

            MD5

            9cae235b383f1d99edcb98e4b3f2c467

            SHA1

            07df35a5935c51e0b34679a50f0fdcf903ad4e78

            SHA256

            801045360122fb6f27bc0e7231a1669005bb8b2879683d89e6432ea0bf78f655

            SHA512

            c1bc970afe472b51c4dcb10609d6dc1935f89eebf8bf49f59fc4298c9c2e495b1b0c2d905a6e39ceba5e2657aaaeb31a67f4d17821f7a7c6d6b8fd707b44f585

          • C:\Users\Admin\AppData\Local\Eponychium\ManyCam.exe

            Filesize

            1.7MB

            MD5

            ba699791249c311883baa8ce3432703b

            SHA1

            f8734601f9397cb5ebb8872af03f5b0639c2eac6

            SHA256

            7c4eb51a737a81c163f95b50ec54518b82fcf91389d0560e855f3e26cec07282

            SHA512

            6a0386424c61fbf525625ebe53bb2193accd51c2be9a2527fd567d0a6e112b0d1a047d8f7266d706b726e9c41ea77496e1ede186a5e59f5311eeea829a302325

          • C:\Users\Admin\AppData\Local\Eponychium\cxcore099.dll

            Filesize

            908KB

            MD5

            286284d4ae1c67d0d5666b1417dcd575

            SHA1

            8b8a32577051823b003c78c86054874491e9ecfa

            SHA256

            37d9a8057d58b043ad037e9905797c215cd0832d48a29731c1687b23447ce298

            SHA512

            2efc47a8e104baa13e19bee3b3b3364da09cea80601bc87492de348f1c8d61008002540ba8f0df99b2d20e333d09ea8e097a87c97e91910d7d592d11a953917a

          • C:\Users\Admin\AppData\Local\Eponychium\cximagecrt.dll

            Filesize

            487KB

            MD5

            c36f6e088c6457a43adb7edcd17803f3

            SHA1

            b25b9fb4c10b8421c8762c7e7b3747113d5702de

            SHA256

            8e1243454a29998cc7dc89caecfadc0d29e00e5776a8b5777633238b8cd66f72

            SHA512

            87cad4c3059bd7de02338922cf14e515af5cad663d473b19dd66a4c8befc8bce61c9c2b5a14671bc71951fdff345e4ca7a799250d622e2c9236ec03d74d4fe4e

          • C:\Users\Admin\AppData\Local\Eponychium\gxfiogr

            Filesize

            51KB

            MD5

            b590c33dd2a4c8ddedda46028181a405

            SHA1

            b0949a3396d84b8e4dca5d5026eb3b6c0679f7e3

            SHA256

            862aadcb096647394a5f6f5e646bf57b52567180505b6026e59539f6ded1eaa8

            SHA512

            e72b33ca405b551532a855a74f99aab1850756cbaefb9421d6e480e719b6ceead1d728dbc786d76d91532f0bbdcc241039dac35479bf90f7d2d665c6ab9f8da7

          • C:\Users\Admin\AppData\Local\Eponychium\highgui099.dll

            Filesize

            388KB

            MD5

            a354c42fcb37a50ecad8dde250f6119e

            SHA1

            0eb4ad5e90d28a4a8553d82cec53072279af1961

            SHA256

            89db6973f4ec5859792bcd8a50cd10db6b847613f2cea5adef740eec141673b2

            SHA512

            981c82f6334961c54c80009b14a0c2cd48067baf6d502560d508be86f5185374a422609c7fdc9a2cde9b98a7061efab7fd9b1f4f421436a9112833122bc35059

          • C:\Users\Admin\AppData\Local\Temp\91378e1d

            Filesize

            1.1MB

            MD5

            c853b92ba4c045d8b1745109159ad815

            SHA1

            2a0761e234e58930e54807ecce8198a862bf35c6

            SHA256

            03e774dc5c5294acc49b5d8ae3587928e79daf2901f983c9ccf5ca3054b42092

            SHA512

            69c6f950342cf0238ccbe72ef87a5d03f6aded7cc6410a07889c0b772c64adcdf6c8d2c3bbe5d58f7d1175f38f3baa84b9ac453d01551ab9fd45e10bfa32ab1e

          • C:\Users\Admin\AppData\Roaming\browserservice_op5\CrashRpt.dll

            Filesize

            121KB

            MD5

            b2d1f5e4a1f0e8d85f0a8aeb7b8148c7

            SHA1

            871078213fcc0ce143f518bd69caa3156b385415

            SHA256

            c28e0aec124902e948c554436c0ebbebba9fc91c906ce2cd887fada0c64e3386

            SHA512

            1f6d97e02cd684cf4f4554b0e819196bd2811e19b964a680332268bcbb6dee0e17b2b35b6e66f0fe5622dffb0a734f39f8e49637a38e4fe7f10d3b5182b30260

          • C:\Users\Admin\AppData\Roaming\browserservice_op5\cv099.dll

            Filesize

            664KB

            MD5

            2a8b33fee2f84490d52a3a7c75254971

            SHA1

            16ce2b1632a17949b92ce32a6211296fee431dca

            SHA256

            faff6a0745e1720413a028f77583fff013c3f4682756dc717a0549f1be3fefc2

            SHA512

            8daf104582547d6b3a6d8698836e279d88ad9a870e9fdd66c319ecada3757a3997f411976461ed30a5d24436baa7504355b49d4acec2f7cdfe10e1e392e0f7fb

          • C:\Users\Admin\AppData\Roaming\browserservice_op5\dbghelp.dll

            Filesize

            478KB

            MD5

            aa1594596fa19609555e317d9b64be6a

            SHA1

            924b08d85b537be52142965c3ad33c01b457ea83

            SHA256

            5139413ea54dee9ec4f13b193d88ccae9adb8f0d8c1e2ba1aee460d8a0d5bb79

            SHA512

            759209846039d1efb2f6ddf3501f1f868989e81752bb7d617afd9fd4238c52162167b1a1732ec81bdfce469856c78439cc7c8d173b1f48de499dfee725b192dc

          • C:\Users\Admin\AppData\Roaming\browserservice_op5\rsjddfw

            Filesize

            896KB

            MD5

            666447d9f86fa84149f374c0f1eb2f90

            SHA1

            9eb18eb892756e48428767d11435750ca458c9fb

            SHA256

            a25f6e74e4742ec3837ba08b63b89b05e66cd8b00e2c209b2adc9242cd8e7011

            SHA512

            dd78afe71ad80ac8788f8aed81d3538c904da76fa62f9fecb6c54bee545e6e7816ff30dd6e2fcc1999508a62c327afcbf8cf586830104abe5fb6b18ac1a87fff

          • C:\Windows\Installer\e57e1c5.msi

            Filesize

            2.5MB

            MD5

            e0808992ec58411df693995c7edae88c

            SHA1

            00e02a807c815debbdfec793f785aaa4b7d1609e

            SHA256

            406a4764d296c18cb477a8c3d1ae1a585207e701239533c01ecb4988ef8809a0

            SHA512

            bf2a3eb0fbba84cfab2e04250a888a0bfbdac53d632ca77bbad23908eb93ec8a97bf14c41773276e47f7c202930153e29ce2fbd6f4600dd27da39ef6b2511ed2

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            24.1MB

            MD5

            4fbecada29f31ab3ca2eb77e5901b50d

            SHA1

            4975b588a5f22b595cae9d0b137cdf383ed1bcf9

            SHA256

            f98cc93b1c3d3ae462e66a42ae489fee040668f5a66272ce029c635a095377e7

            SHA512

            12ba950357f8afe3e9e9866bcff42f6fc6fee4be515f3c27049718847ed331e602175413c49086332c31ae3f11f244f0350a8a1431e980dae3284f721985e941

          • \??\Volume{ff55ba41-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{663902a1-6dca-46d6-b86c-04cd2b62b63c}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            9b536db816cc96e989ce0a8faa351aaa

            SHA1

            03ecaa7281d738aab0dff73a06b9b2ad6404b4b3

            SHA256

            0ff3bf531fe5c91b9974b0df2eb424a03c0c96778c2b1e1aac78c4decde8eead

            SHA512

            e21149cfe1b288463852ee630fbbf740ec230253273a432d14052d608dd982196a9dff5e7a46671d2c9eba3f303e9ae207c19bc1c261572dda32bfca9ede2f7b

          • memory/1880-46-0x0000000001BA0000-0x0000000001C4D000-memory.dmp

            Filesize

            692KB

          • memory/1880-56-0x0000000074FE0000-0x000000007515B000-memory.dmp

            Filesize

            1.5MB

          • memory/1880-49-0x0000000001C50000-0x0000000001D3C000-memory.dmp

            Filesize

            944KB

          • memory/1880-52-0x0000000001D40000-0x0000000001DA2000-memory.dmp

            Filesize

            392KB

          • memory/1880-57-0x00007FF9A5B70000-0x00007FF9A5D65000-memory.dmp

            Filesize

            2.0MB

          • memory/3828-100-0x00007FF9A5B70000-0x00007FF9A5D65000-memory.dmp

            Filesize

            2.0MB

          • memory/3828-101-0x0000000074FE0000-0x000000007515B000-memory.dmp

            Filesize

            1.5MB

          • memory/3932-113-0x0000000000FD0000-0x0000000000FD9000-memory.dmp

            Filesize

            36KB

          • memory/3932-117-0x0000000002E80000-0x0000000003280000-memory.dmp

            Filesize

            4.0MB

          • memory/3932-120-0x0000000077AE0000-0x0000000077CF5000-memory.dmp

            Filesize

            2.1MB

          • memory/3932-118-0x00007FF9A5B70000-0x00007FF9A5D65000-memory.dmp

            Filesize

            2.0MB

          • memory/4304-83-0x0000000001700000-0x00000000017EC000-memory.dmp

            Filesize

            944KB

          • memory/4304-86-0x00000000017F0000-0x000000000189D000-memory.dmp

            Filesize

            692KB

          • memory/4304-93-0x0000000074FE0000-0x000000007515B000-memory.dmp

            Filesize

            1.5MB

          • memory/4304-94-0x00007FF9A5B70000-0x00007FF9A5D65000-memory.dmp

            Filesize

            2.0MB

          • memory/4304-97-0x0000000074FE0000-0x000000007515B000-memory.dmp

            Filesize

            1.5MB

          • memory/4304-89-0x0000000000B90000-0x0000000000BF2000-memory.dmp

            Filesize

            392KB

          • memory/5064-105-0x00000000009A0000-0x0000000000A20000-memory.dmp

            Filesize

            512KB

          • memory/5064-109-0x00000000041C0000-0x00000000045C0000-memory.dmp

            Filesize

            4.0MB

          • memory/5064-112-0x0000000077AE0000-0x0000000077CF5000-memory.dmp

            Filesize

            2.1MB

          • memory/5064-108-0x00000000041C0000-0x00000000045C0000-memory.dmp

            Filesize

            4.0MB

          • memory/5064-107-0x00000000009A0000-0x0000000000A20000-memory.dmp

            Filesize

            512KB

          • memory/5064-116-0x00000000009A0000-0x0000000000A20000-memory.dmp

            Filesize

            512KB

          • memory/5064-104-0x00007FF9A5B70000-0x00007FF9A5D65000-memory.dmp

            Filesize

            2.0MB

          • memory/5064-103-0x00000000009A0000-0x0000000000A20000-memory.dmp

            Filesize

            512KB