Analysis
-
max time kernel
92s -
max time network
202s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-10-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
msn.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
msn.exe
Resource
win11-20241007-en
General
-
Target
msn.exe
-
Size
5.5MB
-
MD5
537915708fe4e81e18e99d5104b353ed
-
SHA1
128ddb7096e5b748c72dc13f55b593d8d20aa3fb
-
SHA256
6dc7275f2143d1de0ca66c487b0f2ebff3d4c6a79684f03b9619bf23143ecf74
-
SHA512
9ceaaf7aa5889be9f5606646403133782d004b9d78ef83d7007dfce67c0f4f688d7931aebc74f1fc30aac2f1dd6281bdadfb52bc3ea46aca33b334adb4067ae2
-
SSDEEP
49152:ERUl697ngPTrho9J8kgdjbHNZ5PP/Re5m3mxVN6KEp0v7J7k66ZRkQTXw+sljVop:uAXqnhON8m3mzNHTdw6YSX+sleu5y
Malware Config
Extracted
rhadamanthys
https://185.196.11.237:9697/f002171ab05c7/73434jqg.jxviu
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
explorer.exedescription pid Process procid_target PID 5048 created 2904 5048 explorer.exe 49 -
Executes dropped EXE 1 IoCs
Processes:
msn.exepid Process 2672 msn.exe -
Loads dropped DLL 4 IoCs
Processes:
msn.exepid Process 2672 msn.exe 2672 msn.exe 2672 msn.exe 2672 msn.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msn.exedescription pid Process procid_target PID 2672 set thread context of 1392 2672 msn.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
msn.execmd.exeexplorer.exeopenwith.exemsn.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msn.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
msn.exemsn.execmd.exeexplorer.exeopenwith.exepid Process 2708 msn.exe 2672 msn.exe 2672 msn.exe 1392 cmd.exe 1392 cmd.exe 5048 explorer.exe 5048 explorer.exe 3140 openwith.exe 3140 openwith.exe 3140 openwith.exe 3140 openwith.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
msn.execmd.exepid Process 2672 msn.exe 1392 cmd.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
msn.exemsn.execmd.exeexplorer.exedescription pid Process procid_target PID 2708 wrote to memory of 2672 2708 msn.exe 77 PID 2708 wrote to memory of 2672 2708 msn.exe 77 PID 2708 wrote to memory of 2672 2708 msn.exe 77 PID 2672 wrote to memory of 1392 2672 msn.exe 78 PID 2672 wrote to memory of 1392 2672 msn.exe 78 PID 2672 wrote to memory of 1392 2672 msn.exe 78 PID 2672 wrote to memory of 1392 2672 msn.exe 78 PID 1392 wrote to memory of 5048 1392 cmd.exe 80 PID 1392 wrote to memory of 5048 1392 cmd.exe 80 PID 1392 wrote to memory of 5048 1392 cmd.exe 80 PID 1392 wrote to memory of 5048 1392 cmd.exe 80 PID 5048 wrote to memory of 3140 5048 explorer.exe 81 PID 5048 wrote to memory of 3140 5048 explorer.exe 81 PID 5048 wrote to memory of 3140 5048 explorer.exe 81 PID 5048 wrote to memory of 3140 5048 explorer.exe 81 PID 5048 wrote to memory of 3140 5048 explorer.exe 81
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2904
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\msn.exe"C:\Users\Admin\AppData\Local\Temp\msn.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\ProgramData\downloaddemo_test\msn.exeC:\ProgramData\downloaddemo_test\msn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5048
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD50180c5a2f5b002e8755c60a3786c4975
SHA164bcbe91e3dd1dcd21709cbf189c032bb47501a2
SHA2566eff0ca0c63ce6c712dc5f1f892b68d43894d13b681f75ab585b6c611dc16476
SHA5128dbdfef7906be474ecadb7848042f3736483ef9b4ea05f4f60a3ae049a99bf1a8bcd57507b334e229c972784b6355b9dcf647c5992e56518a35d9ff0d639e1ff
-
Filesize
331KB
MD554ee6a204238313dc6aca21c7e036c17
SHA1531fd1c18e2e4984c72334eb56af78a1048da6c7
SHA2560abf68b8409046a1555d48ac506fd26fda4b29d8d61e07bc412a4e21de2782fd
SHA51219a2e371712aab54b75059d39a9aea6e7de2eb69b3ffc0332e60df617ebb9de61571b2ca722cddb75c9cbc79f8200d03f73539f21f69366eae3c7641731c7820
-
Filesize
88KB
MD506a62106f0d01ed3a971415b57366a8b
SHA19d905a38a4f53961a3828b2f759062b428dd25a9
SHA2566c5fb0f5e586cac39cf4e06e918dad243053cb103a82afeed32d92732834cc93
SHA5124565dfe2e72a4a08d2a66722cb3ab736a2fa45f0c0ad368805d778f57f3bade2c82b2f8eab3006e4258cf5be84e96a46233e68be4d14fec50382cd94c13a4d74
-
Filesize
784KB
MD5f1f8d156bbdd5945a4f933ac7fa7cc41
SHA1e581235e9f1a3a8a63b8a470eaed882bc93b9085
SHA256344ac8e5debb1a496c3648f941801cdc6ffdfcc7eef8ed38e62270a2e20b1c3a
SHA51286d799af3be251edecf6a552f473b94a0ba2d738b7b5f4a84c31bb34db4ea458f5e50090370bdf82f945e684dd5d66b88ebe3c902305bb0a435aca1331cb4ad9
-
Filesize
5.5MB
MD5537915708fe4e81e18e99d5104b353ed
SHA1128ddb7096e5b748c72dc13f55b593d8d20aa3fb
SHA2566dc7275f2143d1de0ca66c487b0f2ebff3d4c6a79684f03b9619bf23143ecf74
SHA5129ceaaf7aa5889be9f5606646403133782d004b9d78ef83d7007dfce67c0f4f688d7931aebc74f1fc30aac2f1dd6281bdadfb52bc3ea46aca33b334adb4067ae2
-
Filesize
991KB
MD5deaa38a71c85d2f9d4ba71343d1603da
SHA1bdbb492512cee480794e761d1bea718db14013ec
SHA2561dc120f34b294e964eee949c4d1ebd9c271715d46b38ae082fec2f1d505e8d65
SHA51287b152b642a020e07ad46e9ed5b4a462c12cf0918f82025c230f662eddb3bf4b2d3aa15ca770970beae5988dd5d5d9b7bcaf7a77c6d2f3acf6d12826f3a9ead7
-
Filesize
1.1MB
MD5a88065a131d9fc31922d788f7a996e89
SHA1534f1bcad5424d2c09c92e933fb58916348dc0d1
SHA256c97986cf86da26260e8dc290f86e032fe5c0516263c0082b35f7bd103bf15d07
SHA512344a0f9373c199dacf9d2f2ca0b8fab9e4826c2b6d8e0c4900ef55e99cfd1deec95306a78137877c6f1727569963f014ff7d887e31a53e3d2d8342e23e7f134f