Analysis

  • max time kernel
    92s
  • max time network
    202s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-10-2024 23:43

General

  • Target

    msn.exe

  • Size

    5.5MB

  • MD5

    537915708fe4e81e18e99d5104b353ed

  • SHA1

    128ddb7096e5b748c72dc13f55b593d8d20aa3fb

  • SHA256

    6dc7275f2143d1de0ca66c487b0f2ebff3d4c6a79684f03b9619bf23143ecf74

  • SHA512

    9ceaaf7aa5889be9f5606646403133782d004b9d78ef83d7007dfce67c0f4f688d7931aebc74f1fc30aac2f1dd6281bdadfb52bc3ea46aca33b334adb4067ae2

  • SSDEEP

    49152:ERUl697ngPTrho9J8kgdjbHNZ5PP/Re5m3mxVN6KEp0v7J7k66ZRkQTXw+sljVop:uAXqnhON8m3mzNHTdw6YSX+sleu5y

Malware Config

Extracted

Family

rhadamanthys

C2

https://185.196.11.237:9697/f002171ab05c7/73434jqg.jxviu

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2904
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3140
    • C:\Users\Admin\AppData\Local\Temp\msn.exe
      "C:\Users\Admin\AppData\Local\Temp\msn.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\ProgramData\downloaddemo_test\msn.exe
        C:\ProgramData\downloaddemo_test\msn.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1392
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5048

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\downloaddemo_test\bqbr

      Filesize

      896KB

      MD5

      0180c5a2f5b002e8755c60a3786c4975

      SHA1

      64bcbe91e3dd1dcd21709cbf189c032bb47501a2

      SHA256

      6eff0ca0c63ce6c712dc5f1f892b68d43894d13b681f75ab585b6c611dc16476

      SHA512

      8dbdfef7906be474ecadb7848042f3736483ef9b4ea05f4f60a3ae049a99bf1a8bcd57507b334e229c972784b6355b9dcf647c5992e56518a35d9ff0d639e1ff

    • C:\ProgramData\downloaddemo_test\contactsUX.dll

      Filesize

      331KB

      MD5

      54ee6a204238313dc6aca21c7e036c17

      SHA1

      531fd1c18e2e4984c72334eb56af78a1048da6c7

      SHA256

      0abf68b8409046a1555d48ac506fd26fda4b29d8d61e07bc412a4e21de2782fd

      SHA512

      19a2e371712aab54b75059d39a9aea6e7de2eb69b3ffc0332e60df617ebb9de61571b2ca722cddb75c9cbc79f8200d03f73539f21f69366eae3c7641731c7820

    • C:\ProgramData\downloaddemo_test\gld

      Filesize

      88KB

      MD5

      06a62106f0d01ed3a971415b57366a8b

      SHA1

      9d905a38a4f53961a3828b2f759062b428dd25a9

      SHA256

      6c5fb0f5e586cac39cf4e06e918dad243053cb103a82afeed32d92732834cc93

      SHA512

      4565dfe2e72a4a08d2a66722cb3ab736a2fa45f0c0ad368805d778f57f3bade2c82b2f8eab3006e4258cf5be84e96a46233e68be4d14fec50382cd94c13a4d74

    • C:\ProgramData\downloaddemo_test\msidcrl40.dll

      Filesize

      784KB

      MD5

      f1f8d156bbdd5945a4f933ac7fa7cc41

      SHA1

      e581235e9f1a3a8a63b8a470eaed882bc93b9085

      SHA256

      344ac8e5debb1a496c3648f941801cdc6ffdfcc7eef8ed38e62270a2e20b1c3a

      SHA512

      86d799af3be251edecf6a552f473b94a0ba2d738b7b5f4a84c31bb34db4ea458f5e50090370bdf82f945e684dd5d66b88ebe3c902305bb0a435aca1331cb4ad9

    • C:\ProgramData\downloaddemo_test\msn.exe

      Filesize

      5.5MB

      MD5

      537915708fe4e81e18e99d5104b353ed

      SHA1

      128ddb7096e5b748c72dc13f55b593d8d20aa3fb

      SHA256

      6dc7275f2143d1de0ca66c487b0f2ebff3d4c6a79684f03b9619bf23143ecf74

      SHA512

      9ceaaf7aa5889be9f5606646403133782d004b9d78ef83d7007dfce67c0f4f688d7931aebc74f1fc30aac2f1dd6281bdadfb52bc3ea46aca33b334adb4067ae2

    • C:\ProgramData\downloaddemo_test\msncore.dll

      Filesize

      991KB

      MD5

      deaa38a71c85d2f9d4ba71343d1603da

      SHA1

      bdbb492512cee480794e761d1bea718db14013ec

      SHA256

      1dc120f34b294e964eee949c4d1ebd9c271715d46b38ae082fec2f1d505e8d65

      SHA512

      87b152b642a020e07ad46e9ed5b4a462c12cf0918f82025c230f662eddb3bf4b2d3aa15ca770970beae5988dd5d5d9b7bcaf7a77c6d2f3acf6d12826f3a9ead7

    • C:\Users\Admin\AppData\Local\Temp\f4dd73ef

      Filesize

      1.1MB

      MD5

      a88065a131d9fc31922d788f7a996e89

      SHA1

      534f1bcad5424d2c09c92e933fb58916348dc0d1

      SHA256

      c97986cf86da26260e8dc290f86e032fe5c0516263c0082b35f7bd103bf15d07

      SHA512

      344a0f9373c199dacf9d2f2ca0b8fab9e4826c2b6d8e0c4900ef55e99cfd1deec95306a78137877c6f1727569963f014ff7d887e31a53e3d2d8342e23e7f134f

    • memory/1392-27-0x0000000073E30000-0x0000000073FAD000-memory.dmp

      Filesize

      1.5MB

    • memory/1392-29-0x00007FFDD0DA0000-0x00007FFDD0FA9000-memory.dmp

      Filesize

      2.0MB

    • memory/1392-30-0x0000000073E30000-0x0000000073FAD000-memory.dmp

      Filesize

      1.5MB

    • memory/1392-32-0x0000000073E30000-0x0000000073FAD000-memory.dmp

      Filesize

      1.5MB

    • memory/1392-52-0x0000000073E30000-0x0000000073FAD000-memory.dmp

      Filesize

      1.5MB

    • memory/2672-21-0x0000000073E30000-0x0000000073FAD000-memory.dmp

      Filesize

      1.5MB

    • memory/2672-22-0x00007FFDD0DA0000-0x00007FFDD0FA9000-memory.dmp

      Filesize

      2.0MB

    • memory/2672-23-0x0000000073E43000-0x0000000073E45000-memory.dmp

      Filesize

      8KB

    • memory/2672-24-0x0000000073E30000-0x0000000073FAD000-memory.dmp

      Filesize

      1.5MB

    • memory/2672-25-0x0000000073E30000-0x0000000073FAD000-memory.dmp

      Filesize

      1.5MB

    • memory/2708-1-0x00007FFDD0DA0000-0x00007FFDD0FA9000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-0-0x0000000073E30000-0x0000000073FAD000-memory.dmp

      Filesize

      1.5MB

    • memory/3140-44-0x0000000000900000-0x0000000000909000-memory.dmp

      Filesize

      36KB

    • memory/3140-48-0x0000000002820000-0x0000000002C20000-memory.dmp

      Filesize

      4.0MB

    • memory/3140-49-0x00007FFDD0DA0000-0x00007FFDD0FA9000-memory.dmp

      Filesize

      2.0MB

    • memory/3140-51-0x00000000762E0000-0x0000000076532000-memory.dmp

      Filesize

      2.3MB

    • memory/5048-36-0x0000000000270000-0x00000000002F0000-memory.dmp

      Filesize

      512KB

    • memory/5048-38-0x0000000000270000-0x00000000002F0000-memory.dmp

      Filesize

      512KB

    • memory/5048-39-0x00000000041F0000-0x00000000045F0000-memory.dmp

      Filesize

      4.0MB

    • memory/5048-40-0x00000000041F0000-0x00000000045F0000-memory.dmp

      Filesize

      4.0MB

    • memory/5048-43-0x00000000762E0000-0x0000000076532000-memory.dmp

      Filesize

      2.3MB

    • memory/5048-35-0x00007FFDD0DA0000-0x00007FFDD0FA9000-memory.dmp

      Filesize

      2.0MB

    • memory/5048-47-0x0000000000270000-0x00000000002F0000-memory.dmp

      Filesize

      512KB

    • memory/5048-34-0x0000000000270000-0x00000000002F0000-memory.dmp

      Filesize

      512KB