Analysis
-
max time kernel
115s -
max time network
203s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-11-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
RG Launcher.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
RG Launcher.exe
Resource
win11-20241007-en
General
-
Target
RG Launcher.exe
-
Size
175.7MB
-
MD5
cb3ce412a9c4cb7f0cf20344fdb2f46e
-
SHA1
bed9b9bedfe2f7d328b66fd9c5914ad8fa0f69a2
-
SHA256
a0295663c005e7515aa5d3ef0af36efbe4fd1dce9fb31609037c4eb0ab68a014
-
SHA512
5b92e1c448ab2f6b46c04d496207bbc843cb223db341ca493469907dc96206e02e9db95356fac6d75833c018d876417481c429b2def5dc9be54eec9cce288c26
-
SSDEEP
786432:0C6zTLvV+8ym5CqWpQshx4i9vnrX5hf9RMFJKaRODgJZhybxJXZdZdDIll3S+GE3:0fTB/P4Dzr9v/1iFIRDgtmxJp1O3h
Malware Config
Extracted
rhadamanthys
https://147.45.70.184:1525/f6e80fbec866c8b43/AVS
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
1.exe2.exedescription pid process target process PID 248 created 2884 248 1.exe sihost.exe PID 1956 created 2884 1956 2.exe sihost.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
1.exe2.exepid process 248 1.exe 1956 2.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 myexternalip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1264 248 WerFault.exe 1.exe 4860 248 WerFault.exe 1.exe 1548 1956 WerFault.exe 2.exe 2520 1956 WerFault.exe 2.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exe2.exeopenwith.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
RG Launcher.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RG Launcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer RG Launcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion RG Launcher.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
1.exeopenwith.exe2.exeopenwith.exepid process 248 1.exe 248 1.exe 612 openwith.exe 612 openwith.exe 612 openwith.exe 612 openwith.exe 1956 2.exe 1956 2.exe 2448 openwith.exe 2448 openwith.exe 2448 openwith.exe 2448 openwith.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
RG Launcher.exe1.exe2.exedescription pid process target process PID 3740 wrote to memory of 248 3740 RG Launcher.exe 1.exe PID 3740 wrote to memory of 248 3740 RG Launcher.exe 1.exe PID 3740 wrote to memory of 248 3740 RG Launcher.exe 1.exe PID 3740 wrote to memory of 1956 3740 RG Launcher.exe 2.exe PID 3740 wrote to memory of 1956 3740 RG Launcher.exe 2.exe PID 3740 wrote to memory of 1956 3740 RG Launcher.exe 2.exe PID 248 wrote to memory of 612 248 1.exe openwith.exe PID 248 wrote to memory of 612 248 1.exe openwith.exe PID 248 wrote to memory of 612 248 1.exe openwith.exe PID 248 wrote to memory of 612 248 1.exe openwith.exe PID 248 wrote to memory of 612 248 1.exe openwith.exe PID 1956 wrote to memory of 2448 1956 2.exe openwith.exe PID 1956 wrote to memory of 2448 1956 2.exe openwith.exe PID 1956 wrote to memory of 2448 1956 2.exe openwith.exe PID 1956 wrote to memory of 2448 1956 2.exe openwith.exe PID 1956 wrote to memory of 2448 1956 2.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2884
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:612
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\RG Launcher.exe"C:\Users\Admin\AppData\Local\Temp\RG Launcher.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\DownloadedExes\1.exe"C:\Users\Admin\AppData\Local\DownloadedExes\1.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 248 -s 5323⤵
- Program crash
PID:1264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 248 -s 5283⤵
- Program crash
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\DownloadedExes\2.exe"C:\Users\Admin\AppData\Local\DownloadedExes\2.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 5323⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 5283⤵
- Program crash
PID:2520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 248 -ip 2481⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 248 -ip 2481⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1956 -ip 19561⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1956 -ip 19561⤵PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.6MB
MD5b4e80b2b2278c16fc0d9d96509273b38
SHA13a690dba90353088dbb5da1897b09bdb55a934d6
SHA256afa73902cb62bd3fc39c67ff494172148144f2bc194a31250390d8b6f94f3473
SHA512830d858cade6a20021c3bf4addca71ca01638107ced1d51278a515745862274c6ca96c23104dba645c0c513060c06474e2fa878c0820bddda2a37f4f3181cc48
-
Filesize
16.5MB
MD50c6b1946ae82e2cb099f3f24ec6082ed
SHA11bff64d5b7657b6b77daef3037215043d48aaad5
SHA2562f2309857af8f8fdb34f7e077c8059ae3e734f1f2685736f69771cf9497cf4c2
SHA5126dccfba891128d5c85d7b120863fad2954d99abcf826c2a786d24450d47db0f0e094761b58c7d83dd5292a73b6c964ddb0086a412ff13b518628d6df8282b99d