Overview
overview
10Static
static
3ed02ac429d...26.exe
windows7-x64
8ed02ac429d...26.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3DocuAppCenter.exe
windows10-2004-x64
10LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...er.exe
windows7-x64
7$R0/Uninst...er.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
ed02ac429db2a8e556c8edd22d575ae4caae45719df16dce9b2026205572a426.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed02ac429db2a8e556c8edd22d575ae4caae45719df16dce9b2026205572a426.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
DocuAppCenter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win7-20240708-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
d3dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
libEGL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
libGLESv2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
resources/elevate.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
resources/elevate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
vk_swiftshader.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
vulkan-1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20241010-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
$R0/Uninstall DocuAppCenter.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
$R0/Uninstall DocuAppCenter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240903-en
General
-
Target
DocuAppCenter.exe
-
Size
180.0MB
-
MD5
7c8a196ccbbdd56338960528e97c45e4
-
SHA1
0cbb276b8a8bec1c6143143e4928787f97492eb8
-
SHA256
0db2e38188e1032e149f3765a5afe815ff589a86de5563e2c171bc60fd531e21
-
SHA512
cee8dfa5a9b0dfddbb1f429723bab8fd8cd9ce0e9e58ccf4d7e1077265aeb9b8941d22135eafaf951b21344692806aaf22077370593d93fd970a1f26f4f667d3
-
SSDEEP
1572864:Cwl41lgY+w9QLv1JWYc6UeOtUUGQUT1jdu4BPPuuwT2GOqiB1sr7zjg7ob753oUV:WF4oD0QdG09P
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3968 created 2552 3968 Bginfo.exe 44 -
Executes dropped EXE 1 IoCs
pid Process 3968 Bginfo.exe -
Loads dropped DLL 1 IoCs
pid Process 3968 Bginfo.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BGInfo.bmp" Bginfo.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bginfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bginfo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Bginfo.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\TileWallpaper = "1" Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\WallpaperStyle = "0" Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Colors\Background = "0 0 0" Bginfo.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\BGInfo.Config.1 Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\BGInfo.Config.1\shell\open\command Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\BGInfo.Config.1\shell\open Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\BGInfo.Config.1\DefaultIcon Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\BGInfo.Config.1\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromiumDriver\\Bginfo.exe\",0" Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.bgi Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\.bgi\ = "BGInfo.Config.1" Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\BGInfo.Config.1\ = "BGInfo Configuration File" Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\BGInfo.Config.1\shell Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\BGInfo.Config.1\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromiumDriver\\Bginfo.exe\" \"%1\"" Bginfo.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3968 Bginfo.exe 3968 Bginfo.exe 1028 openwith.exe 1028 openwith.exe 1028 openwith.exe 1028 openwith.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 3968 Bginfo.exe Token: SeSecurityPrivilege 3968 Bginfo.exe Token: SeBackupPrivilege 3968 Bginfo.exe Token: SeSecurityPrivilege 3968 Bginfo.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3968 Bginfo.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3968 Bginfo.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 2756 2692 DocuAppCenter.exe 86 PID 2692 wrote to memory of 4068 2692 DocuAppCenter.exe 87 PID 2692 wrote to memory of 4068 2692 DocuAppCenter.exe 87 PID 2692 wrote to memory of 5092 2692 DocuAppCenter.exe 88 PID 2692 wrote to memory of 5092 2692 DocuAppCenter.exe 88 PID 4068 wrote to memory of 3968 4068 cmd.exe 89 PID 4068 wrote to memory of 3968 4068 cmd.exe 89 PID 4068 wrote to memory of 3968 4068 cmd.exe 89 PID 3968 wrote to memory of 1028 3968 Bginfo.exe 92 PID 3968 wrote to memory of 1028 3968 Bginfo.exe 92 PID 3968 wrote to memory of 1028 3968 Bginfo.exe 92 PID 3968 wrote to memory of 1028 3968 Bginfo.exe 92 PID 3968 wrote to memory of 1028 3968 Bginfo.exe 92
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2552
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\DocuAppCenter.exe"C:\Users\Admin\AppData\Local\Temp\DocuAppCenter.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\DocuAppCenter.exe"C:\Users\Admin\AppData\Local\Temp\DocuAppCenter.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\DocuAppCenter" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1756,i,10513368513173435155,16614304210336362562,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1744 /prefetch:22⤵PID:2756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\ChromiumDriver\Bginfo.exe" /taskbar"2⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\ChromiumDriver\Bginfo.exe"C:\Users\Admin\AppData\Local\Temp\ChromiumDriver\Bginfo.exe" /taskbar3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\DocuAppCenter.exe"C:\Users\Admin\AppData\Local\Temp\DocuAppCenter.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\DocuAppCenter" --field-trial-handle=1960,i,10513368513173435155,16614304210336362562,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1972 /prefetch:32⤵PID:5092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179KB
MD5f8e8df746881bb6c15c61fee344b12ff
SHA16f5d6bbea6b3ef8f931fc18b51d0fdffa6367430
SHA2564ec7e1ee6c2080e341c2a94d90af71d17d1f8f38bab8fc556219d11a79fabf85
SHA512dc231aacd9e754192ca160823b465c9cb9ea3c9bbe35cf485428c2266c8112a292d05db7942d1ced210c072d71036a42777533359e7f34881bf0038940bfe309
-
Filesize
158KB
MD59827ae88a9588b26de69046117d21c81
SHA1c591b24672b8509dbdc087fc245a1f7fea3b1d9b
SHA2563560f325b7a2c0918910bddd6462adef786270959e765069fc6dc3320f3180a6
SHA51266c1f90a4a9dd2b31f9ee3e1049620bcec5bfc644546d4e18b651bc79b45e58a73e82d676dcb34819e59735b3d92163e80b9b1311285f6f452f97020439497c6
-
Filesize
2.1MB
MD53aef228fb7ee187160482084d36c9726
SHA18b76990c5061890c94f81f504c5782912a58d8a6
SHA256c885df88693496d5c28ad16a1ecde259e191f54ad76428857742af843b846c53
SHA512e659a7cf12c6b41879e4ce987e4cd1cefce2ffc74e06817667fa833764f36f25cc5f8374dbc844b68b787acac011c7b8c8f2b74563bf8a96f623ebb110a593da