Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-11-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
LockBit (1).rar
Resource
win11-20241007-en
General
-
Target
LockBit (1).rar
-
Size
3.0MB
-
MD5
f609b57eb9d64194112786c5411c8f2e
-
SHA1
841b0eb93a9be59d4a4468330e915504ee9a5aee
-
SHA256
f2363a572a7d408e1ea2a04fd2f5a23cd7c42db67d5111bf9a7541ab9f005ec9
-
SHA512
577c83c0113d64d02e549661daade9e6d8bdd5360cc01d5d02325dd167f02fd3900ee186f8dabe9a5a250e2fc4a44ebb82ef136f4e0177b1b64c2d18f6835b41
-
SSDEEP
98304:atRx753lm2dF+2dFdE2dFPINGokC8FH8NZjvN:atRxFlmeF+eF+eFwN4VQZjvN
Malware Config
Extracted
rhadamanthys
https://195.3.223.126:4287/9d0dc091285eb9fbf2e/o8f3c8oj.8rdif
Signatures
-
Detect rhadamanthys stealer shellcode 7 IoCs
resource yara_rule behavioral1/memory/3104-103-0x0000000002AB0000-0x0000000002EB0000-memory.dmp family_rhadamanthys behavioral1/memory/3104-105-0x0000000002AB0000-0x0000000002EB0000-memory.dmp family_rhadamanthys behavioral1/memory/3104-104-0x0000000002AB0000-0x0000000002EB0000-memory.dmp family_rhadamanthys behavioral1/memory/3104-106-0x0000000002AB0000-0x0000000002EB0000-memory.dmp family_rhadamanthys behavioral1/memory/3104-108-0x0000000002AB0000-0x0000000002EB0000-memory.dmp family_rhadamanthys behavioral1/memory/660-115-0x00000000023F0000-0x00000000027F0000-memory.dmp family_rhadamanthys behavioral1/memory/3152-121-0x0000000002F30000-0x0000000003330000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Executes dropped EXE 3 IoCs
pid Process 1908 builder.exe 1696 decryptor.exe 3404 builder.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1908 set thread context of 3104 1908 builder.exe 85 PID 1696 set thread context of 660 1696 decryptor.exe 93 PID 3404 set thread context of 3152 3404 builder.exe 100 -
Program crash 5 IoCs
pid pid_target Process procid_target 3848 1908 WerFault.exe 81 3220 1696 WerFault.exe 91 1624 660 WerFault.exe 93 4200 3404 WerFault.exe 98 3548 3152 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language decryptor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 AppLaunch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3104 AppLaunch.exe 3104 AppLaunch.exe 660 AppLaunch.exe 660 AppLaunch.exe 3152 AppLaunch.exe 3152 AppLaunch.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 72 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 72 7zFM.exe Token: 35 72 7zFM.exe Token: SeSecurityPrivilege 72 7zFM.exe Token: SeShutdownPrivilege 3104 AppLaunch.exe Token: SeCreatePagefilePrivilege 3104 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 72 7zFM.exe 72 7zFM.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1908 wrote to memory of 3104 1908 builder.exe 85 PID 1908 wrote to memory of 3104 1908 builder.exe 85 PID 1908 wrote to memory of 3104 1908 builder.exe 85 PID 1908 wrote to memory of 3104 1908 builder.exe 85 PID 1908 wrote to memory of 3104 1908 builder.exe 85 PID 1908 wrote to memory of 3104 1908 builder.exe 85 PID 1908 wrote to memory of 3104 1908 builder.exe 85 PID 1908 wrote to memory of 3104 1908 builder.exe 85 PID 1696 wrote to memory of 660 1696 decryptor.exe 93 PID 1696 wrote to memory of 660 1696 decryptor.exe 93 PID 1696 wrote to memory of 660 1696 decryptor.exe 93 PID 1696 wrote to memory of 660 1696 decryptor.exe 93 PID 1696 wrote to memory of 660 1696 decryptor.exe 93 PID 1696 wrote to memory of 660 1696 decryptor.exe 93 PID 1696 wrote to memory of 660 1696 decryptor.exe 93 PID 1696 wrote to memory of 660 1696 decryptor.exe 93 PID 3404 wrote to memory of 3152 3404 builder.exe 100 PID 3404 wrote to memory of 3152 3404 builder.exe 100 PID 3404 wrote to memory of 3152 3404 builder.exe 100 PID 3404 wrote to memory of 3152 3404 builder.exe 100 PID 3404 wrote to memory of 3152 3404 builder.exe 100 PID 3404 wrote to memory of 3152 3404 builder.exe 100 PID 3404 wrote to memory of 3152 3404 builder.exe 100 PID 3404 wrote to memory of 3152 3404 builder.exe 100
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\LockBit (1).rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:72
-
C:\Users\Admin\Desktop\builder.exe"C:\Users\Admin\Desktop\builder.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 1602⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1908 -ip 19081⤵PID:4948
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3704
-
C:\Users\Admin\Desktop\Debug\decryptor.exe"C:\Users\Admin\Desktop\Debug\decryptor.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 5323⤵
- Program crash
PID:1624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 1602⤵
- Program crash
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1696 -ip 16961⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 660 -ip 6601⤵PID:3744
-
C:\Users\Admin\Desktop\builder.exe"C:\Users\Admin\Desktop\builder.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 4683⤵
- Program crash
PID:3548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 3642⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3404 -ip 34041⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3152 -ip 31521⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
662KB
MD52bc873b1b388bff91d12eb1d2ce9ca16
SHA172bf0e13509d0d10641dcd6b82be520279759a28
SHA25689cbb69df65004a0cf5673be11e5625933ebf10683bf33e39a6d137be63649ab
SHA512de3b17487192e8641da89b2ba88a65b5cd09e131bc588903f6ef39efab333a08d852c8259004c2516dc17ef9b349cdef4ab54ab1d49862e4f0f974973a527225
-
Filesize
1.1MB
MD5d28f6d860cc7415c725caaca414a6a32
SHA13823cf5c63b6d1ba15a3ca2581e83d830e63074b
SHA2566b8ef6acb7d99764102dd29c2fc5d6305d2b0106a1247020fe5178985a5499f9
SHA5122a29d46bfcc52681527fb2833866db04e0ee48c7bd058ca948dfa202a821ffcc544ceab286a2fdb0132c01fadb79990a88d759a1ba04cbbfa6ac4b6d3c1445d6