Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16-11-2024 20:29

General

  • Target

    LockBit (1).rar

  • Size

    3.0MB

  • MD5

    f609b57eb9d64194112786c5411c8f2e

  • SHA1

    841b0eb93a9be59d4a4468330e915504ee9a5aee

  • SHA256

    f2363a572a7d408e1ea2a04fd2f5a23cd7c42db67d5111bf9a7541ab9f005ec9

  • SHA512

    577c83c0113d64d02e549661daade9e6d8bdd5360cc01d5d02325dd167f02fd3900ee186f8dabe9a5a250e2fc4a44ebb82ef136f4e0177b1b64c2d18f6835b41

  • SSDEEP

    98304:atRx753lm2dF+2dFdE2dFPINGokC8FH8NZjvN:atRxFlmeF+eF+eFwN4VQZjvN

Malware Config

Extracted

Family

rhadamanthys

C2

https://195.3.223.126:4287/9d0dc091285eb9fbf2e/o8f3c8oj.8rdif

Signatures

  • Detect rhadamanthys stealer shellcode 7 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\LockBit (1).rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:72
  • C:\Users\Admin\Desktop\builder.exe
    "C:\Users\Admin\Desktop\builder.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 160
      2⤵
      • Program crash
      PID:3848
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1908 -ip 1908
    1⤵
      PID:4948
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3704
      • C:\Users\Admin\Desktop\Debug\decryptor.exe
        "C:\Users\Admin\Desktop\Debug\decryptor.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:660
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 532
            3⤵
            • Program crash
            PID:1624
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 160
          2⤵
          • Program crash
          PID:3220
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1696 -ip 1696
        1⤵
          PID:1364
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 660 -ip 660
          1⤵
            PID:3744
          • C:\Users\Admin\Desktop\builder.exe
            "C:\Users\Admin\Desktop\builder.exe"
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3404
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3152
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 468
                3⤵
                • Program crash
                PID:3548
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 364
              2⤵
              • Program crash
              PID:4200
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3404 -ip 3404
            1⤵
              PID:4976
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3152 -ip 3152
              1⤵
                PID:2648

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\7zE84057DF7\Debug\decryptor.exe

                Filesize

                662KB

                MD5

                2bc873b1b388bff91d12eb1d2ce9ca16

                SHA1

                72bf0e13509d0d10641dcd6b82be520279759a28

                SHA256

                89cbb69df65004a0cf5673be11e5625933ebf10683bf33e39a6d137be63649ab

                SHA512

                de3b17487192e8641da89b2ba88a65b5cd09e131bc588903f6ef39efab333a08d852c8259004c2516dc17ef9b349cdef4ab54ab1d49862e4f0f974973a527225

              • C:\Users\Admin\AppData\Local\Temp\7zE84057DF7\decryptor\decryptor.pdb

                Filesize

                1.1MB

                MD5

                d28f6d860cc7415c725caaca414a6a32

                SHA1

                3823cf5c63b6d1ba15a3ca2581e83d830e63074b

                SHA256

                6b8ef6acb7d99764102dd29c2fc5d6305d2b0106a1247020fe5178985a5499f9

                SHA512

                2a29d46bfcc52681527fb2833866db04e0ee48c7bd058ca948dfa202a821ffcc544ceab286a2fdb0132c01fadb79990a88d759a1ba04cbbfa6ac4b6d3c1445d6

              • memory/660-115-0x00000000023F0000-0x00000000027F0000-memory.dmp

                Filesize

                4.0MB

              • memory/660-112-0x0000000000400000-0x0000000000473000-memory.dmp

                Filesize

                460KB

              • memory/3104-101-0x0000000000400000-0x0000000000473000-memory.dmp

                Filesize

                460KB

              • memory/3104-102-0x0000000000CF0000-0x0000000000CF7000-memory.dmp

                Filesize

                28KB

              • memory/3104-103-0x0000000002AB0000-0x0000000002EB0000-memory.dmp

                Filesize

                4.0MB

              • memory/3104-105-0x0000000002AB0000-0x0000000002EB0000-memory.dmp

                Filesize

                4.0MB

              • memory/3104-104-0x0000000002AB0000-0x0000000002EB0000-memory.dmp

                Filesize

                4.0MB

              • memory/3104-106-0x0000000002AB0000-0x0000000002EB0000-memory.dmp

                Filesize

                4.0MB

              • memory/3104-107-0x0000000000400000-0x0000000000473000-memory.dmp

                Filesize

                460KB

              • memory/3104-108-0x0000000002AB0000-0x0000000002EB0000-memory.dmp

                Filesize

                4.0MB

              • memory/3104-100-0x0000000000400000-0x0000000000473000-memory.dmp

                Filesize

                460KB

              • memory/3104-98-0x0000000000400000-0x0000000000473000-memory.dmp

                Filesize

                460KB

              • memory/3152-118-0x0000000000400000-0x0000000000473000-memory.dmp

                Filesize

                460KB

              • memory/3152-121-0x0000000002F30000-0x0000000003330000-memory.dmp

                Filesize

                4.0MB