Analysis

  • max time kernel
    94s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 12:44

General

  • Target

    5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe

  • Size

    1.6MB

  • MD5

    fa000351e26e17543f67e3dedc97d37e

  • SHA1

    c59fc4f489ac15d5a1d455abbf0c3c5ad6fcc189

  • SHA256

    5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350

  • SHA512

    1bf517f2b0d3c156c2850f161f4bedf735361a8951d807b05eeaa711a0720031e545d5dd56f46337f059ef18bea1523ec1f5a5b96e83d6380eb74e6526bd0025

  • SSDEEP

    49152:cpUlRhQMnbfKk8QkwCRYhtkp0d0X1zJ5w+ufya5h:cpUlYEfKk8DTROk6dK1l5wF

Malware Config

Extracted

Family

rhadamanthys

C2

https://51.75.171.9:5151/9640d96bbead45f349f3ab9/nvkjh5gq.0x2e8

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3044
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1044
    • C:\Users\Admin\AppData\Local\Temp\5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe
      "C:\Users\Admin\AppData\Local\Temp\5f58e87fee021cbaa9ecfae2d5f8709bd0934b2d2d2779a8f24993425fb20350.exe"
      1⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4048
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rmxb.vbe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3160
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /release
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /release
            4⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:860
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c qwlvpmrupf.mp3 tnlupe.mp3
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1636
          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwlvpmrupf.mp3
            qwlvpmrupf.mp3 tnlupe.mp3
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4744
            • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
              "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2032
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /renew
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            4⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:1676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\anxv.ppt

      Filesize

      508B

      MD5

      d391f8b614a342cff9fcbf8f4e41c934

      SHA1

      fc045f44973b9000f63808abd1e59c66ed6755b7

      SHA256

      36568784a413d46056fac31e259c41f4429f08b1564a72ceb777cc80a0aa9f1c

      SHA512

      e446d6f17e9765ac260f4bd429ffe901c47c46fdfdefba25269a33e570e98b24469b529b815322e1d17ae3b4589ecf5561519d39d3ad65fd164aa8fca50e62ad

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bvtesegdgq.3gp

      Filesize

      624B

      MD5

      c3a02fe4f358078606a02b7d8c069957

      SHA1

      4cb6fc80ac829fcdb8088cc95f6c109c719cfa5d

      SHA256

      d8abe1326e449ca4d9c330a900ce393ee32101793d91e7f556d0c87e77adba0c

      SHA512

      c016ded65e5a728e3eff1e66ae913ff81677b197b4c809a9f9e509304dc2747a581597760b0d4b79e60c03647dc3569cae21c413152c6e4af8b4dede10e8bb9d

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\crbvulcpak.msc

      Filesize

      528B

      MD5

      83ca8d8bac38af12453f9d9ff1d02916

      SHA1

      dcc6e7ab9858eb9ff63f4cd2dd7e9b84ec694a22

      SHA256

      58412d427987a11c362fc7d921804f58277c3a5e4ea7ce98d4dc260e9aeb6302

      SHA512

      1bf89f1196b9c41e5781f118ce657aec2194d48b0c4d15672a55093778c660e609626a9e5ea5336064590a9bd21f8fa1d9cf6f6435e866a0facf50e438d5d3f0

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\iutol.das

      Filesize

      532B

      MD5

      8344337d8607eef8ba26fc751f8e0122

      SHA1

      2ab2afce50e3553637aec0b5a65aa2e72d0ce51a

      SHA256

      ecb2d582d697d033a5e5bd06387df5725af74707c0e4b596d564be2bdb1221a7

      SHA512

      da3cab35922c97d3d03c073f51915792278919775c9690ad95a8bd7143cd45a5b0fcbb5216ed53dfc3eee1265bb91ddcdd875699ab23b3d95fccc991190caf2b

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jmfhuve.bin

      Filesize

      609B

      MD5

      73cdc398766b26d5b3fc2a732b633e80

      SHA1

      4e8178167362c791d19b8dd90284751e6294c041

      SHA256

      d078345688738bc731ee73004ac6ad2670cfd6343b570fa5b7c0ab7ad30f0b48

      SHA512

      ab55cecf628450ee0e07591c8a6b7e1ebd6f1e1ff0c3184a14bf297c64153c8507b331a391020a5068d7c23cb55e73125e7582d204ce6f5c1e26f3ee3cd32705

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jwphnktqhh.xl

      Filesize

      522B

      MD5

      25b3d4f1279923fd4780981605bce9fb

      SHA1

      12257bd64a5ab12eafd4679bdbdf9bcf2903b160

      SHA256

      df4f76d702170095fa752d69f1ab793604e9dcce7adcad7c83fdae623f0c0093

      SHA512

      f3579a94ebabd59b055d7170e3f9fbaec7d645e3cbe0eff514413621fec6811fb07264e4a5048222e8a84bdeb671d7580989b7e2d6b8987795782b4c7c7e9920

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ldrtopp.msc

      Filesize

      586B

      MD5

      ac53ee172cc20f1bc979fd4710cbfa00

      SHA1

      5c83524e42270883ff05c434f3ab62ada8931f51

      SHA256

      774c4cc458e33020b29fa28fc91db540c86f55142d716ca1613da20670435198

      SHA512

      70df2bfe2300aae5bec804e7f0235c1b9601fc1447df84248b6eff030a4f36b908d00d089911d082c7ca10f7f9d30239b1414b754b32cb1adc8f8a5a7286341d

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ltmdgplto.3gp

      Filesize

      588B

      MD5

      62a55b40d10bc4ccdf643e624b90d003

      SHA1

      1aafd527e1b40b555b1e68e1f6d9f6c594586913

      SHA256

      9401c3d0cbd1fbb5fb740ea9eff7b4f7af764574a6cbc487c97f99f610ba9852

      SHA512

      421b3694a2f2e080a03459973fe05a2b23f4fa67323529ee8d9afdb6b5e9b8d082193a31f7c2b58d3368158fcdef49d60dbabd3a4f7e656c8ed5b3b95f6bb181

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\nbmn.lmk

      Filesize

      1.3MB

      MD5

      35a5cc0e4d021890e72a070ee02dfdc4

      SHA1

      ba20de52cdc21e3d8bd69470381b7d0cb53f1d05

      SHA256

      51e725c19b88d14e3d978b54d810398993242c959145f323fde92cfa55557ada

      SHA512

      afe5510b3a27cf5e308cde1e000289777ab9cfd592052b37c990028f51f4d5113e15fccf7b13cf9a13ed06e3d134ed2009bbd18ddd5b508fa20d050d8d2719c2

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\nhjdnx.3gp

      Filesize

      579B

      MD5

      e3c40d261a890a50e8616efbce725df6

      SHA1

      51087dd64e5c3f673c47a3b03ccaffadb77dce6d

      SHA256

      a1c8b7a1408638a385956edaaf4ec1defb98e94784a5aeaec9f63fd24cf3f83b

      SHA512

      114de87085139632a912f2bdc2700eb60f166623641c460e818ce7a29edc2dac24f9c01b186cfb268976b7605fe496addb4300e6ec20507b101659df2add69f8

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\opioxoqv.bmp

      Filesize

      512B

      MD5

      c4cea733ef0f8c84e8c7081cdcb01b5e

      SHA1

      66050a0f1a5c5a17532e8d449573a31be8e8c693

      SHA256

      b75166289cc3acd2e7ecb722f91792cead7bccbe5d230a3aaf211c2027f7e8b4

      SHA512

      013a885c743cae8bc941d76374745d18498cf5f53aeb7c4e02232130a552cc1553c2d3051d85b0494033da2f5367ba078333659823a7ac236254420eea0706da

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qbjid.xls

      Filesize

      562B

      MD5

      4c854c21a4e83906af7ae0b83d1d797b

      SHA1

      52a423c95344186d45c66780cd55890820e755e0

      SHA256

      613c53a8e742366747a9253dd19fab2527258f08e40699aaab85d920787a717b

      SHA512

      bfea86080cffec1e69ec7f5a1371796a656b8a129a1fef437fadc8d170cdfd07c6f1ba514fcd14a138d943d89e26621686c366592d9bf6890c83c22a0efa1963

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qlgigdt.xls

      Filesize

      648B

      MD5

      135f39e327b474dfcf9139f5a9de5a9b

      SHA1

      0d70afd4762c1296355dd9e7579eb57b833d4c0c

      SHA256

      0988ff10c9f291f32009ca04929c0156a0e10c5003d30ae266b865e56c064b17

      SHA512

      4cd5747c41ef013c5cc884536864c35c45beeb3fbb794ca6cd891c1f787ace6a261a0b2e45bbc87677cf6540e5413564d98c2510ee30ec163e8ee3d0e4863e2b

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qlmgqepgjl.xls

      Filesize

      633B

      MD5

      0e969295487775daa7d03b33829684f8

      SHA1

      613cf0518a258ce3ed5bb2aac7bac1fda71b1ec4

      SHA256

      5badefdf6c9490d5ed3a5181bb87a30536776827bf7a155957c62b01028fd4fb

      SHA512

      7efcfcee6e15af372a6a57f66531feb1c1873dc22399ce05228369ee3e7e49d69453d75d78131d50217761539bfce82245140163c50abafa1790eec69f1665e1

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwlvpmrupf.mp3

      Filesize

      925KB

      MD5

      0adb9b817f1df7807576c2d7068dd931

      SHA1

      4a1b94a9a5113106f40cd8ea724703734d15f118

      SHA256

      98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

      SHA512

      883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rmxb.vbe

      Filesize

      88KB

      MD5

      be932d231ef60dcf6ad6c579873b550c

      SHA1

      ca37ae517c7d341e008cbd71beab29aca839002c

      SHA256

      d47ed1047e043162e221d1a21b5e19d8a24641442bcb17c6c8a51f9456998751

      SHA512

      21385ada5436112899aaa4651a6d561499735e6e59674258c9de6b38a50e671276ae9e8b5c7f70e60321cf41846ae34e299d179fbf6226027d9a9c99751ad09b

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\srnkdleah.exe

      Filesize

      609B

      MD5

      834d7436b1908047fbc4801e3d9ea735

      SHA1

      8cc6441f6a4a65902ae20c8d0d73a59048227253

      SHA256

      056d4c251de76715737124ccb63e6652840ee3ee66a41f45b109b3f413ee864b

      SHA512

      effc86ef8949e1c231f9c18c807afc39882cafa2beb5e87f10e2ac5d8378d2f2ac3c94679eefcfe9f4af6c260e524bac051fc789d147215ccd552a1d44edae7a

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\uraspfn.bin

      Filesize

      40KB

      MD5

      f1d3c3dae4987deb8f2b79c08da81b67

      SHA1

      f5809aebc70a2f23c8ee6b466b5293199545bcf4

      SHA256

      fd491ea65d887c3f3fc2aac3197280e4135c8f571b7d6df63212097783254ea5

      SHA512

      e552d8114e09ab7655e7fcb1549e1f18b3027558024a0e565a1261f7f075e56ce40b37fe70893875da75ca298bf174940756b91ffbf8e991b13bc02da3d4c00c

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\uraspfn.bin

      Filesize

      40KB

      MD5

      5fe3c2e677e90b8971dcaec9d9cf973d

      SHA1

      cccefd97b61b17f2bc60983d2437925a7b063b20

      SHA256

      762982a2b57b2a93dd63fbf230da414b6c3abc6240d4b0af7bb940dc81b74512

      SHA512

      2c204731cc1bdb18259e737cdce622833367413bf10a75a73e23d3c531e3739093d0e4227c032aab61ea8f26a8d65175ac3072eaf61116ff07bc623e0d402727

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wbaxv.jpg

      Filesize

      517B

      MD5

      4daa3e600c4d2c162ffe78c5df68ab8e

      SHA1

      c1f052eb1577599b89b70ae99bd9e6c8dde4f822

      SHA256

      c2b1869137e2e69e3969c50a0918eb71c5797f84faf4093aef0c890957a193ea

      SHA512

      35c537693df896c6b62118bd38bbdc6c0b4233c391fa11fec0e49373e08e7baedc9fab07489bc9c55d7d69797820aefc6c21c62b5a8669ee8aef297dbf89ed6f

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xddkunhuro.msc

      Filesize

      507B

      MD5

      992c91b45a9f3472868d47e61cb8675e

      SHA1

      fcdfbc8ec428982b4cb0b09fb00244de0bc78073

      SHA256

      a8a5116542d33261544e18c4431c11a45f77ab24a7f06a2c1d06480066ec6e62

      SHA512

      24054844512035ab6962f3abe2da36d56ac7e182a72a19d8a38f1c356d7bde30f14fe6fe3ef057c602a73e53a5d9131676c01f1ef99b545877015a4d3243b9eb

    • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

      Filesize

      44KB

      MD5

      9d352bc46709f0cb5ec974633a0c3c94

      SHA1

      1969771b2f022f9a86d77ac4d4d239becdf08d07

      SHA256

      2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

      SHA512

      13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

    • memory/1044-140-0x0000000000D30000-0x0000000000D39000-memory.dmp

      Filesize

      36KB

    • memory/1044-146-0x00000000754B0000-0x00000000756C5000-memory.dmp

      Filesize

      2.1MB

    • memory/1044-144-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

      Filesize

      2.0MB

    • memory/1044-143-0x0000000002AC0000-0x0000000002EC0000-memory.dmp

      Filesize

      4.0MB

    • memory/2032-132-0x00000000054D0000-0x0000000005562000-memory.dmp

      Filesize

      584KB

    • memory/2032-133-0x00000000054C0000-0x00000000054C8000-memory.dmp

      Filesize

      32KB

    • memory/2032-136-0x00000000056F0000-0x0000000005AF0000-memory.dmp

      Filesize

      4.0MB

    • memory/2032-137-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

      Filesize

      2.0MB

    • memory/2032-134-0x00000000055A0000-0x00000000055B0000-memory.dmp

      Filesize

      64KB

    • memory/2032-139-0x00000000754B0000-0x00000000756C5000-memory.dmp

      Filesize

      2.1MB

    • memory/2032-135-0x00000000056F0000-0x0000000005AF0000-memory.dmp

      Filesize

      4.0MB

    • memory/2032-131-0x00000000009A0000-0x0000000000A50000-memory.dmp

      Filesize

      704KB

    • memory/2032-128-0x00000000009A0000-0x0000000000EFD000-memory.dmp

      Filesize

      5.4MB