Analysis
-
max time kernel
29s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 10:47
Behavioral task
behavioral1
Sample
msimg32.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
msimg32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
rename_me2.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rename_me2.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
저작권 침해 이미지 및 비디오 - Yulchon LLC.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
저작권 침해 이미지 및 비디오 - Yulchon LLC.exe
Resource
win10v2004-20241007-en
General
-
Target
msimg32.dll
-
Size
1.9MB
-
MD5
ba8a29088dd3dc919f90ef70c65e38dc
-
SHA1
c4a61b1115e3827bd324449427a66fc15fcb6f79
-
SHA256
9bdf49b27fd4d80ef087f63e0bfa0a0822686814863eca09ac506404ad76dfda
-
SHA512
2981fd23165bd8a24fafc3ed95879d25f1a452a625a43fa07538b67f733a7d5f383519e895d374f573ce2183afac62e7aa8c27d84d626174026d5a2efcdb14ed
-
SSDEEP
24576:rdqeOXnrNOEMudreb7LVkhdyJYKkbg6psPyWwxnMqfbc5MU47iA8koWOmydA7iRC:rtZA+rMVL7pZLOkALP7fiRHkG
Malware Config
Extracted
rhadamanthys
https://15.235.176.166:8344/ecda3896be16ad7255/82pwxrmt.osobm
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\*ChromeUpdate = "rundll32.exe C:\\Users\\Admin\\Documents\\FirefoxData.dll,EntryPoint" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 2280 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2840 2156 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.execmd.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
rundll32.exerundll32.exerundll32.execmd.exedescription pid process target process PID 2412 wrote to memory of 2280 2412 rundll32.exe rundll32.exe PID 2412 wrote to memory of 2280 2412 rundll32.exe rundll32.exe PID 2412 wrote to memory of 2280 2412 rundll32.exe rundll32.exe PID 2412 wrote to memory of 2280 2412 rundll32.exe rundll32.exe PID 2412 wrote to memory of 2280 2412 rundll32.exe rundll32.exe PID 2412 wrote to memory of 2280 2412 rundll32.exe rundll32.exe PID 2412 wrote to memory of 2280 2412 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2156 2280 rundll32.exe rundll32.exe PID 2156 wrote to memory of 2840 2156 rundll32.exe WerFault.exe PID 2156 wrote to memory of 2840 2156 rundll32.exe WerFault.exe PID 2156 wrote to memory of 2840 2156 rundll32.exe WerFault.exe PID 2156 wrote to memory of 2840 2156 rundll32.exe WerFault.exe PID 2280 wrote to memory of 2936 2280 rundll32.exe cmd.exe PID 2280 wrote to memory of 2936 2280 rundll32.exe cmd.exe PID 2280 wrote to memory of 2936 2280 rundll32.exe cmd.exe PID 2280 wrote to memory of 2936 2280 rundll32.exe cmd.exe PID 2936 wrote to memory of 2728 2936 cmd.exe reg.exe PID 2936 wrote to memory of 2728 2936 cmd.exe reg.exe PID 2936 wrote to memory of 2728 2936 cmd.exe reg.exe PID 2936 wrote to memory of 2728 2936 cmd.exe reg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#12⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 1964⤵
- Program crash
PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2728
-
-
-