Analysis
-
max time kernel
90s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 10:47
Behavioral task
behavioral1
Sample
msimg32.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
msimg32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
rename_me2.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rename_me2.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
저작권 침해 이미지 및 비디오 - Yulchon LLC.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
저작권 침해 이미지 및 비디오 - Yulchon LLC.exe
Resource
win10v2004-20241007-en
General
-
Target
msimg32.dll
-
Size
1.9MB
-
MD5
ba8a29088dd3dc919f90ef70c65e38dc
-
SHA1
c4a61b1115e3827bd324449427a66fc15fcb6f79
-
SHA256
9bdf49b27fd4d80ef087f63e0bfa0a0822686814863eca09ac506404ad76dfda
-
SHA512
2981fd23165bd8a24fafc3ed95879d25f1a452a625a43fa07538b67f733a7d5f383519e895d374f573ce2183afac62e7aa8c27d84d626174026d5a2efcdb14ed
-
SSDEEP
24576:rdqeOXnrNOEMudreb7LVkhdyJYKkbg6psPyWwxnMqfbc5MU47iA8koWOmydA7iRC:rtZA+rMVL7pZLOkALP7fiRHkG
Malware Config
Extracted
rhadamanthys
https://15.235.176.166:8344/ecda3896be16ad7255/82pwxrmt.osobm
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3708 created 2516 3708 rundll32.exe sihost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*ChromeUpdate = "rundll32.exe C:\\Users\\Admin\\Documents\\FirefoxData.dll,EntryPoint" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 1452 rundll32.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4572 3708 WerFault.exe rundll32.exe 1592 3708 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.execmd.exereg.exeopenwith.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exeopenwith.exepid process 3708 rundll32.exe 3708 rundll32.exe 4128 openwith.exe 4128 openwith.exe 4128 openwith.exe 4128 openwith.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
rundll32.exerundll32.execmd.exerundll32.exedescription pid process target process PID 4140 wrote to memory of 1452 4140 rundll32.exe rundll32.exe PID 4140 wrote to memory of 1452 4140 rundll32.exe rundll32.exe PID 4140 wrote to memory of 1452 4140 rundll32.exe rundll32.exe PID 1452 wrote to memory of 3708 1452 rundll32.exe rundll32.exe PID 1452 wrote to memory of 3708 1452 rundll32.exe rundll32.exe PID 1452 wrote to memory of 3708 1452 rundll32.exe rundll32.exe PID 1452 wrote to memory of 3708 1452 rundll32.exe rundll32.exe PID 1452 wrote to memory of 3708 1452 rundll32.exe rundll32.exe PID 1452 wrote to memory of 3708 1452 rundll32.exe rundll32.exe PID 1452 wrote to memory of 1188 1452 rundll32.exe cmd.exe PID 1452 wrote to memory of 1188 1452 rundll32.exe cmd.exe PID 1452 wrote to memory of 1188 1452 rundll32.exe cmd.exe PID 1188 wrote to memory of 3924 1188 cmd.exe reg.exe PID 1188 wrote to memory of 3924 1188 cmd.exe reg.exe PID 1188 wrote to memory of 3924 1188 cmd.exe reg.exe PID 3708 wrote to memory of 4128 3708 rundll32.exe openwith.exe PID 3708 wrote to memory of 4128 3708 rundll32.exe openwith.exe PID 3708 wrote to memory of 4128 3708 rundll32.exe openwith.exe PID 3708 wrote to memory of 4128 3708 rundll32.exe openwith.exe PID 3708 wrote to memory of 4128 3708 rundll32.exe openwith.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2516
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#12⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 5804⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 6004⤵
- Program crash
PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3708 -ip 37081⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3708 -ip 37081⤵PID:1636