Analysis
-
max time kernel
90s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 10:47
Behavioral task
behavioral1
Sample
msimg32.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
msimg32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
rename_me2.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rename_me2.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
저작권 침해 이미지 및 비디오 - Yulchon LLC.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
저작권 침해 이미지 및 비디오 - Yulchon LLC.exe
Resource
win10v2004-20241007-en
General
-
Target
msimg32.dll
-
Size
1.9MB
-
MD5
ba8a29088dd3dc919f90ef70c65e38dc
-
SHA1
c4a61b1115e3827bd324449427a66fc15fcb6f79
-
SHA256
9bdf49b27fd4d80ef087f63e0bfa0a0822686814863eca09ac506404ad76dfda
-
SHA512
2981fd23165bd8a24fafc3ed95879d25f1a452a625a43fa07538b67f733a7d5f383519e895d374f573ce2183afac62e7aa8c27d84d626174026d5a2efcdb14ed
-
SSDEEP
24576:rdqeOXnrNOEMudreb7LVkhdyJYKkbg6psPyWwxnMqfbc5MU47iA8koWOmydA7iRC:rtZA+rMVL7pZLOkALP7fiRHkG
Malware Config
Extracted
rhadamanthys
https://15.235.176.166:8344/ecda3896be16ad7255/82pwxrmt.osobm
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3708 created 2516 3708 rundll32.exe 44 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*ChromeUpdate = "rundll32.exe C:\\Users\\Admin\\Documents\\FirefoxData.dll,EntryPoint" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1452 rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4572 3708 WerFault.exe 96 1592 3708 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3708 rundll32.exe 3708 rundll32.exe 4128 openwith.exe 4128 openwith.exe 4128 openwith.exe 4128 openwith.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4140 wrote to memory of 1452 4140 rundll32.exe 84 PID 4140 wrote to memory of 1452 4140 rundll32.exe 84 PID 4140 wrote to memory of 1452 4140 rundll32.exe 84 PID 1452 wrote to memory of 3708 1452 rundll32.exe 96 PID 1452 wrote to memory of 3708 1452 rundll32.exe 96 PID 1452 wrote to memory of 3708 1452 rundll32.exe 96 PID 1452 wrote to memory of 3708 1452 rundll32.exe 96 PID 1452 wrote to memory of 3708 1452 rundll32.exe 96 PID 1452 wrote to memory of 3708 1452 rundll32.exe 96 PID 1452 wrote to memory of 1188 1452 rundll32.exe 97 PID 1452 wrote to memory of 1188 1452 rundll32.exe 97 PID 1452 wrote to memory of 1188 1452 rundll32.exe 97 PID 1188 wrote to memory of 3924 1188 cmd.exe 99 PID 1188 wrote to memory of 3924 1188 cmd.exe 99 PID 1188 wrote to memory of 3924 1188 cmd.exe 99 PID 3708 wrote to memory of 4128 3708 rundll32.exe 100 PID 3708 wrote to memory of 4128 3708 rundll32.exe 100 PID 3708 wrote to memory of 4128 3708 rundll32.exe 100 PID 3708 wrote to memory of 4128 3708 rundll32.exe 100 PID 3708 wrote to memory of 4128 3708 rundll32.exe 100
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2516
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msimg32.dll,#12⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 5804⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 6004⤵
- Program crash
PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "*ChromeUpdate" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\FirefoxData.dll",EntryPoint /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3708 -ip 37081⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3708 -ip 37081⤵PID:1636