Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 09:32
Behavioral task
behavioral1
Sample
30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
⌚/otdel.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
⌚/otdel.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
⌚/withrobot.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
⌚/withrobot.exe
Resource
win10v2004-20241007-en
General
-
Target
30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe
-
Size
13.8MB
-
MD5
136dbcf9a827c27791c703f31d98ffe5
-
SHA1
f3606e2860007494475616bbf23b63812906bbd9
-
SHA256
30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d
-
SHA512
1349cb55cb8632f99a82754b290981d6c5acee303620878d6e93d0930e3d1f61bfc9e5657350a204edd89342fbfee3007fd65bd610f3555a7aa25479f0a4281a
-
SSDEEP
393216:cZ0P38HyS6r3LgWe+3v1jHmhyc9v9XqTZYR9iR6:ckMHyS+9lhSyaRQs
Malware Config
Extracted
rhadamanthys
https://83.217.208.134/9fcc2685c3ccafd/pa8qm8h9.hc0r5
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2688 created 1172 2688 otdel.exe 21 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1004 powershell.exe -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 2688 otdel.exe 2708 withrobot.exe -
Loads dropped DLL 4 IoCs
pid Process 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe withrobot.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2116 sc.exe 1052 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otdel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2688 otdel.exe 2688 otdel.exe 2868 dialer.exe 2868 dialer.exe 2868 dialer.exe 2868 dialer.exe 2708 withrobot.exe 2708 withrobot.exe 1004 powershell.exe 2708 withrobot.exe 2708 withrobot.exe 2708 withrobot.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1004 powershell.exe Token: SeDebugPrivilege 2708 withrobot.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2688 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 30 PID 2672 wrote to memory of 2688 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 30 PID 2672 wrote to memory of 2688 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 30 PID 2672 wrote to memory of 2688 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 30 PID 2672 wrote to memory of 2708 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 31 PID 2672 wrote to memory of 2708 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 31 PID 2672 wrote to memory of 2708 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 31 PID 2672 wrote to memory of 2708 2672 30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe 31 PID 2688 wrote to memory of 2868 2688 otdel.exe 32 PID 2688 wrote to memory of 2868 2688 otdel.exe 32 PID 2688 wrote to memory of 2868 2688 otdel.exe 32 PID 2688 wrote to memory of 2868 2688 otdel.exe 32 PID 2688 wrote to memory of 2868 2688 otdel.exe 32 PID 2688 wrote to memory of 2868 2688 otdel.exe 32 PID 2080 wrote to memory of 584 2080 cmd.exe 41 PID 2080 wrote to memory of 584 2080 cmd.exe 41 PID 2080 wrote to memory of 584 2080 cmd.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe"C:\Users\Admin\AppData\Local\Temp\30cb3108c3ddc94267711231a6fe166f13053ae4765c37a88bfd08c8f9235f4d.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\otdel.exe"C:\Users\Admin\AppData\Roaming\otdel.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688
-
-
C:\Users\Admin\AppData\Roaming\withrobot.exe"C:\Users\Admin\AppData\Roaming\withrobot.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵
- Drops file in Windows directory
PID:584
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RuntimeBroker"4⤵
- Launches sc.exe
PID:2116
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RuntimeBroker" binpath= "C:\ProgramData\RuntimeBroker.exe" start= "auto"4⤵
- Launches sc.exe
PID:1052
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD5fd1ac3296444a3696dc4fc1373c7bca7
SHA193b2df42be82d79455dc1c0f0f850656ddd7e57a
SHA25613ae645002224daa84b856fa7d53f3220392d6e284c98f3d8c7f310918dc87bc
SHA5124bb9491b93b0024f8d22410af8b0e1469e1b09bb63727e8b74e3c3442a169311c7005508a26e38c41d0c8f1327e9f5f9003a7de13d7ba2ead6fb42487eb08c92
-
Filesize
14.8MB
MD502071fe1b9c8d6ade8dafa0a71600503
SHA15b547e72386e43c291bceea5b7d0e8f51469cd3c
SHA25600c32e90c14f9c866a30256c8499e753397c7385e4a3fbcdc86515b9ee563faf
SHA5121c4b1c1cb788f08dea954b795d4e0bbd7c028aa5655ce23af805243d06d1c96ef687b0788343182c1d0307e9c76088e4d53e4506e5a4f8d1707001e6549b487a