Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 09:32
Behavioral task
behavioral1
Sample
4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
⌚/dhrfsdfr.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
⌚/dhrfsdfr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
⌚/withrobot.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
⌚/withrobot.exe
Resource
win10v2004-20241007-en
General
-
Target
4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe
-
Size
13.8MB
-
MD5
135dfcaa5528b7b142b1eaf2ff1c0e12
-
SHA1
dd627df5ce8f16a9223bcada97e2137869f6e017
-
SHA256
4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060
-
SHA512
0a62c0be7220d03c53aa66ae676bb7b59cc84161671ab9f9cfa09fa71059aff4161bf24be04780f7d930fa8e9dbf5b9383d407e97df88f860c134d595bee3896
-
SSDEEP
393216:cwV/LcRDX5ADxbV7UEtydTCNUB6InvPmRFv591NUtiJ:cMCD5KTxydTsUB6IgJ5pUtc
Malware Config
Extracted
rhadamanthys
https://83.217.208.134/9fcc2685c3ccafd/evhh1lph.0xkmk
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2092 created 1200 2092 dhrfsdfr.exe 21 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2720 powershell.exe -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 2092 dhrfsdfr.exe 3068 withrobot.exe -
Loads dropped DLL 4 IoCs
pid Process 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe withrobot.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3008 sc.exe 1896 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhrfsdfr.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2092 dhrfsdfr.exe 2092 dhrfsdfr.exe 2840 dialer.exe 2840 dialer.exe 2840 dialer.exe 2840 dialer.exe 3068 withrobot.exe 3068 withrobot.exe 2720 powershell.exe 3068 withrobot.exe 3068 withrobot.exe 3068 withrobot.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 3068 withrobot.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2092 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 31 PID 2476 wrote to memory of 2092 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 31 PID 2476 wrote to memory of 2092 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 31 PID 2476 wrote to memory of 2092 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 31 PID 2476 wrote to memory of 3068 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 32 PID 2476 wrote to memory of 3068 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 32 PID 2476 wrote to memory of 3068 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 32 PID 2476 wrote to memory of 3068 2476 4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe 32 PID 2092 wrote to memory of 2840 2092 dhrfsdfr.exe 33 PID 2092 wrote to memory of 2840 2092 dhrfsdfr.exe 33 PID 2092 wrote to memory of 2840 2092 dhrfsdfr.exe 33 PID 2092 wrote to memory of 2840 2092 dhrfsdfr.exe 33 PID 2092 wrote to memory of 2840 2092 dhrfsdfr.exe 33 PID 2092 wrote to memory of 2840 2092 dhrfsdfr.exe 33 PID 3048 wrote to memory of 744 3048 cmd.exe 41 PID 3048 wrote to memory of 744 3048 cmd.exe 41 PID 3048 wrote to memory of 744 3048 cmd.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe"C:\Users\Admin\AppData\Local\Temp\4376c7ba6929c92cb67e488f22238b2b66f0ba593d339493afb6cc79eecd0060.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\dhrfsdfr.exe"C:\Users\Admin\AppData\Roaming\dhrfsdfr.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092
-
-
C:\Users\Admin\AppData\Roaming\withrobot.exe"C:\Users\Admin\AppData\Roaming\withrobot.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵
- Drops file in Windows directory
PID:744
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RuntimeBroker"4⤵
- Launches sc.exe
PID:3008
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RuntimeBroker" binpath= "C:\ProgramData\RuntimeBroker.exe" start= "auto"4⤵
- Launches sc.exe
PID:1896
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD5f75fd41b890f7d1915656eb3c349d231
SHA1a6dac338a2c4118b0b642560a1c0b1d6f10863c9
SHA256069c13063d9f5a0792437bf219b30dd2e3c6c1fa498970ad61505571bbdf1adc
SHA51224f2c673f5530bf09b66d8ea591d869e2625b91cf3d3953f6a75052fa18b16b71ae35730b2de1b11760d22e686b23716945b50da46481bd92b65f757f6222716
-
Filesize
14.8MB
MD502071fe1b9c8d6ade8dafa0a71600503
SHA15b547e72386e43c291bceea5b7d0e8f51469cd3c
SHA25600c32e90c14f9c866a30256c8499e753397c7385e4a3fbcdc86515b9ee563faf
SHA5121c4b1c1cb788f08dea954b795d4e0bbd7c028aa5655ce23af805243d06d1c96ef687b0788343182c1d0307e9c76088e4d53e4506e5a4f8d1707001e6549b487a