Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 02:05
Behavioral task
behavioral1
Sample
0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
⌚/gssgsg.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
⌚/gssgsg.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
⌚/withrobot.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
⌚/withrobot.exe
Resource
win10v2004-20241007-en
General
-
Target
0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe
-
Size
13.8MB
-
MD5
59528f2fe5b0f3fa8dc4b39552b13250
-
SHA1
aad3b825d26a11fd6100011708b5b8a1b4877f83
-
SHA256
0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6
-
SHA512
5be6a290a806475ec45b27d5487ec508b98fb8cc2abf14abc5a618f847555ddc0dce8b21d167625dabe828b11903336040fa91c08b9de9c7e7299fc6c7c82e17
-
SSDEEP
196608:s7WP+V6eGTQu75LbenTh5gOGCg+jCp5nzc74SLSbETVF4JnRXb+2IyVa1QSLr0fU:saWV6eGFtWFHxWbSnJFgtbIHfLr252tB
Malware Config
Extracted
rhadamanthys
https://83.217.208.134/9fcc2685c3ccafd/1gjc75ih.m8duc
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 756 created 1196 756 gssgsg.exe 21 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2208 powershell.exe -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 756 gssgsg.exe 2496 withrobot.exe -
Loads dropped DLL 4 IoCs
pid Process 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe withrobot.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2680 sc.exe 2700 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gssgsg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 756 gssgsg.exe 756 gssgsg.exe 2520 dialer.exe 2520 dialer.exe 2520 dialer.exe 2520 dialer.exe 2496 withrobot.exe 2496 withrobot.exe 2208 powershell.exe 2496 withrobot.exe 2496 withrobot.exe 2496 withrobot.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 2496 withrobot.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2104 wrote to memory of 756 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 30 PID 2104 wrote to memory of 756 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 30 PID 2104 wrote to memory of 756 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 30 PID 2104 wrote to memory of 756 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 30 PID 2104 wrote to memory of 2496 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 31 PID 2104 wrote to memory of 2496 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 31 PID 2104 wrote to memory of 2496 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 31 PID 2104 wrote to memory of 2496 2104 0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe 31 PID 756 wrote to memory of 2520 756 gssgsg.exe 32 PID 756 wrote to memory of 2520 756 gssgsg.exe 32 PID 756 wrote to memory of 2520 756 gssgsg.exe 32 PID 756 wrote to memory of 2520 756 gssgsg.exe 32 PID 756 wrote to memory of 2520 756 gssgsg.exe 32 PID 756 wrote to memory of 2520 756 gssgsg.exe 32 PID 2668 wrote to memory of 2136 2668 cmd.exe 40 PID 2668 wrote to memory of 2136 2668 cmd.exe 40 PID 2668 wrote to memory of 2136 2668 cmd.exe 40
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe"C:\Users\Admin\AppData\Local\Temp\0465e7a2189be75275b7ffa6fccbea59a4edb0bb3411137488a30427194725a6.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\gssgsg.exe"C:\Users\Admin\AppData\Roaming\gssgsg.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:756
-
-
C:\Users\Admin\AppData\Roaming\withrobot.exe"C:\Users\Admin\AppData\Roaming\withrobot.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵
- Drops file in Windows directory
PID:2136
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RuntimeBroker"4⤵
- Launches sc.exe
PID:2680
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RuntimeBroker" binpath= "C:\ProgramData\RuntimeBroker.exe" start= "auto"4⤵
- Launches sc.exe
PID:2700
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD5da861aca3a436392e0fcb1a1b5135727
SHA169d97208285a41cd9c3d6228ad1edc634cc3df0a
SHA256bc57668066ddb1ec774e502213af0b10c23d4a1f409199109617e750784c8410
SHA5127d0ff69678b337dce46fbb7e54f602e365bc4d9ba93c24b1dba5aee6a6040a410cefe66679ed8fb2e8cf633a1a72e37d2daf8005dfe54289ba5948e55d574957
-
Filesize
14.8MB
MD502071fe1b9c8d6ade8dafa0a71600503
SHA15b547e72386e43c291bceea5b7d0e8f51469cd3c
SHA25600c32e90c14f9c866a30256c8499e753397c7385e4a3fbcdc86515b9ee563faf
SHA5121c4b1c1cb788f08dea954b795d4e0bbd7c028aa5655ce23af805243d06d1c96ef687b0788343182c1d0307e9c76088e4d53e4506e5a4f8d1707001e6549b487a