Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe
-
Size
784.9MB
-
MD5
e8458ffdeb74037013babec723bed5b9
-
SHA1
6f286cf8019d12e44e5316ff9c977b316aa45e38
-
SHA256
ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270
-
SHA512
393bf123ec916aa0e0bb673b8a4ce94553aa8ba0faab1dad566c68a06201702cb645a3c80554a773f3e76075363426e87cd87fe6acf32ab9c725485d89aa2cad
-
SSDEEP
98304:U+eRiRmEKSe9MrFMXHoO0it7mkvoO0F8obO:JeMeS0ZIdooOAA
Malware Config
Extracted
rhadamanthys
https://195.74.86.133:8754/c0ce23b5aec743c595fe43/d5nfjwa5.wtd5k
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2920 created 1160 2920 AppLaunch.exe 21 -
Executes dropped EXE 2 IoCs
pid Process 1184 Update.exe 2812 Game.exe -
Loads dropped DLL 4 IoCs
pid Process 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2812 set thread context of 2920 2812 Game.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Game.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1184 Update.exe 2920 AppLaunch.exe 2920 AppLaunch.exe 2636 dialer.exe 2636 dialer.exe 2636 dialer.exe 2636 dialer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1184 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 30 PID 1968 wrote to memory of 1184 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 30 PID 1968 wrote to memory of 1184 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 30 PID 1968 wrote to memory of 1184 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 30 PID 1968 wrote to memory of 2812 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 31 PID 1968 wrote to memory of 2812 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 31 PID 1968 wrote to memory of 2812 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 31 PID 1968 wrote to memory of 2812 1968 JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe 31 PID 2812 wrote to memory of 2836 2812 Game.exe 33 PID 2812 wrote to memory of 2836 2812 Game.exe 33 PID 2812 wrote to memory of 2836 2812 Game.exe 33 PID 2812 wrote to memory of 2836 2812 Game.exe 33 PID 2812 wrote to memory of 2836 2812 Game.exe 33 PID 2812 wrote to memory of 2836 2812 Game.exe 33 PID 2812 wrote to memory of 2836 2812 Game.exe 33 PID 2812 wrote to memory of 2840 2812 Game.exe 34 PID 2812 wrote to memory of 2840 2812 Game.exe 34 PID 2812 wrote to memory of 2840 2812 Game.exe 34 PID 2812 wrote to memory of 2840 2812 Game.exe 34 PID 2812 wrote to memory of 2840 2812 Game.exe 34 PID 2812 wrote to memory of 2840 2812 Game.exe 34 PID 2812 wrote to memory of 2840 2812 Game.exe 34 PID 2812 wrote to memory of 2888 2812 Game.exe 35 PID 2812 wrote to memory of 2888 2812 Game.exe 35 PID 2812 wrote to memory of 2888 2812 Game.exe 35 PID 2812 wrote to memory of 2888 2812 Game.exe 35 PID 2812 wrote to memory of 2888 2812 Game.exe 35 PID 2812 wrote to memory of 2888 2812 Game.exe 35 PID 2812 wrote to memory of 2888 2812 Game.exe 35 PID 2812 wrote to memory of 1716 2812 Game.exe 36 PID 2812 wrote to memory of 1716 2812 Game.exe 36 PID 2812 wrote to memory of 1716 2812 Game.exe 36 PID 2812 wrote to memory of 1716 2812 Game.exe 36 PID 2812 wrote to memory of 1716 2812 Game.exe 36 PID 2812 wrote to memory of 1716 2812 Game.exe 36 PID 2812 wrote to memory of 1716 2812 Game.exe 36 PID 2812 wrote to memory of 2852 2812 Game.exe 37 PID 2812 wrote to memory of 2852 2812 Game.exe 37 PID 2812 wrote to memory of 2852 2812 Game.exe 37 PID 2812 wrote to memory of 2852 2812 Game.exe 37 PID 2812 wrote to memory of 2852 2812 Game.exe 37 PID 2812 wrote to memory of 2852 2812 Game.exe 37 PID 2812 wrote to memory of 2852 2812 Game.exe 37 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2812 wrote to memory of 2920 2812 Game.exe 38 PID 2920 wrote to memory of 2636 2920 AppLaunch.exe 39 PID 2920 wrote to memory of 2636 2920 AppLaunch.exe 39 PID 2920 wrote to memory of 2636 2920 AppLaunch.exe 39 PID 2920 wrote to memory of 2636 2920 AppLaunch.exe 39 PID 2920 wrote to memory of 2636 2920 AppLaunch.exe 39 PID 2920 wrote to memory of 2636 2920 AppLaunch.exe 39 PID 2920 wrote to memory of 2636 2920 AppLaunch.exe 39 PID 2920 wrote to memory of 2636 2920 AppLaunch.exe 39 PID 2920 wrote to memory of 2636 2920 AppLaunch.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ea73ef397ac6fb9c0bef8b7df8f8d952e4de3cb0dc207c411564de53e5fed270.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\Update.exeC:\Users\Admin\AppData\Roaming\Update.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Users\Admin\AppData\Roaming\Game.exeC:\Users\Admin\AppData\Roaming\Game.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2852
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5fb3b1908eddb8e4eafa9437510dea273
SHA17aeca2c69a92bfdbf3b791704f23c0a6ad4c679c
SHA2561a6641fef7fcebea9b81d84ed109249217a8b91c7a991791b3611461fd4059a1
SHA5128f8bcbec4f2c7919b54da88557655177a259d31dcdc1c1d14a3fe4b4f947744a9f127496e120fff8375d6b4d684099f4448a03d30cdc9c38d2bfe9da5e2971be