Analysis

  • max time kernel
    93s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2025 00:30

General

  • Target

    exacid1.exe

  • Size

    1.2MB

  • MD5

    a408f39cef6236f43de3038325c1797b

  • SHA1

    856066d03ad7faae5dd60d8e9f641fa4fe623b63

  • SHA256

    978de0f64b32068bd7891c870ca55615a9937b3b29b49a5d64dc54382919aca8

  • SHA512

    7ed362d9ddfc10593fc64da4f6392cd7b21155da53ea147c22b6bb913bfc321280228e02b3fc8dc5c7f0c54b878d62acec2d92a4b8a07c1c137ecac938cef6bc

  • SSDEEP

    24576:XBbHHLIXfiCWjNESzV01yB3nDk/5LPIV9hN+EeRmGBlCdXgr:xbVCAHJI/5LwrWvvCdXgr

Malware Config

Signatures

  • Detects Rhadamanthys payload 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3052
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3312
    • C:\Users\Admin\AppData\Local\Temp\exacid1.exe
      "C:\Users\Admin\AppData\Local\Temp\exacid1.exe"
      1⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy Radio Radio.cmd & Radio.cmd
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4832
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1736
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:548
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4992
        • C:\Windows\SysWOW64\findstr.exe
          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1480
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 750915
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2312
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Image
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1456
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "Allan" Bangladesh
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1796
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 750915\Louise.com + Cohen + Rca + Claimed + Seattle + Espn + Tanzania + Astrology + Fitted + Invest 750915\Louise.com
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4360
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Committed + ..\Joke + ..\Proudly + ..\Ur + ..\Rescue + ..\Unavailable + ..\Knight + ..\Transparent + ..\Bye F
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4120
        • C:\Users\Admin\AppData\Local\Temp\750915\Louise.com
          Louise.com F
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4464
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 928
            4⤵
            • Program crash
            PID:4008
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1008
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4464 -ip 4464
      1⤵
        PID:2216

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\750915\F

        Filesize

        631KB

        MD5

        fe3ffbb685510abb7208608ed51bba84

        SHA1

        ca50015108cefdddb82d732fdfadd0290e94c4ad

        SHA256

        978e554b9993c387406ddf98f207fc028176c2b49c371bbaa75b8a8a575230c5

        SHA512

        59c696f6457d58b0fa3a37ebb6a88f79416128dbd94a1e77bf7453f58effe19df9f76640b00a9fd43773e05b18dff7c59d1f22d8f3fbbeb7f41dee8d52948f58

      • C:\Users\Admin\AppData\Local\Temp\750915\Louise.com

        Filesize

        959B

        MD5

        1773d8d1b6f040e131650628e3019c20

        SHA1

        e9239343f16cd065bdcd93e6ab1b4035cd382f01

        SHA256

        977771ea8d11391dbb1dfbd4f38a4561f20ec473f890f630145c6f79b8c0e2c4

        SHA512

        317263e7d1282e8235c9bcee2e48c21c488c1a2780729a7aa8e8b84fde77adcdcde8cdd32d5a297c0ff88a120e6e27a47000a5b51e76c11a7a8539a996eed034

      • C:\Users\Admin\AppData\Local\Temp\750915\Louise.com

        Filesize

        925KB

        MD5

        62d09f076e6e0240548c2f837536a46a

        SHA1

        26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

        SHA256

        1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

        SHA512

        32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

      • C:\Users\Admin\AppData\Local\Temp\Astrology

        Filesize

        147KB

        MD5

        e0e59d896743ed99efe27ce8ef577871

        SHA1

        3501259a297dc208ee83eb686e73f19355c2fda9

        SHA256

        938cd8a6ef53760b0cf10e38cf433cde74f803c62e17be4745819f0a0dbe1c54

        SHA512

        daf4451e9b6d3dae625113138366b1a76a542df7417ecd0644dc59e2284116f144907391e4d65b010e5ec224ff4d7046eba7d65411328e5e32584a960a21bc16

      • C:\Users\Admin\AppData\Local\Temp\Bangladesh

        Filesize

        964B

        MD5

        af5a9db699fb4e1c2c5125ca06c46df3

        SHA1

        800ca8a768ac484882b5a82ff53357adc2e155a8

        SHA256

        4053bb989625ddc9c7c00a2005159c5b08288a3b2d1ff8958c91a6f7b1b4ceb8

        SHA512

        1141e8d9f0bf8932a5493a01e212d829de07cf6a5dc2cf5ebd7226406c1f3c03150c9335fbf70c9fba2c8a9cea92da11fcf8c4301a4741f467455979f08eacb7

      • C:\Users\Admin\AppData\Local\Temp\Bye

        Filesize

        91KB

        MD5

        1be298591623ad6c0f50014a8903712f

        SHA1

        391d84b0a12cde6a2b87fd91e5474116288290ee

        SHA256

        4ba4d7636b0cad20db4dde3781d1645cfeba927f25f6cf18b05c19634d10b3c5

        SHA512

        3f6c5b626c19682ef7f3e3832ffeb8e6b37e1aecfbf3883ac27ece9ac3f7b212d4f023600b9d7165ed3f1329ba72d41d248db379d51927719b54f648d06e581c

      • C:\Users\Admin\AppData\Local\Temp\Claimed

        Filesize

        129KB

        MD5

        4b6d18552484cdd8a6deb3077cf32fdd

        SHA1

        c893203b03fbaaab7aa55269dc3ecf02becd8a16

        SHA256

        c8a8d3b83353f99d0d0c64c9e2a00f6a69fe93b7424b2be1562426127c0787d6

        SHA512

        79d79122f9d223cdd1ac6b5c4e20251558ca6274dfa4251332d958e2383809bf257558deb7d660c50b26d9950a638dd23d4b3fbb53571d5cb2f1c4d2c6403fed

      • C:\Users\Admin\AppData\Local\Temp\Cohen

        Filesize

        90KB

        MD5

        605ff257d35d3c9a097b0e97a51627ec

        SHA1

        c4746bed66d3a8ab6a3c856ca3d2e4ffdb3f9033

        SHA256

        7a58897cf6648120946afbf9dcb80393179bb6196afea4e7fb1a0eb636e066a1

        SHA512

        bd499cf0f158dadf2135bacb09eb5a8c338d0d37aab71709ce8fca86050f1c4287f0413c9825c4681e143b3641ef103c93dc05d1281cacec1c864048c4873bd0

      • C:\Users\Admin\AppData\Local\Temp\Committed

        Filesize

        54KB

        MD5

        d821e2b63580f332cb6d40df591b9a88

        SHA1

        58e2aee88db82f7ca51de0f694e8ca554c33a8fd

        SHA256

        3d8d15cf8f108b86a0e3e5be964b7a6c349f6d3d85ba75c411fbcda264260ff6

        SHA512

        b5688915b250bd6e66c676d7accd18d73848ba9b13c8cfbae0c7a6314f58d4150bf9f6c9623a3f4923c3194228a11c2e76fafbf1fc835426ba74ab9f7ffb6763

      • C:\Users\Admin\AppData\Local\Temp\Espn

        Filesize

        60KB

        MD5

        7e2c12b240f8bfecd37ead542879efa1

        SHA1

        5a6b37b3653430e7d4a9d11e8b9a5b9d943c254b

        SHA256

        490a5ca5c9fdeae90cbc4b9fdb24d876238423b73d705aeee3c65fb62d99b700

        SHA512

        fe913dce7bfff9fa79a3f56fd25a97c7a246acda42641c6d428ca5580161f429b427bce330e29ac42991948abaa2d24c0d2fa81d15bfa85939ba812ebd638ab9

      • C:\Users\Admin\AppData\Local\Temp\Fitted

        Filesize

        108KB

        MD5

        41a1bb5d64a34dae1cc56a8a7d07f195

        SHA1

        b7d33997622f8e784c34097ef079c22aacbabc8e

        SHA256

        686bf8d3988f9f8f77aa8fbdc20ed453f81446de1267fb939a5343bb1190332c

        SHA512

        bd2c0834adbbb1dc7957da470be37c8adb833d568a04932afb8f29818ddf3513a1f61ede67fff85f9e098134a1cd32cc24caac5f333f8cf61e084f55dc3a26a6

      • C:\Users\Admin\AppData\Local\Temp\Image

        Filesize

        476KB

        MD5

        a3fabda4922043f202636f030d91415e

        SHA1

        f52eef855c6315ee32b8fb5cbfd736cb6e30722a

        SHA256

        31f176dcafe6f44db0abb607d973ec122252ee106d3a8464ebf009ca320b9aa2

        SHA512

        4c9060901fa5da5b5e0ae07ee6b64be01e82024c11c34fad4dede9d42d06ef589a09cb7326b7ba1795367b52c8fd36a342195b95d4077205898b3379fddcaa92

      • C:\Users\Admin\AppData\Local\Temp\Invest

        Filesize

        95KB

        MD5

        840cb10d8da8f9a5d2e6ce5589ddecf6

        SHA1

        0dc7875ba564d8fe91b13a34eba531920cac0575

        SHA256

        21347f46a097e78abf289b9d626b4b1b571fc16bcbf280937ee3e70ed08a4700

        SHA512

        3b8cb66538254ae248bc334406e1d8288cfd21785300803e5ddf7797dd4d59ccc2bb460a767fcde2125f2831cce89766cfec562aa0a2185321189ad5616d8826

      • C:\Users\Admin\AppData\Local\Temp\Joke

        Filesize

        50KB

        MD5

        b23484479d2135b6faf5a8d5014a5e52

        SHA1

        6adadf32e1467bc3fc2ea0be6e08c1a0130d47f8

        SHA256

        b005d3f9a19520e67c403459540f7ec8a5769a1524418e5489197ffce71d58dd

        SHA512

        d618607b1bfeded9985b8a0d178be75f0cece042aee10eb830edc1d9e7c1fc721bd0268cb4d11840d2f374f97e4eed2161f91ecf46811fc1ccabf1c652d066db

      • C:\Users\Admin\AppData\Local\Temp\Knight

        Filesize

        86KB

        MD5

        70ca3f70c2cc90f14e411ba404b6b7d8

        SHA1

        b1f002106af154839697124d34aa48a010daddd8

        SHA256

        742a79c9c0e28592fb844f6d136b00b84c450fbd9668450bc13b78f5e6a0817f

        SHA512

        bb4a8f58d3405531a64f4c1bdd88040329206d27f308adafd7071a7ee222f8ada619da9e260195e0ee3a3e5ce368f0274bdebe7c3c6580ebd2e8d74018245219

      • C:\Users\Admin\AppData\Local\Temp\Proudly

        Filesize

        54KB

        MD5

        a34ae33a22b4911fa7d843998e50611a

        SHA1

        1d1361171769c4f0c9542d86af294fb61cd26d4c

        SHA256

        4a0b98dca7e234c9bd35e719936ad8661c0ed5487bf7b8279a4087eac70059d1

        SHA512

        d22b2b331400091a61d6a87aac0d34816f3f0f8ed80643d9a9232551300169e7a0bac1054d719008a39d06729237bdc9a7ece7d2d59468418489f2508cf12dea

      • C:\Users\Admin\AppData\Local\Temp\Radio

        Filesize

        15KB

        MD5

        8c23cb4110dbd72072c4e0d8fafc8500

        SHA1

        f2f01a449593ef9f301cb176cfa215a4bcd6ac6b

        SHA256

        c37e9a72ac2565d50eaa0eff1340ca1668c063645f95fbbd7aef29c97a593b84

        SHA512

        6c7008b2ab188442027712ab4835afff79eb12282bcfbb1ea74834fa5118b0855726f5a0446ce2ba2a55bdbd02258611c28b0c2933290ef022f3e143c504f66f

      • C:\Users\Admin\AppData\Local\Temp\Rca

        Filesize

        53KB

        MD5

        96f5abc8b52defb180e9063d9a9a125d

        SHA1

        dd9f5898c22d3a153aa490bdd8f7dbf54986135c

        SHA256

        145029900af465bb72e5240268fbca67c325843d81c3ca42cb6f9e75572f720d

        SHA512

        f930c230ebf2d5521a565f0c8e986e076598a550803d4cdaadf14307caeb894e1de16c26b64e8d0282a41ac1e6e48578d5b02faf662d04b29f0769d5097f293b

      • C:\Users\Admin\AppData\Local\Temp\Rescue

        Filesize

        64KB

        MD5

        91a684cd9bc55e4d9dc0ef1eff72484e

        SHA1

        803952d4dac1aae17b284e8209f54d6478d6d094

        SHA256

        7f477975a1ee1b44ec1741cf677e65bb96cc7ad09dcf84a3e47a8fa5ec564512

        SHA512

        b12112a3cb30894cb75cd3368f8f72a42f5cbc414405526dbc06108f88690315e3dbadf16baa792f30baa18e19cc593f957617441e2550e53479c8f9f964f329

      • C:\Users\Admin\AppData\Local\Temp\Seattle

        Filesize

        99KB

        MD5

        1ac5eff9d2ef01220dd8d9d092074d7b

        SHA1

        00f4312b3c96cedc4f6e310dbe41fb61eccc785c

        SHA256

        6cb96756a45d4ef04838031c7e14e3dade9bbbd88575924ade9fc56e24ee9b4d

        SHA512

        29afbdd8bb5b1267d8fd57ba97b8929dcf0574c1a5959c4105639a30dc647fb2a9c6d05b29ed96aec398f84ffd3b1b365d880997046b497e9c12d10636ed5ed9

      • C:\Users\Admin\AppData\Local\Temp\Tanzania

        Filesize

        143KB

        MD5

        9e1d7827359c799133318765cf9dbace

        SHA1

        a789c11e8dfcf82c7811e3c3790343543325cd88

        SHA256

        54e5755c2268a0bc265425abed2e3ac700f6f816a316f0bf4eae4d2f83c92e9b

        SHA512

        aad52de6354ff54659eea8675d31df57d414e0ec2b629dcb216c8fa8db99b6d8cba7660a9565669d6e0d94aae65659303c41abbe34265a497409125e367ed8c8

      • C:\Users\Admin\AppData\Local\Temp\Transparent

        Filesize

        71KB

        MD5

        c6ee038292a86450536fb49a68261c0a

        SHA1

        6895b53cd7c504c018df7ce24a301663ab1508c8

        SHA256

        e2baaf1ddb47dc2f98276e1ee5028155907371b270a4c8baaec7be6b7a92350e

        SHA512

        2342d02e281861a00ef68e2b319470c7840e733287b253abf109e7144a2bc5dd3ef8f98023a8bd10516d22c53933e7b08a6f948f8d676b4af055c4267ac6be53

      • C:\Users\Admin\AppData\Local\Temp\Unavailable

        Filesize

        93KB

        MD5

        f6ddccbdb7aaca275748eadf80b2fe66

        SHA1

        6356ce4f6335842828054ce36c8394bc63ebfed9

        SHA256

        fcf9b09e22833b1169b273a448214f810a74a167e688dcfde69d7f9e11880f9c

        SHA512

        d7696e0f20c35716695ff6831d355eb7092315a6d48dd333ba29378021adbfcfa5b91185c0722d0fa6c046e028f6de20860b37e20bb90d86b9e7b97f8b2291d6

      • C:\Users\Admin\AppData\Local\Temp\Ur

        Filesize

        68KB

        MD5

        073dec9c18e04d43d37f4dde54056b2b

        SHA1

        77210dff5576bc81dc40d11d1fd255816c971525

        SHA256

        bfee0639fa4503a3fef6c894ab98ca194a26d79063468e36a47ac2f09ce615aa

        SHA512

        f04fd58cdd4779e5f435257273716d6c6ae82b839d13bf75e8a814647d72ffd57c64897b72aad93ff8aa7b84431446cb70a71c6483cc1f43d05109127384efaa

      • memory/3312-432-0x0000000001200000-0x0000000001600000-memory.dmp

        Filesize

        4.0MB

      • memory/3312-433-0x00007FFAD1C50000-0x00007FFAD1E45000-memory.dmp

        Filesize

        2.0MB

      • memory/3312-435-0x0000000076A10000-0x0000000076C25000-memory.dmp

        Filesize

        2.1MB

      • memory/3312-430-0x00000000009D0000-0x00000000009DA000-memory.dmp

        Filesize

        40KB

      • memory/4464-420-0x0000000004DC0000-0x0000000004E41000-memory.dmp

        Filesize

        516KB

      • memory/4464-422-0x0000000004DC0000-0x0000000004E41000-memory.dmp

        Filesize

        516KB

      • memory/4464-425-0x0000000004E50000-0x0000000005250000-memory.dmp

        Filesize

        4.0MB

      • memory/4464-426-0x0000000004E50000-0x0000000005250000-memory.dmp

        Filesize

        4.0MB

      • memory/4464-427-0x00007FFAD1C50000-0x00007FFAD1E45000-memory.dmp

        Filesize

        2.0MB

      • memory/4464-423-0x0000000004DC0000-0x0000000004E41000-memory.dmp

        Filesize

        516KB

      • memory/4464-429-0x0000000076A10000-0x0000000076C25000-memory.dmp

        Filesize

        2.1MB

      • memory/4464-424-0x0000000004DC0000-0x0000000004E41000-memory.dmp

        Filesize

        516KB

      • memory/4464-418-0x0000000004DC0000-0x0000000004E41000-memory.dmp

        Filesize

        516KB

      • memory/4464-419-0x0000000004DC0000-0x0000000004E41000-memory.dmp

        Filesize

        516KB