Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2025 20:25

General

  • Target

    modest-menu.exe

  • Size

    150.0MB

  • MD5

    0dc0df7f665999bf4f5f925fb8e29d17

  • SHA1

    d1f85a67e6fe4fd57cc87fc9b0cfe1f44bb2b7fc

  • SHA256

    0f991b399e9957f3f04fb04adac413d95433aa7b52694cfc416f38d946854738

  • SHA512

    adf1377238d887e3e0bb9f23318862647e8fbda4c55640ec5b56533c9aaf9ee93d787bda13bf7e131c40bccda175f1d5057e008ebb0763a16be3b0ab8abed425

  • SSDEEP

    24576:/nhVSVjJRWKDcdiKsBI0Qa5KnsBpTMTcKE9B9tz+Ugk0H/n31h:ijJR6OyQL9B9+k0HPlh

Malware Config

Signatures

  • Detects Rhadamanthys payload 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\modest-menu.exe
        "C:\Users\Admin\AppData\Local\Temp\modest-menu.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Writing Writing.cmd & Writing.cmd
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:884
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1444
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3056
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2012
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 56423
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2732
          • C:\Windows\SysWOW64\extrac32.exe
            extrac32 /Y /E Deserve
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2820
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "Snake" Revelation
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2536
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b 56423\Pmc.com + Ed + Aaa + Nuclear + El + Marathon + Compiled + Randy + Eyes + Recommendation + Sets 56423\Pmc.com
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2224
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Kept + ..\Weights + ..\Decide + ..\Freebsd + ..\Explicitly + ..\Hourly + ..\Reform + ..\Novelty + ..\Centuries s
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2908
          • C:\Users\Admin\AppData\Local\Temp\56423\Pmc.com
            Pmc.com s
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2924
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 5
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1744
      • C:\Users\Admin\AppData\Local\Temp\56423\Pmc.com
        "C:\Users\Admin\AppData\Local\Temp\56423\Pmc.com"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\56423\Pmc.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • C:\Users\Admin\AppData\Local\Temp\56423\s

      Filesize

      645KB

      MD5

      d6c49b01551d6a8207f238791f930c21

      SHA1

      b7af7089879dbd9e982ff20211d81810997be44a

      SHA256

      c833a82310ab34838608070827c554f80e1c6c5e6f8bc3f9a8e6b37a1639cbb6

      SHA512

      eea2aa8acb9ebb320dfec655ea7ad456461f7beccf235675f2a1d3c594b7495035f921082663890cfe8771a6cdf059d6078a10cbd22b66828b09167bbb639e31

    • C:\Users\Admin\AppData\Local\Temp\Aaa

      Filesize

      109KB

      MD5

      2974ac6bea7eef33808d2295c8234ef1

      SHA1

      8227ef9089238a53f4a7197bcc25730223b801b6

      SHA256

      9cb88208721ecec2ae998132d378016e58a8fe9cc71e30bd43f620e3b5ffdb2f

      SHA512

      788f681a39830e845fa11a8d949e68d852d65ac656207e28a1b1381b2f9c65cf8f34c73ba0e633d5c6eca055b03f03673e6faff5b5205ced73271869258e85d5

    • C:\Users\Admin\AppData\Local\Temp\Centuries

      Filesize

      2KB

      MD5

      2a57c8ff53975768454c606e70d7f24f

      SHA1

      b296af9aaf3946868a449829a336793eeff3d503

      SHA256

      58718586544b5d8632910299078e06d4eed022f6b2347b39169b454a50d2e241

      SHA512

      212fba3253d8b689a3f39c60532e4d0ba88c12aa80fa1a650ebe5e015e324c96cb43a7ab8ab11cdfaf2d15ae36fac893c8f0b914fce64bb2b428e7be0b569409

    • C:\Users\Admin\AppData\Local\Temp\Compiled

      Filesize

      109KB

      MD5

      6b6c0b854d39cb9b527bb6e5fc5f0d11

      SHA1

      4eca34bf46d4814db07b5911a14741b879405303

      SHA256

      427ee6a3043a91493d8f3df05c0a686beba9b30e959626b759cb451801e1b903

      SHA512

      84f3b6c7931ae6eb9c1c7c9984cd2ab7c0af699e444576afe7241e40ebe16dd02547c6f5b942579dfeca42cad1a7b6a692429614d62683b1486b1d744e2f0117

    • C:\Users\Admin\AppData\Local\Temp\Decide

      Filesize

      88KB

      MD5

      9cf824ef4b6d516703b625e32a49d29e

      SHA1

      b8b57627185edb5feb6e57b081f4da1bd9b4f756

      SHA256

      84b189cff1b620f5e8478df53c2cbca8ae22d649c2fd410ab2748314ad82824a

      SHA512

      56c1c2220a3cab51f830103f6a714de511d26f430dbc534976d40f4d744a29515b1de2b07803b899eb86ecc894fd85d58d0a5ee58c6b39cda72383533eec4b93

    • C:\Users\Admin\AppData\Local\Temp\Deserve

      Filesize

      477KB

      MD5

      f93af5f78223bd9df3148b27d2561c87

      SHA1

      d1c006a2bb2e6489b158cff6eb058070db1fa13d

      SHA256

      19691902990fa29e41f443acf597d5d6f22614e005a78e7fb2c3fc016298934c

      SHA512

      19f72f0e2cf6878c42b71e7164895f76471a008fa806e4214feb1aa5fddfee7475351a2def6549c0d1f05bd832aec9b3ad48a98bfc77d52a5cf0db7727a5494e

    • C:\Users\Admin\AppData\Local\Temp\Ed

      Filesize

      149KB

      MD5

      2f7a590ce7690847b84e96dc36802b2c

      SHA1

      f18861131a8a08077c4ad4c575e486c03433d950

      SHA256

      2dd9248c1a4dbabeb68fe8311147603c8549a18fe253aa83a63de086b357c0cd

      SHA512

      fac5f9f0b713625078fdbc0ebaf7b8d69b902bbd98154c1bfbc0b17483979099d2a5370b4f101f9c8da763ac40d3fa51859c64b832cb9bef865a7ee86eb388c7

    • C:\Users\Admin\AppData\Local\Temp\El

      Filesize

      86KB

      MD5

      c38ba458624f16481d214e0f325e4cf4

      SHA1

      282529ad3857619a42bc4bb650a5f21d5222434f

      SHA256

      82916dd16d8d6e5677200b3a6d54b7e0dccc30291bee2328f932294377a2bf94

      SHA512

      31861a171526f6992a744cc2ee6dce07e59fc1c513655aaca2461a1d33fd98bda1fa6057acb031b5b4bf21bcc2a8ce4018c731ae1c4a747b7d41540ab6a0392a

    • C:\Users\Admin\AppData\Local\Temp\Explicitly

      Filesize

      91KB

      MD5

      8d7e0b52ecab22215851afff0d323a98

      SHA1

      cb144f7ce72715a5c9585f71daec6f509bd10e23

      SHA256

      b85c843d3e7832a20ee618ca1903fe1658caf7e66ad9259d5a4314c73e6819ae

      SHA512

      7eb729669c7f69e3eebbd85b377d8e71cfe1e48f33bba318c77d2f0203e0c0c6802c2c8432abd2532194adb8e567d78792a507991ebab64036e795f80968fed5

    • C:\Users\Admin\AppData\Local\Temp\Eyes

      Filesize

      81KB

      MD5

      4818b101d93f0ef88c62d2bc34ebd805

      SHA1

      049c8e2643d4361ae9ee7c64faa28a13922887d5

      SHA256

      852e592bc0c87a9775e172c8588c5da046aaea5d723598959174eda165f53437

      SHA512

      180b766c9e39b96ddaf33bba9a46cafd53e738671a8069f0cfbfc96cb58883a6a7f72c8a0fdc4a3703b0c292b53c4c427186c9ddd68b6fae38c0e4a46747692f

    • C:\Users\Admin\AppData\Local\Temp\Freebsd

      Filesize

      77KB

      MD5

      c4128142e5d3749e050c27f6192e6e3f

      SHA1

      b56dd8d652ed9f9bcdfd30961e7e05bded4fcae5

      SHA256

      18fe4dedbc0e860da16595da93dff113c03b99728e69ee473725d7b2e1de1c78

      SHA512

      00f20f3d80ab6cedef4b49279d89aca89148637fac60466c80371d53541e0eecc15a16e2943534e45bb9bbf04222ba22ad97af457cc2cff03fa369458ee83d39

    • C:\Users\Admin\AppData\Local\Temp\Hourly

      Filesize

      64KB

      MD5

      802527abf2853247b98b3fe2ea049492

      SHA1

      aa0349f6f9d5abd05b473da774e9d6bb74e86899

      SHA256

      f43b081db0e96972489968ed7929f7822dc4faaef065542478dfdc5a208f0b3f

      SHA512

      56d77bb1b4d5379f07ff4dccc2e77619fa2647f7f75acb8e84dc5b83af1510271da94bde5db5165b711956808b4e78629ab689e5b9ee607345022ab3532d5da9

    • C:\Users\Admin\AppData\Local\Temp\Kept

      Filesize

      69KB

      MD5

      230dd8cadbdbda5d40e65d8503881294

      SHA1

      763e192e7fee26d0e29be931e44a55c0a187a649

      SHA256

      4d809ae84dc9bea895ae2881ffa7af6f8c2947688722265d770330ab97f3ec4a

      SHA512

      0c93e75f618ee610ce1e29637ae0fb06a5fd8c5c5bf7ffcc17b0003358f76867324508db23759e632d2b3e90f09cacedcae0a78afa284d3664753c5c0f195109

    • C:\Users\Admin\AppData\Local\Temp\Marathon

      Filesize

      58KB

      MD5

      bae091f47cb30a602dae5376d0db0274

      SHA1

      f038962bb5cc5836c77cd7d9ea3aeee0c28cbb9f

      SHA256

      93817ab9a6278d3f98501cfeab0b65fa0a6354f02bac3c5d99513681d2391fd9

      SHA512

      286ab5111b4ab66ebc1cb366ed1c0c6c5506b9dd7dae742e13c70de9ff8f45d2de91ce92c72bfc31ac2c96a1038681737d997e324d9d2790071bca560557b617

    • C:\Users\Admin\AppData\Local\Temp\Novelty

      Filesize

      72KB

      MD5

      a47512d45e2f51d8d64b48057c109cf8

      SHA1

      e53ea87ce0936d1b7b70192387376551ab198373

      SHA256

      1699a3e02ccc4fcaee67ae5a86f96fce613a81d0261d869748beef8d5aba0533

      SHA512

      873f34bc6ef7878992990844bb4215a19dd4270b87a6e98c4d55eb67f5014c212956c9802f753d3c5f80a25ec1a1538669b0fb78b26fb81f070f1e7555a56bb2

    • C:\Users\Admin\AppData\Local\Temp\Nuclear

      Filesize

      134KB

      MD5

      c34124f33e6f3e5608fd6794753442c4

      SHA1

      19eee59512371ecfbb9aef872268c75383b44b33

      SHA256

      4a3feb1b1cb8ba4cc83c65963d71e9b41a88365d5b47ec4124425ef0fbbf4fc5

      SHA512

      d17bada6ec07eb3e028a9e8974d7c89863a27bf6f0c75f026f0145580dc0c9635a8260c169b293accbbf92dd54d04831a43f7d28be1dd15949b0206b065bdf2c

    • C:\Users\Admin\AppData\Local\Temp\Randy

      Filesize

      52KB

      MD5

      025b3e71bb801e87925a390865a5b599

      SHA1

      c6363448b6baa1c8fdfac8e0e787619dae11d157

      SHA256

      9b392ec6639b0e57abfa17cb379ac024aeba94c951eca932c1fd7c900c59f3e3

      SHA512

      d4ae648242ec08d9791542e70e436b7a2e5d6974654372b9de034bcc895faa15cfbf6b999453e5132356e1218939728d1721e1f20a5c2cecb5e863fd5ab9a864

    • C:\Users\Admin\AppData\Local\Temp\Recommendation

      Filesize

      101KB

      MD5

      e25dfc0953341b9bbf95313836af7e39

      SHA1

      5fe84e947143c7ff2fb0fed7b121d79298ac51e2

      SHA256

      af8370249a43d4a00dc214bb9736338f290f81efb5dcfab40e31ad75a552b838

      SHA512

      411c355794b8d02bababdb20acec76ed1b9b373177b117ae8c8e3d19b0ec32b890ecc3e10588f677f7f3a44368177cb8fd9fd66ce52ab418255e38f9af37f3e0

    • C:\Users\Admin\AppData\Local\Temp\Reform

      Filesize

      88KB

      MD5

      e557f06f416bab5623a3d5280d01f90c

      SHA1

      9f4da960005e5906eb616d62ceb6f87c91f1739d

      SHA256

      8a2c4393b98e391976e09cc37ff17ae5cc22b8674e9ae1bf28787d5718f929c9

      SHA512

      217ec9415f53166fe73252bba37260bdc0b0af012967067206155e5657ae1b9999d6e7c2b91faac379dadbe18cb8fe0f93b2a8b425485846cda995a5f98559e9

    • C:\Users\Admin\AppData\Local\Temp\Revelation

      Filesize

      528B

      MD5

      b06b8065aaddd9030da01efe25961233

      SHA1

      25496680c343e8ca5d5ba611fb03a0460ad42ee7

      SHA256

      c5bc6099c73359a0ba8efb28099b5b26482c4f797a1a5521cd260add6fea8848

      SHA512

      c2b96633ed77d4d3d5b14103351520dea116baefeaeed5b3910107e6402ff4aa0e772a5956ea97afff742867fb8eaac8a0c874dac716612d8c5c7b8a00924255

    • C:\Users\Admin\AppData\Local\Temp\Sets

      Filesize

      45KB

      MD5

      bf8eb76a6d4168ca6873b670c163fd14

      SHA1

      55242fed1e7609159863fb85a2a497e2fac923b3

      SHA256

      56635a2232982c9902eaadfcd3e02f59367c1a08d4d696cc5ac5ed21acb5d665

      SHA512

      7fe63f7373840b2dab802a85c0fb4d40890664ed212035245f8d450bac2410066ec5b3b2b3a0decda7dab48abad264f045d00cbe0e0061bda33cd0e9ec39d82d

    • C:\Users\Admin\AppData\Local\Temp\Weights

      Filesize

      94KB

      MD5

      ddd184cc3b85cbcf201cfba3b24027ac

      SHA1

      fba659451ee304bb616dcf791b5f061b600cba29

      SHA256

      22c72dfcbc398dae1b7776e7a3798a4b8b6eb19c6ce208f0d7bb04a5a1042b4f

      SHA512

      98d9572a12341dc8a3f0b94e900899689e4b3a1a261adf1edf0bf1f98cd4e3396bab6f80cb7ea923d5abdb8de42e3137531fe2d2b248d36690274cda4ffaf226

    • C:\Users\Admin\AppData\Local\Temp\Writing

      Filesize

      20KB

      MD5

      e6a8293d401eaa4c0e6cb72ef0729554

      SHA1

      30a7d892493c3ce211727d4668a74e447b99fffb

      SHA256

      9bdebbd6f281ccf0924d900bfe7095ee06b253707685ccbab871b14a646de834

      SHA512

      c055decb95c690542f6b2363b4831e5487dc1eb53d6c66e301eabc554fad69a6da7539b410c671243b8d3a3d923cfcba0a006e06f8929e2ad193a7d09c7f69d6

    • memory/2252-525-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/2252-528-0x0000000002850000-0x0000000002C50000-memory.dmp

      Filesize

      4.0MB

    • memory/2252-529-0x00000000779B0000-0x0000000077B59000-memory.dmp

      Filesize

      1.7MB

    • memory/2252-531-0x0000000076650000-0x0000000076697000-memory.dmp

      Filesize

      284KB

    • memory/2924-517-0x0000000003BB0000-0x0000000003C31000-memory.dmp

      Filesize

      516KB

    • memory/2924-516-0x0000000003BB0000-0x0000000003C31000-memory.dmp

      Filesize

      516KB

    • memory/2924-519-0x0000000003C40000-0x0000000004040000-memory.dmp

      Filesize

      4.0MB

    • memory/2924-520-0x0000000003C40000-0x0000000004040000-memory.dmp

      Filesize

      4.0MB

    • memory/2924-514-0x0000000003BB0000-0x0000000003C31000-memory.dmp

      Filesize

      516KB

    • memory/2924-523-0x0000000076650000-0x0000000076697000-memory.dmp

      Filesize

      284KB

    • memory/2924-513-0x0000000003BB0000-0x0000000003C31000-memory.dmp

      Filesize

      516KB

    • memory/2924-518-0x0000000003BB0000-0x0000000003C31000-memory.dmp

      Filesize

      516KB

    • memory/2924-512-0x0000000003BB0000-0x0000000003C31000-memory.dmp

      Filesize

      516KB

    • memory/2924-521-0x00000000779B0000-0x0000000077B59000-memory.dmp

      Filesize

      1.7MB