Analysis

  • max time kernel
    76s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2025 09:34

General

  • Target

    YouTube Partner Program Policy Update – Feb 2025.msi

  • Size

    4.1MB

  • MD5

    b0d0a69199f344aded6146246a6e58c9

  • SHA1

    e11795625663a28573487f2b72ba091bac41b624

  • SHA256

    9fe42ef288a3f08d68bbfc8bf0890fed79eaa1708c20577534e7e9152da3762a

  • SHA512

    55a048cfd34bab839011df6eeac3f91b172c114978a7b6f089d9ed490736a5ceb570524a738b6656e0cc90c608776120b1e1f4d7ab85c1f8c3e4190f11cc35c4

  • SSDEEP

    49152:hNK3fuMxhxdsIjE0xHQKu4A3Gi5Dh3JGQIN1KgZiQaH0H721bxNKWkkqQWWIX2OD:CP3hxdssvwKu4kVAQIQvNpkNmOh

Malware Config

Signatures

  • Detects Rhadamanthys payload 1 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\YouTube Partner Program Policy Update – Feb 2025.msi"
        2⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2248
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1628
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Cuttlefish\AppCheckS.exe
        "C:\Users\Admin\AppData\Local\Cuttlefish\AppCheckS.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Users\Admin\AppData\Roaming\Fmlaunch\AppCheckS.exe
          C:\Users\Admin\AppData\Roaming\Fmlaunch\AppCheckS.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1748
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:520
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1944
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1632
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003F4" "000000000000056C"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2832

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f7814ea.rbs

      Filesize

      8KB

      MD5

      8a8aaa25c26f774c22a719a5df64a1f9

      SHA1

      a147818c341ab44552d172fa82ebc967bc5f019b

      SHA256

      00a2aa83345a6b766fe74197cf9db58ea3f90ee1eb35bba5d318e4a700d3a299

      SHA512

      6a99e25505a482b47942e1f2c6cd60d8763aa447f8864887584f0f6fcc8a38c3dc06ce40ee4c1baa69bac28edac07e0d5b2d6aa7957f7a59cd63e048d9d5a568

    • C:\Users\Admin\AppData\Local\Cuttlefish\MSVCP140.dll

      Filesize

      618KB

      MD5

      9ff712c25312821b8aec84c4f8782a34

      SHA1

      1a7a250d92a59c3af72a9573cffec2fcfa525f33

      SHA256

      517cd3aac2177a357cca6032f07ad7360ee8ca212a02dd6e1301bf6cfade2094

      SHA512

      5a65da337e64ea42bcc461b411ae622ce4dec1036638b1e5de4757b366875d7f13c1290f2ee345f358994f648c5941db35aa5d2313f547605508fd2bcc047e33

    • C:\Users\Admin\AppData\Local\Cuttlefish\VCRUNTIME140.dll

      Filesize

      85KB

      MD5

      edf9d5c18111d82cf10ec99f6afa6b47

      SHA1

      d247f5b9d4d3061e3d421e0e623595aa40d9493c

      SHA256

      d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

      SHA512

      bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

    • C:\Users\Admin\AppData\Local\Cuttlefish\crump.jpg

      Filesize

      45KB

      MD5

      d4ab0589417a189428c501b9d7806d11

      SHA1

      e5ddbe97e9f2b3169c7536c83d656de73dd6bd8f

      SHA256

      9e9a3d7b58c7e848fd230b1c9ca46f428aad950b167ee92830596954c90d52b7

      SHA512

      9b01210f43c1edbae64ab7672f734838a21d737e41b985cf0c4194c15cb6df9aa8a771fcb28eda140812f0b39cf8af8ce368d7cc10e7bf94c4ed4e7b180f2b3c

    • C:\Users\Admin\AppData\Local\Cuttlefish\logomachy.psd

      Filesize

      1.6MB

      MD5

      daaa83807fcddf85cafa42d5b45a5c5f

      SHA1

      84e95f87436f91fdfa7f0e774c28750757c93a89

      SHA256

      7a342f324630b45a5e00857a186c3c9c662cb6d453eac08686d599eaa8e96c09

      SHA512

      4f11f40e401d6ff4da52e249e9af128b6da7c0908839663300950d544210833479c97c5b36bc025542d1b83929e98feda460ac2b3fe355ed14d9869ac4c7f481

    • C:\Users\Admin\AppData\Local\Cuttlefish\mfc140u.dll

      Filesize

      5.8MB

      MD5

      3f5b940545718cce8815e02be8e68619

      SHA1

      9d41743eb1d700261a908f8bcee532df94d1b102

      SHA256

      f2f9406a1c3cadf284574b3fa02e9dd1e9fa1b9415871cf0aa23e65aa79ed49b

      SHA512

      5b9a8ffcbd868266433787436c6fd2867ddd908366bfb4a2cfaf54b032d7d0bdfc0f607eb04a229d90a10ca757cdd29f5d19003e5f4af333994fc6a736bf0bcb

    • C:\Users\Admin\AppData\Local\Temp\2a9ef781

      Filesize

      1.8MB

      MD5

      5cbe54294f144028fc18f36c7513907f

      SHA1

      d8ee311d817935ee5492680440ec668437c83378

      SHA256

      d84e622cf6e5aa920fb0344124866d2f2fe00482a6fce126b915bb682f9d6b1e

      SHA512

      003e508821cc315f3673288825e4220bad536ccf997d6d1785bb89e88a0251b0ece72f06f5ca700957615efc12b066355058ef1a028a5b517f05c052f70d0ad8

    • C:\Windows\Installer\f7814e8.msi

      Filesize

      4.1MB

      MD5

      b0d0a69199f344aded6146246a6e58c9

      SHA1

      e11795625663a28573487f2b72ba091bac41b624

      SHA256

      9fe42ef288a3f08d68bbfc8bf0890fed79eaa1708c20577534e7e9152da3762a

      SHA512

      55a048cfd34bab839011df6eeac3f91b172c114978a7b6f089d9ed490736a5ceb570524a738b6656e0cc90c608776120b1e1f4d7ab85c1f8c3e4190f11cc35c4

    • \Users\Admin\AppData\Local\Cuttlefish\AppCheckS.exe

      Filesize

      1.7MB

      MD5

      18247442e0f9378e739f650fd51acb4e

      SHA1

      41c3145d0a63f2cb87ae9f4f6107855ddaa72886

      SHA256

      a5bf40c29313eb9f0e711bee0d63b411ef35e80ba0fbdcc5964d0539db59290e

      SHA512

      e4669a7d72fc37b39cd161c6243c2f1f9840e36598a25c1125540f72d6ef4aeddc2ef9b89804137f2c0edba9fcd68e89ba74f9ebfe1bec2aec14e0f7c2e42bc3

    • memory/520-60-0x0000000077C90000-0x0000000077E39000-memory.dmp

      Filesize

      1.7MB

    • memory/520-61-0x00000000754A0000-0x0000000075614000-memory.dmp

      Filesize

      1.5MB

    • memory/1628-74-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/1628-77-0x0000000077C90000-0x0000000077E39000-memory.dmp

      Filesize

      1.7MB

    • memory/1628-79-0x0000000077300000-0x0000000077347000-memory.dmp

      Filesize

      284KB

    • memory/1628-76-0x0000000001D00000-0x0000000002100000-memory.dmp

      Filesize

      4.0MB

    • memory/1748-57-0x000007FEF69E0000-0x000007FEF6B38000-memory.dmp

      Filesize

      1.3MB

    • memory/1748-56-0x000007FEF69E0000-0x000007FEF6B38000-memory.dmp

      Filesize

      1.3MB

    • memory/1944-65-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1944-67-0x00000000002F0000-0x00000000002F8000-memory.dmp

      Filesize

      32KB

    • memory/1944-68-0x0000000000350000-0x0000000000360000-memory.dmp

      Filesize

      64KB

    • memory/1944-69-0x0000000005210000-0x0000000005610000-memory.dmp

      Filesize

      4.0MB

    • memory/1944-70-0x0000000005210000-0x0000000005610000-memory.dmp

      Filesize

      4.0MB

    • memory/1944-71-0x0000000077C90000-0x0000000077E39000-memory.dmp

      Filesize

      1.7MB

    • memory/1944-73-0x0000000077300000-0x0000000077347000-memory.dmp

      Filesize

      284KB

    • memory/1944-66-0x0000000000400000-0x0000000000522000-memory.dmp

      Filesize

      1.1MB

    • memory/1944-63-0x00000000732C0000-0x0000000074322000-memory.dmp

      Filesize

      16.4MB

    • memory/1944-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/2960-37-0x000007FEF6B60000-0x000007FEF6CB8000-memory.dmp

      Filesize

      1.3MB