Analysis

  • max time kernel
    115s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-02-2025 09:38

General

  • Target

    YouTubePartnerProgramPolicyUpdateFeb2025.msi

  • Size

    4.1MB

  • MD5

    b0d0a69199f344aded6146246a6e58c9

  • SHA1

    e11795625663a28573487f2b72ba091bac41b624

  • SHA256

    9fe42ef288a3f08d68bbfc8bf0890fed79eaa1708c20577534e7e9152da3762a

  • SHA512

    55a048cfd34bab839011df6eeac3f91b172c114978a7b6f089d9ed490736a5ceb570524a738b6656e0cc90c608776120b1e1f4d7ab85c1f8c3e4190f11cc35c4

  • SSDEEP

    49152:hNK3fuMxhxdsIjE0xHQKu4A3Gi5Dh3JGQIN1KgZiQaH0H721bxNKWkkqQWWIX2OD:CP3hxdssvwKu4kVAQIQvNpkNmOh

Malware Config

Signatures

  • Detects Rhadamanthys payload 1 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2504
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1124
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\YouTubePartnerProgramPolicyUpdateFeb2025.msi
      1⤵
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1504
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Cuttlefish\AppCheckS.exe
        "C:\Users\Admin\AppData\Local\Cuttlefish\AppCheckS.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3208
        • C:\Users\Admin\AppData\Roaming\Fmlaunch\AppCheckS.exe
          C:\Users\Admin\AppData\Roaming\Fmlaunch\AppCheckS.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1388
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3396
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3984

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e5770eb.rbs

      Filesize

      8KB

      MD5

      9a7bead7f226d0c95cbb9b9ef157221f

      SHA1

      40709a1cddffb0b4dcdeb0a08569258a56e07a9b

      SHA256

      ee206edbbf1936cc517db3203224bb0d5f71d8686d14a824226788c9c61412a7

      SHA512

      531f0fa6d6264b14668261ab8ee9b53702a542c3ddd64c69df768c43bc0b3950718895a873fddfeee27583348643efd188a9c093505336cc7c6449876c15e9c1

    • C:\Users\Admin\AppData\Local\Cuttlefish\AppCheckS.exe

      Filesize

      1.7MB

      MD5

      18247442e0f9378e739f650fd51acb4e

      SHA1

      41c3145d0a63f2cb87ae9f4f6107855ddaa72886

      SHA256

      a5bf40c29313eb9f0e711bee0d63b411ef35e80ba0fbdcc5964d0539db59290e

      SHA512

      e4669a7d72fc37b39cd161c6243c2f1f9840e36598a25c1125540f72d6ef4aeddc2ef9b89804137f2c0edba9fcd68e89ba74f9ebfe1bec2aec14e0f7c2e42bc3

    • C:\Users\Admin\AppData\Local\Cuttlefish\VCRUNTIME140.dll

      Filesize

      85KB

      MD5

      edf9d5c18111d82cf10ec99f6afa6b47

      SHA1

      d247f5b9d4d3061e3d421e0e623595aa40d9493c

      SHA256

      d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

      SHA512

      bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

    • C:\Users\Admin\AppData\Local\Cuttlefish\crump.jpg

      Filesize

      45KB

      MD5

      d4ab0589417a189428c501b9d7806d11

      SHA1

      e5ddbe97e9f2b3169c7536c83d656de73dd6bd8f

      SHA256

      9e9a3d7b58c7e848fd230b1c9ca46f428aad950b167ee92830596954c90d52b7

      SHA512

      9b01210f43c1edbae64ab7672f734838a21d737e41b985cf0c4194c15cb6df9aa8a771fcb28eda140812f0b39cf8af8ce368d7cc10e7bf94c4ed4e7b180f2b3c

    • C:\Users\Admin\AppData\Local\Cuttlefish\logomachy.psd

      Filesize

      1.6MB

      MD5

      daaa83807fcddf85cafa42d5b45a5c5f

      SHA1

      84e95f87436f91fdfa7f0e774c28750757c93a89

      SHA256

      7a342f324630b45a5e00857a186c3c9c662cb6d453eac08686d599eaa8e96c09

      SHA512

      4f11f40e401d6ff4da52e249e9af128b6da7c0908839663300950d544210833479c97c5b36bc025542d1b83929e98feda460ac2b3fe355ed14d9869ac4c7f481

    • C:\Users\Admin\AppData\Local\Cuttlefish\mfc140u.dll

      Filesize

      5.8MB

      MD5

      3f5b940545718cce8815e02be8e68619

      SHA1

      9d41743eb1d700261a908f8bcee532df94d1b102

      SHA256

      f2f9406a1c3cadf284574b3fa02e9dd1e9fa1b9415871cf0aa23e65aa79ed49b

      SHA512

      5b9a8ffcbd868266433787436c6fd2867ddd908366bfb4a2cfaf54b032d7d0bdfc0f607eb04a229d90a10ca757cdd29f5d19003e5f4af333994fc6a736bf0bcb

    • C:\Users\Admin\AppData\Local\Cuttlefish\msvcp140.dll

      Filesize

      618KB

      MD5

      9ff712c25312821b8aec84c4f8782a34

      SHA1

      1a7a250d92a59c3af72a9573cffec2fcfa525f33

      SHA256

      517cd3aac2177a357cca6032f07ad7360ee8ca212a02dd6e1301bf6cfade2094

      SHA512

      5a65da337e64ea42bcc461b411ae622ce4dec1036638b1e5de4757b366875d7f13c1290f2ee345f358994f648c5941db35aa5d2313f547605508fd2bcc047e33

    • C:\Users\Admin\AppData\Local\Temp\ea368550

      Filesize

      1.8MB

      MD5

      2d4c7836ff52cf399bd7222611201f9f

      SHA1

      543c3e15d546ac5a088970c783b1a85153f44740

      SHA256

      0dcfe3515a0ee9945184107c826eeb941c70eabb4e5ac22c9c441c008756034a

      SHA512

      ea413b297cae79d4cef3f38d8122f14db99a31320a9b8561fe16a74e6d9c0bd330f95bf24edd4b0751246aa2edd12c6056009f32bd6289afec02bdc2116e2c1e

    • C:\Windows\Installer\e5770ea.msi

      Filesize

      4.1MB

      MD5

      b0d0a69199f344aded6146246a6e58c9

      SHA1

      e11795625663a28573487f2b72ba091bac41b624

      SHA256

      9fe42ef288a3f08d68bbfc8bf0890fed79eaa1708c20577534e7e9152da3762a

      SHA512

      55a048cfd34bab839011df6eeac3f91b172c114978a7b6f089d9ed490736a5ceb570524a738b6656e0cc90c608776120b1e1f4d7ab85c1f8c3e4190f11cc35c4

    • memory/1124-75-0x0000000075310000-0x0000000075525000-memory.dmp

      Filesize

      2.1MB

    • memory/1124-72-0x0000000000C40000-0x0000000001040000-memory.dmp

      Filesize

      4.0MB

    • memory/1124-73-0x00007FFC9D910000-0x00007FFC9DB05000-memory.dmp

      Filesize

      2.0MB

    • memory/1124-69-0x0000000000690000-0x000000000069A000-memory.dmp

      Filesize

      40KB

    • memory/1388-55-0x00007FFC9D910000-0x00007FFC9DB05000-memory.dmp

      Filesize

      2.0MB

    • memory/1388-56-0x0000000074D40000-0x0000000074EBB000-memory.dmp

      Filesize

      1.5MB

    • memory/2060-52-0x00007FFC7F850000-0x00007FFC7F9C2000-memory.dmp

      Filesize

      1.4MB

    • memory/2060-51-0x00007FFC7F850000-0x00007FFC7F9C2000-memory.dmp

      Filesize

      1.4MB

    • memory/3208-33-0x00007FFC7F850000-0x00007FFC7F9C2000-memory.dmp

      Filesize

      1.4MB

    • memory/3396-58-0x0000000073AE0000-0x0000000074D34000-memory.dmp

      Filesize

      18.3MB

    • memory/3396-61-0x0000000001100000-0x0000000001222000-memory.dmp

      Filesize

      1.1MB

    • memory/3396-62-0x00000000030E0000-0x00000000030E8000-memory.dmp

      Filesize

      32KB

    • memory/3396-63-0x00000000030F0000-0x0000000003100000-memory.dmp

      Filesize

      64KB

    • memory/3396-64-0x0000000005A40000-0x0000000005E40000-memory.dmp

      Filesize

      4.0MB

    • memory/3396-65-0x0000000005A40000-0x0000000005E40000-memory.dmp

      Filesize

      4.0MB

    • memory/3396-66-0x00007FFC9D910000-0x00007FFC9DB05000-memory.dmp

      Filesize

      2.0MB

    • memory/3396-68-0x0000000075310000-0x0000000075525000-memory.dmp

      Filesize

      2.1MB