Resubmissions

19/02/2025, 03:23

250219-dxklbawlap 10

06/02/2025, 21:29

250206-1cdctsxnav 10

Analysis

  • max time kernel
    69s
  • max time network
    59s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2025, 03:23

General

  • Target

    B-O-S-T-R-A-P-E-R.exe

  • Size

    1.3MB

  • MD5

    6b2997fc7396a92dba36300b22919eb5

  • SHA1

    668b7686960603f860850fb3b4717bd339557784

  • SHA256

    b3372fca3eb452875f5627f99b6c963684102a0f09f1fefd604f153de24b6ea7

  • SHA512

    6eddc2191c1859e5fe6a0045dc1797ef40e07760430662380c25e760fe45879a1c7f0ffa940154fc37f6c8e6b0017c66ed2b210f897739d6cefba2729764af51

  • SSDEEP

    24576:+zIp4NTME223+C0S1/B8TlsPPU++BoAunC6XtANU0poZslGtZ6GltIF0IU+LB:fdElzp1yTG3h+5uC6qxJQH57ImIJLB

Malware Config

Signatures

  • Detects Rhadamanthys payload 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2628
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4456
    • C:\Users\Admin\AppData\Local\Temp\B-O-S-T-R-A-P-E-R.exe
      "C:\Users\Admin\AppData\Local\Temp\B-O-S-T-R-A-P-E-R.exe"
      1⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4812
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy Allow.flv Allow.flv.cmd & Allow.flv.cmd
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:112
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3248
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4556
        • C:\Windows\SysWOW64\findstr.exe
          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2212
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 114908
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1588
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Regression.flv
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1640
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "alternatively" Greeting
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4316
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 114908\Insertion.com + Accepting + Organize + Horizontal + Curriculum + Enclosure + Mn + Lauderdale + Podcast + Drop 114908\Insertion.com
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3604
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Arrow.flv + ..\Approximately.flv + ..\Xi.flv + ..\Webcams.flv + ..\Whore.flv + ..\Strange.flv + ..\Margin.flv + ..\Truck.flv + ..\Bidding.flv + ..\Universal.flv i
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4900
        • C:\Users\Admin\AppData\Local\Temp\114908\Insertion.com
          Insertion.com i
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4348
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 884
            4⤵
            • Program crash
            PID:4196
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2264
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:5068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4348 -ip 4348
        1⤵
          PID:2188

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\114908\Insertion.com

          Filesize

          331KB

          MD5

          54ad97da27d79281c3e354f91af05840

          SHA1

          df559e8607cd82226f0d04191bc97de793da86e3

          SHA256

          5bbc1190498527a7033d35a5380a7f38bb56f29c1ca4a47ead289a69d92e2332

          SHA512

          4770b873bdd5ca2270fbef6ee32c3dc1d65d2c626fe3884714ea651d607f9bcc8cdc6a98de157952f52de1bc40a6db935ed93390c84e8d1e527c0144f3148fa8

        • C:\Users\Admin\AppData\Local\Temp\114908\Insertion.com

          Filesize

          925KB

          MD5

          62d09f076e6e0240548c2f837536a46a

          SHA1

          26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

          SHA256

          1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

          SHA512

          32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

        • C:\Users\Admin\AppData\Local\Temp\114908\i

          Filesize

          648KB

          MD5

          7b3777980e8d42756de1491fb99c9d31

          SHA1

          573f09a294b197979c9923af8afe396a86a5a85e

          SHA256

          4c4dc3c51fe8295d2bc7949f3b398b0fc340a1fa7aabbdb568f4634953187e6d

          SHA512

          fad3fab9378cfd0fe671cc85c0c188db7f4e1a7165d293fea729e045eedc78e4a60aca21742862c9c684e36bfde9e133b97aac442f2359b46f81ba1603f6ad3f

        • C:\Users\Admin\AppData\Local\Temp\Accepting

          Filesize

          149KB

          MD5

          90d689a2efa422f2643165245be77678

          SHA1

          ef5802ea1a4bd251696e40461c36b0c2784ce453

          SHA256

          92ea6616fec195b098ae9b7dd92d953bf665ed47603a97bcbe64f90f6b98f676

          SHA512

          ebeac1e14ce157c92e52d89da04f9b5d41827b9f731ab80e2c83ffe7f4f7882e16e796546b516c6597d2cb9f7cb2b3dfb024e6a685f7ae76798ba4e004d19e4f

        • C:\Users\Admin\AppData\Local\Temp\Allow.flv

          Filesize

          32KB

          MD5

          1b10cefa3784bd9cac99084510034109

          SHA1

          a5a2a5f5ead84ca336454c1f2c75f9026c801bae

          SHA256

          cab267c22a7e1b8f4df5114cde08c6760a6646298673e47d93600d24bf9ff990

          SHA512

          4e66f417c4b65280705e53c71965d027d2ecf67ebcf3ac39a400d88605f22991e273c63e3aff7ca26669f18dfaf952ab54fc86f49e60550345f3a6486ae4898e

        • C:\Users\Admin\AppData\Local\Temp\Approximately.flv

          Filesize

          55KB

          MD5

          458d31c8a822287564abd321126cc4c5

          SHA1

          5caed7e21a0a18641c1bb689696c52f6f8c9a881

          SHA256

          983b1bb269a014859d2b5c93172c29589b3da0edb9794fd108164199d133e2ee

          SHA512

          889d253bef41b6ea6a68665cb4bb6705cb798c4e1299ac8335890018c8f4773fbfbfb68432b4c1597939992d3734d46e021d0a734466214971a892c6f02a3108

        • C:\Users\Admin\AppData\Local\Temp\Arrow.flv

          Filesize

          74KB

          MD5

          5e515b25ec3a768cc47c4b322b9e2082

          SHA1

          32e39abef2c574b73a26875213b4d908aed95ffb

          SHA256

          9da9e122bf87beb6a38ad935010ee77d2919b38568ae848bf17641202397f920

          SHA512

          47956a59b79e1aec3d16a77064f295e936becd921fb915bdaba06d5eb543c818a5a2d50eafbdb077c57c6e3be8826ee3bc6767481f0b4954cde2110369d35c41

        • C:\Users\Admin\AppData\Local\Temp\Bidding.flv

          Filesize

          86KB

          MD5

          7570e7dd9ec2e31753e3a390ed0d63e9

          SHA1

          6f7ef31825832c056f294e6aa7c333d6a96c6e70

          SHA256

          1f87cc6042591f0dbaadd01d95457d211c9e19740d918219a1ef87e1a819596f

          SHA512

          2a3a2961fa5f4b67bf35355b3ef99359756a7749a5a7c69c7d5218f07e79068260abb56ed0c28bd958b2b3de25ebf24077eb75289d1a46104828727b399fc918

        • C:\Users\Admin\AppData\Local\Temp\Curriculum

          Filesize

          81KB

          MD5

          61e96a5c935e7bc7c124cb12eb1f8a4c

          SHA1

          be1e5ed6beda445c424dcee11ce9588fbba27be4

          SHA256

          419e66e3db4d98d4b453fbb4d66ac707bebf7b4e7c5407dcd08e0ddbb81506f1

          SHA512

          64029e500ae133d7e1db3890fe334ef6ccaeaef8b96f6752d0d13ddaa08cf009199aa433ed4c442aab4af35b3fb9ad6d03ac3e8c54e844c6ffe15b410c3a4a2a

        • C:\Users\Admin\AppData\Local\Temp\Drop

          Filesize

          64KB

          MD5

          a013dd222c8ed7e618d714d0d585d540

          SHA1

          57ff0571f99f769f359b0de5325736cfa05cf5fd

          SHA256

          9c6a04a27295ca339cb5ce136533864ea84b8efb99f3131fbf34876487340631

          SHA512

          709595d96aae1278d75283a386da30c4b8c1d7ed81aca6d4dd377b180da9f760558d75e09cb3ab385b87739ede784b5d43189042457bca8c940aa4ac472251fd

        • C:\Users\Admin\AppData\Local\Temp\Enclosure

          Filesize

          125KB

          MD5

          bc6ea59b796248e9081c81f7cc2ecb8c

          SHA1

          aa51857602096b3ef93221c77162c5fbffb72482

          SHA256

          9226a535727b4507c7212d72fce5a66ad7b651324fe92eb4ac2b328bb96f028b

          SHA512

          da5201819f2b458aa4198474c450d9f8a91c5716f8231e728f2dd125a7f6b8081d84e2588afbdbfc4ebabd7a0684f462d409e4f05b7dd83538c6022bd5ef01d2

        • C:\Users\Admin\AppData\Local\Temp\Greeting

          Filesize

          1KB

          MD5

          72508266e8e0d7a42378ec3a84568b14

          SHA1

          315f3c0dbe06a669b5e2c25a7f92f1c4b9411e8a

          SHA256

          8715daf9642cc3c48fad9147212bedf7848795c43d5c12127db9985b7d3b31e7

          SHA512

          4246797585e4ff7b9c377e4cfdfa08903fa0696a43b095e60fab931122e3776bc79d6b3417b4897d0c4ccfd76a0561d2430027ff54064cc6877c2bde941a9e09

        • C:\Users\Admin\AppData\Local\Temp\Horizontal

          Filesize

          79KB

          MD5

          50078c8e0671fd2661d5fa46a1e0f3f6

          SHA1

          7c3b8a33802dd614c50bf5c27af05fc4e731d9f0

          SHA256

          f577bd40a9d049e5d9d2c0de86cd65ee9de8956807bfd2c624115146ad2254d1

          SHA512

          b4a175a085db82d96c9a00959c6bcb29ac1f9de28a9cd031e4954798213ec8c60e6102fbb711a9e5f5d5509dc38d773a0edac52fecf12d0cce1bae0d9bd8f285

        • C:\Users\Admin\AppData\Local\Temp\Lauderdale

          Filesize

          116KB

          MD5

          99dee9f940bb3e39c04a4873c3142aaa

          SHA1

          43fda8baa4444796860b2cec6fddd08b636a5b05

          SHA256

          892ab8830ef76eff0da641897a5c1784be506a67a9092a3d8b9a35a8e686903d

          SHA512

          ae9986ab7b08a5a920885bec7fa165161bf0b4e05d58c2a55868dab07aeea53c1dc0f57abdc0fd33d8ba27169510c4a329b50b87146437f47d3f937fef8a80bd

        • C:\Users\Admin\AppData\Local\Temp\Margin.flv

          Filesize

          53KB

          MD5

          9a5005e249f4476c7b8eadb891d44c35

          SHA1

          053e99c323cceff773e96114d4c10fe37fce2a74

          SHA256

          31fb39a84ec8bb0bd54e1860ed1d89755aba02fb5dd6bfb16078d7c17d4e2d18

          SHA512

          0cc6ded095f531c9ab7718a213bff001b20c64a7fb8f359f3a7279a043b3f99893dc64ea46c981461cd36bdb10f0cadb73d008cf2c31b41e77e3b193261880c2

        • C:\Users\Admin\AppData\Local\Temp\Mn

          Filesize

          80KB

          MD5

          7428b5b6877536b9bef1c2ab734f2b9f

          SHA1

          38101382d687c1004b36567e348a716d9395f6f3

          SHA256

          5caceaa95582a6da5ed70de8d3d1f95af3a5f1b4eb99601d9f83978521139c1a

          SHA512

          b4850bbd5b90320f247f73ad84fc80074bf08ee51c3a4accea4b416c40d9aa7012c776d7e54a6a8d741ab8360eecc0d555e4c964c9911ef4d21f300af49b0316

        • C:\Users\Admin\AppData\Local\Temp\Organize

          Filesize

          102KB

          MD5

          92eb53f7f95bdff4d1df18978ab876d3

          SHA1

          f5358ce5727c9b5bd97bf96def46559cb6eb6506

          SHA256

          8ddaf8f8301378434e2727cf9551a20c00ed6fb7cbf6fd92be37f2ad6684fdde

          SHA512

          81e2bc2c8b0d1aad4e413fe44be95719885de9c34bef9c303005f042f4beadb91eb1836c0c4c3a6c1181549221d3e759714038e9811ba61b6618a62528cc98e3

        • C:\Users\Admin\AppData\Local\Temp\Podcast

          Filesize

          127KB

          MD5

          b61eae46342cad6c27ba12d460315a8e

          SHA1

          9df2790c1a59834149c7d10c138f03ae901e278b

          SHA256

          f27ac8f73cc6d16081cae3e53b9fd0a5122007d175af2256bf15d1aab2e23da4

          SHA512

          478f428af707fbb5918bff5c1479de20cf6481554c204a3d7d8819d7ca7e3474eec36ed55f4654521a5fa8bd613fe417b6f8f41e17ec4743de51355cc695df65

        • C:\Users\Admin\AppData\Local\Temp\Regression.flv

          Filesize

          477KB

          MD5

          93bcaa3fcac99ca480e7c400b9f300cc

          SHA1

          070ea504ff1d5a6c6f55a802661dabec23a38863

          SHA256

          11ebf9bcb0da56dbe22c6a2725619f80100abfe2925bad0e1061c7358bf24bfe

          SHA512

          f27212fac966555ec9969dfa80cdd320041edbe56d69c6e029db60327d8e9eeea87219b77123d548e1f4c75645e105346d53cbf04f54c1cd527c64ed99cf7df9

        • C:\Users\Admin\AppData\Local\Temp\Strange.flv

          Filesize

          98KB

          MD5

          78616300e951fcc6b6fd8095800864c9

          SHA1

          4494ffa79f838827d7409f117e58dcf268dd9f07

          SHA256

          cf526c534adcbef5e6e73373cf7c1acbddb461015feef66f79226537ed27fa4e

          SHA512

          6e62f385a6d229e1cea25278add970ccae21bc242d32de7e997cfbf29026d10db70c545f079c1cd4548c99a0b98d872c1ef759f0de726f519f1a406bb80f1963

        • C:\Users\Admin\AppData\Local\Temp\Truck.flv

          Filesize

          51KB

          MD5

          68c160f7b8a884038fd7242c4d1ded93

          SHA1

          d7243c6344c07a4c9db527f8b91f9c3172c03c7f

          SHA256

          c6995bec7f71c37d663bcd2876127ad117d3736b6ebb1876438abb13b30e7102

          SHA512

          6755297519638a4738db51a76af9b2715eeaf14de77a3b8fff1b3df66b0463db4612adabf34f3e5db37eaee0d0dc8a5deb92cffe02ec7934ce817eac0ac78317

        • C:\Users\Admin\AppData\Local\Temp\Universal.flv

          Filesize

          19KB

          MD5

          1ef476c38ed819ef26f93a0b2c18420c

          SHA1

          20a8d789c62f72769a05a7da8e2e165743103935

          SHA256

          e15901035ceafd7b31a739f8bcbbf3c4148f47ff64f775277baf583c7febd88f

          SHA512

          443aa9548c59b596e5838bcf37632eeaff48501f79feca743411ec087b66b0b64756bbcb7716a671ca0b23931e6833eb5baeebe7dc362d2a172d9b0e986cf9ee

        • C:\Users\Admin\AppData\Local\Temp\Webcams.flv

          Filesize

          78KB

          MD5

          b767c911caba5726f440de19f7cc4975

          SHA1

          1791e211a5f64b89d0ebb7d5848e3ca9f436744a

          SHA256

          6c0aa10701f942a9eedb7bbe2f2e38d6552e43fc4f4ef3556bbf6950b6005b95

          SHA512

          e2193c501eb17bb7057911269f2c86223255f03023487f840c0f586d19cf0731139b51d19a99b949630fa1f7c1b5bf0c76d6ae995abe12a793817d32398771f7

        • C:\Users\Admin\AppData\Local\Temp\Whore.flv

          Filesize

          67KB

          MD5

          5d2ccd9b70d4deefd08fc908675386ec

          SHA1

          2188b9f8cbbadf7557b099b2d11ce380d7009085

          SHA256

          f7fdebae5fc36d1f57ee303aa919b10c41e44c75df3a2afce210406a3b17ecd7

          SHA512

          74d8e063e4b0b4906b42bf8bb9eaab4c36472072f6aa7d0b678edb715188a0d79f51f945a5b9aa83bc1ab4235dd5464435544ec30c337cfff8e563bf4b4123b2

        • C:\Users\Admin\AppData\Local\Temp\Xi.flv

          Filesize

          67KB

          MD5

          987b07e1d456f004b7a35e88ff791984

          SHA1

          75558dabdcf52232580cb195e8200526672afd89

          SHA256

          96c6e11014f52f6997ecaa9e96181b9a01104354ee8307319ecfc944a92af829

          SHA512

          4d21e01276d12f372f9a0c6b3ce8f9c68878ade0e60c575563d0989bd918dd4404e3c8cd04d2d617ecb2bf88e21624437f2e5cb02144c5d92ad68ca1e4e1215d

        • memory/4348-788-0x0000000004620000-0x00000000046A1000-memory.dmp

          Filesize

          516KB

        • memory/4348-791-0x00000000046B0000-0x0000000004AB0000-memory.dmp

          Filesize

          4.0MB

        • memory/4348-785-0x0000000004620000-0x00000000046A1000-memory.dmp

          Filesize

          516KB

        • memory/4348-783-0x0000000004620000-0x00000000046A1000-memory.dmp

          Filesize

          516KB

        • memory/4348-789-0x0000000004620000-0x00000000046A1000-memory.dmp

          Filesize

          516KB

        • memory/4348-787-0x0000000004620000-0x00000000046A1000-memory.dmp

          Filesize

          516KB

        • memory/4348-790-0x00000000046B0000-0x0000000004AB0000-memory.dmp

          Filesize

          4.0MB

        • memory/4348-784-0x0000000004620000-0x00000000046A1000-memory.dmp

          Filesize

          516KB

        • memory/4348-792-0x00007FFD5BEB0000-0x00007FFD5C0A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4348-794-0x00000000755C0000-0x00000000757D5000-memory.dmp

          Filesize

          2.1MB

        • memory/4456-795-0x0000000000EC0000-0x0000000000ECA000-memory.dmp

          Filesize

          40KB

        • memory/4456-797-0x0000000001450000-0x0000000001850000-memory.dmp

          Filesize

          4.0MB

        • memory/4456-800-0x00000000755C0000-0x00000000757D5000-memory.dmp

          Filesize

          2.1MB

        • memory/4456-798-0x00007FFD5BEB0000-0x00007FFD5C0A5000-memory.dmp

          Filesize

          2.0MB