Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2025 04:12

General

  • Target

    dabfe2b02c36b5f1a7f1c0d96798c944f69f84c4889e2e7e25655bb4d3894f31.msi

  • Size

    4.1MB

  • MD5

    a11fed7d63b37dcaeb5877df4a978f6d

  • SHA1

    2dcb800231cb89fa37aeb092efdfd9cfda07bfa9

  • SHA256

    dabfe2b02c36b5f1a7f1c0d96798c944f69f84c4889e2e7e25655bb4d3894f31

  • SHA512

    ea6a7a2855ce3b37df0c88702487cf2bf9afc03e06717aa79272c703f26fb798bd4ced36db0454ddd3938d9bd4b95e3ef17bcf3cfd391dd29dc0ce1ccdd27c0c

  • SSDEEP

    49152:vNK3fuMxhxdsIjCohpCWAE0MGnqz2jsnCGQNxTKCqX88ctFZGNf32obHmn5TCp6l:4P3hxdss17C6Eqz2jUiUdGobGnGJaQJ

Malware Config

Signatures

  • Detects Rhadamanthys payload 1 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\dabfe2b02c36b5f1a7f1c0d96798c944f69f84c4889e2e7e25655bb4d3894f31.msi
        2⤵
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1892
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2136
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Users\Admin\AppData\Local\Toadinthehole\AppCheckS.exe
        "C:\Users\Admin\AppData\Local\Toadinthehole\AppCheckS.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:708
        • C:\Users\Admin\AppData\Roaming\manageCheck\AppCheckS.exe
          C:\Users\Admin\AppData\Roaming\manageCheck\AppCheckS.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2932
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:2924
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
              5⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1712
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2816
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B0" "0000000000000060"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f770bb6.rbs

      Filesize

      8KB

      MD5

      11821e58b2ac157681d20d5e28f90438

      SHA1

      9920ec3acb8b69b7c35d1f36ff2ba2cf4870575d

      SHA256

      a2fda330ad15b8ce854ca256814ec313d84bf2f566f09b9755a38a7deff0d672

      SHA512

      37c1bd6d2ec0c81792994146b90d8ea219b808ca6ae35e16703fdc1035058b0eadf74852d66dcba90eaef41eeaf2f69a9d2f0e25a2d53f223e0376e50f885545

    • C:\Users\Admin\AppData\Local\Temp\11ea6dee

      Filesize

      1.8MB

      MD5

      d1a28a3c099593e51798b8a430083702

      SHA1

      191ff55f293145c64a6ffc4c324be51071c10788

      SHA256

      a193d7d48ba7ac6d054e36b0274196f8cec024fb7642f4e035d1cdf617938ed8

      SHA512

      7fc72bb578e8a7327b4ffdb5377a935bb281237ec8c1b0019ae405c98aa8f1db39ccac3b4ee37c1fe77b4d72c6b9960267839d08e9c06871d774e0cb835ed7e7

    • C:\Users\Admin\AppData\Local\Toadinthehole\MSVCP140.dll

      Filesize

      618KB

      MD5

      9ff712c25312821b8aec84c4f8782a34

      SHA1

      1a7a250d92a59c3af72a9573cffec2fcfa525f33

      SHA256

      517cd3aac2177a357cca6032f07ad7360ee8ca212a02dd6e1301bf6cfade2094

      SHA512

      5a65da337e64ea42bcc461b411ae622ce4dec1036638b1e5de4757b366875d7f13c1290f2ee345f358994f648c5941db35aa5d2313f547605508fd2bcc047e33

    • C:\Users\Admin\AppData\Local\Toadinthehole\VCRUNTIME140.dll

      Filesize

      85KB

      MD5

      edf9d5c18111d82cf10ec99f6afa6b47

      SHA1

      d247f5b9d4d3061e3d421e0e623595aa40d9493c

      SHA256

      d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

      SHA512

      bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

    • C:\Users\Admin\AppData\Local\Toadinthehole\crump.jpg

      Filesize

      45KB

      MD5

      d4ab0589417a189428c501b9d7806d11

      SHA1

      e5ddbe97e9f2b3169c7536c83d656de73dd6bd8f

      SHA256

      9e9a3d7b58c7e848fd230b1c9ca46f428aad950b167ee92830596954c90d52b7

      SHA512

      9b01210f43c1edbae64ab7672f734838a21d737e41b985cf0c4194c15cb6df9aa8a771fcb28eda140812f0b39cf8af8ce368d7cc10e7bf94c4ed4e7b180f2b3c

    • C:\Users\Admin\AppData\Local\Toadinthehole\logomachy.psd

      Filesize

      1.6MB

      MD5

      78dd9f575dd49af7499bef1fc1aef917

      SHA1

      32dd4fe64e6fb1dfbc53a86e8762d925a0a32d88

      SHA256

      a8f8bcca78c5a328a4dbd3829784f724427a582d3a09397d61a73448c85bd076

      SHA512

      45dc68eefd030e361ea7634f2d046a45180682df2aa050f75ceee5ea12887d49535862b523f870472f9bd11239dea64ad9e62bc02e75cc139319f6ed4359b3f5

    • C:\Users\Admin\AppData\Local\Toadinthehole\mfc140u.dll

      Filesize

      5.8MB

      MD5

      3f5b940545718cce8815e02be8e68619

      SHA1

      9d41743eb1d700261a908f8bcee532df94d1b102

      SHA256

      f2f9406a1c3cadf284574b3fa02e9dd1e9fa1b9415871cf0aa23e65aa79ed49b

      SHA512

      5b9a8ffcbd868266433787436c6fd2867ddd908366bfb4a2cfaf54b032d7d0bdfc0f607eb04a229d90a10ca757cdd29f5d19003e5f4af333994fc6a736bf0bcb

    • C:\Windows\Installer\f770bb4.msi

      Filesize

      4.1MB

      MD5

      a11fed7d63b37dcaeb5877df4a978f6d

      SHA1

      2dcb800231cb89fa37aeb092efdfd9cfda07bfa9

      SHA256

      dabfe2b02c36b5f1a7f1c0d96798c944f69f84c4889e2e7e25655bb4d3894f31

      SHA512

      ea6a7a2855ce3b37df0c88702487cf2bf9afc03e06717aa79272c703f26fb798bd4ced36db0454ddd3938d9bd4b95e3ef17bcf3cfd391dd29dc0ce1ccdd27c0c

    • \Users\Admin\AppData\Local\Toadinthehole\AppCheckS.exe

      Filesize

      1.7MB

      MD5

      18247442e0f9378e739f650fd51acb4e

      SHA1

      41c3145d0a63f2cb87ae9f4f6107855ddaa72886

      SHA256

      a5bf40c29313eb9f0e711bee0d63b411ef35e80ba0fbdcc5964d0539db59290e

      SHA512

      e4669a7d72fc37b39cd161c6243c2f1f9840e36598a25c1125540f72d6ef4aeddc2ef9b89804137f2c0edba9fcd68e89ba74f9ebfe1bec2aec14e0f7c2e42bc3

    • memory/708-37-0x000007FEF56E0000-0x000007FEF5838000-memory.dmp

      Filesize

      1.3MB

    • memory/1712-64-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1712-68-0x00000000003C0000-0x00000000003D0000-memory.dmp

      Filesize

      64KB

    • memory/1712-71-0x0000000076FC0000-0x0000000077169000-memory.dmp

      Filesize

      1.7MB

    • memory/1712-73-0x0000000074D60000-0x0000000074DA7000-memory.dmp

      Filesize

      284KB

    • memory/1712-70-0x0000000005210000-0x0000000005610000-memory.dmp

      Filesize

      4.0MB

    • memory/1712-65-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1712-63-0x0000000072540000-0x00000000735A2000-memory.dmp

      Filesize

      16.4MB

    • memory/1712-66-0x0000000000080000-0x00000000001A2000-memory.dmp

      Filesize

      1.1MB

    • memory/1712-67-0x0000000000390000-0x0000000000398000-memory.dmp

      Filesize

      32KB

    • memory/1712-69-0x0000000005210000-0x0000000005610000-memory.dmp

      Filesize

      4.0MB

    • memory/2136-74-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/2136-76-0x0000000000810000-0x0000000000C10000-memory.dmp

      Filesize

      4.0MB

    • memory/2136-79-0x0000000074D60000-0x0000000074DA7000-memory.dmp

      Filesize

      284KB

    • memory/2136-77-0x0000000076FC0000-0x0000000077169000-memory.dmp

      Filesize

      1.7MB

    • memory/2924-61-0x0000000074900000-0x0000000074A74000-memory.dmp

      Filesize

      1.5MB

    • memory/2924-60-0x0000000076FC0000-0x0000000077169000-memory.dmp

      Filesize

      1.7MB

    • memory/2932-57-0x000007FEF58C0000-0x000007FEF5A18000-memory.dmp

      Filesize

      1.3MB

    • memory/2932-56-0x000007FEF58C0000-0x000007FEF5A18000-memory.dmp

      Filesize

      1.3MB