Resubmissions

07/03/2025, 19:55

250307-ynad7swms2 10

07/03/2025, 17:58

250307-wj7g2atzet 10

Analysis

  • max time kernel
    109s
  • max time network
    125s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    07/03/2025, 19:55

General

  • Target

    ddd.ps1

  • Size

    2.4MB

  • MD5

    5b322ca0eb9655beaf39e4453d141cd2

  • SHA1

    b556cbaf50c2b77fd73d4386f068f0bbffe7504d

  • SHA256

    b2082d4666cd9eb57896b04058438fad6a268e504d877b908ae276b3c68799fe

  • SHA512

    0648609146167599498b41bdb97c02eb0947ba03e44ee63c3448bd6b2508b4bd7054a63671c12120b01240bba810489da68e3f79dc2a7674447ad760127dcc1b

  • SSDEEP

    1536:P26vgn00oR/S7rdvtk76qu6p5LSTFPNWdD7uHzgjw8b560jSKkjptOVNjC5GGQli:bYf

Malware Config

Extracted

Family

rhadamanthys

C2

https://94.156.71.221:1485/ba9365b02ebb09b86/kscmx9w7.etux2

Signatures

  • Detects Rhadamanthys payload 1 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3040
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3744
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4816
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ddd.ps1
      1⤵
      • Deletes itself
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5024
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:116
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2972
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:8
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 800
          3⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:1824
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 804
          3⤵
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:3780
      • C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe
        "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 828
          3⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:4048
      • C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe
        "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3768
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 808
          3⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:3760
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:708

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\WER\Temp\WER5485.tmp.xml

        Filesize

        4KB

        MD5

        b19c716b86dac6f42209fe0ad000f2d7

        SHA1

        ac26a76cf5c4ab1954ebcc6867f314fd2ca8acfd

        SHA256

        a64866d55ee237fd46ee4350ef96bb45168a573a8c98b15a22fc75bcb5069e81

        SHA512

        55be474b41274e90dbe345c1e0dc920a2efac2d5ee912a337ae163302477f44c89e7d9fb7ae9a724e9c0f2486bb225a56fd6fef518be1b82d0ea2154e3f8da78

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log

        Filesize

        315B

        MD5

        7c349f31d1a453501ea2127c4c69ee62

        SHA1

        f004106bc229510ce0015d054dae3a6e18e88158

        SHA256

        f8eeb09bbf718e687ca0c3cc8f9d15794e07c83e173da3f3d24670f6cefe51ba

        SHA512

        fc610a4ac6a2eedaa02244509aa7b56d715c4841bd1ab9097f065798431c24f4a8091f2ac0f3144c7d580c3bad04b3ee83332c653cbcc3ee1b66f44c79de6840

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ogopxwxj.1st.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/8-27-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/8-34-0x0000000001250000-0x0000000001260000-memory.dmp

        Filesize

        64KB

      • memory/116-55-0x0000000004980000-0x0000000004990000-memory.dmp

        Filesize

        64KB

      • memory/116-59-0x00007FFFD3ED0000-0x00007FFFD40C8000-memory.dmp

        Filesize

        2.0MB

      • memory/116-57-0x0000000004B90000-0x0000000004F90000-memory.dmp

        Filesize

        4.0MB

      • memory/116-56-0x0000000004B90000-0x0000000004F90000-memory.dmp

        Filesize

        4.0MB

      • memory/116-54-0x0000000004920000-0x0000000004928000-memory.dmp

        Filesize

        32KB

      • memory/116-36-0x00000000049B0000-0x0000000004A42000-memory.dmp

        Filesize

        584KB

      • memory/116-64-0x0000000075C40000-0x0000000075E7A000-memory.dmp

        Filesize

        2.2MB

      • memory/116-25-0x0000000000430000-0x00000000004E2000-memory.dmp

        Filesize

        712KB

      • memory/2972-75-0x0000000075C40000-0x0000000075E7A000-memory.dmp

        Filesize

        2.2MB

      • memory/2972-73-0x00007FFFD3ED0000-0x00007FFFD40C8000-memory.dmp

        Filesize

        2.0MB

      • memory/2972-70-0x0000000004E50000-0x0000000005250000-memory.dmp

        Filesize

        4.0MB

      • memory/2972-58-0x0000000004C00000-0x0000000004C10000-memory.dmp

        Filesize

        64KB

      • memory/3028-35-0x0000000001240000-0x0000000001250000-memory.dmp

        Filesize

        64KB

      • memory/3744-82-0x00007FFFD3ED0000-0x00007FFFD40C8000-memory.dmp

        Filesize

        2.0MB

      • memory/3744-79-0x0000000002020000-0x0000000002420000-memory.dmp

        Filesize

        4.0MB

      • memory/3744-84-0x0000000075C40000-0x0000000075E7A000-memory.dmp

        Filesize

        2.2MB

      • memory/3744-65-0x0000000000180000-0x0000000000189000-memory.dmp

        Filesize

        36KB

      • memory/3768-33-0x00000000016F0000-0x0000000001700000-memory.dmp

        Filesize

        64KB

      • memory/4816-80-0x00000000025E0000-0x00000000029E0000-memory.dmp

        Filesize

        4.0MB

      • memory/5024-16-0x00007FFFB5AB3000-0x00007FFFB5AB5000-memory.dmp

        Filesize

        8KB

      • memory/5024-22-0x000001B3E93A0000-0x000001B3E93A8000-memory.dmp

        Filesize

        32KB

      • memory/5024-18-0x00007FFFB5AB0000-0x00007FFFB6572000-memory.dmp

        Filesize

        10.8MB

      • memory/5024-17-0x00007FFFB5AB0000-0x00007FFFB6572000-memory.dmp

        Filesize

        10.8MB

      • memory/5024-20-0x000001B3E9380000-0x000001B3E939A000-memory.dmp

        Filesize

        104KB

      • memory/5024-21-0x000001B3E9370000-0x000001B3E937A000-memory.dmp

        Filesize

        40KB

      • memory/5024-0-0x00007FFFB5AB3000-0x00007FFFB5AB5000-memory.dmp

        Filesize

        8KB

      • memory/5024-19-0x000001B3E9350000-0x000001B3E935E000-memory.dmp

        Filesize

        56KB

      • memory/5024-15-0x00007FFFB5AB0000-0x00007FFFB6572000-memory.dmp

        Filesize

        10.8MB

      • memory/5024-13-0x00007FFFB5AB0000-0x00007FFFB6572000-memory.dmp

        Filesize

        10.8MB

      • memory/5024-12-0x00007FFFB5AB0000-0x00007FFFB6572000-memory.dmp

        Filesize

        10.8MB

      • memory/5024-23-0x000001B3E93B0000-0x000001B3E93B8000-memory.dmp

        Filesize

        32KB

      • memory/5024-11-0x00007FFFB5AB0000-0x00007FFFB6572000-memory.dmp

        Filesize

        10.8MB

      • memory/5024-1-0x000001B3E9300000-0x000001B3E9322000-memory.dmp

        Filesize

        136KB

      • memory/5024-24-0x000001B3E93C0000-0x000001B3E93C8000-memory.dmp

        Filesize

        32KB

      • memory/5024-85-0x00007FFFB5AB0000-0x00007FFFB6572000-memory.dmp

        Filesize

        10.8MB