Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
kapubvalo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kapubvalo.exe
Resource
win10v2004-20250314-en
General
-
Target
kapubvalo.exe
-
Size
2.0MB
-
MD5
bc42b228a222e547e199fe8a7ad012d0
-
SHA1
7f7f2655c3b9fe74a225255f609ba89165be776d
-
SHA256
560f888fe44146da6d08fda8fe0f6f6f6eaed3cab768096ac195e5d14a85a399
-
SHA512
b4ce427095453f949b470ba58ba4177206e7512fd4c5fbf11430f1a00df385884c54a601a174a02434d0d2741a69cbb2a19e6ad1a9e83872dc028382646111d8
-
SSDEEP
49152:5oIdtKEtKNtKAtKGtKvtK2dM0ErvDtKdn:j0E0N0A0G0v0Ak30
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2136 created 1156 2136 kapubvalo.exe 20 -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\KjFLZigogSJRHwELTDudUSoNJBem\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\KjFLZigogSJRHwELTDudUSoNJBem" drvloader.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 drvloader.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 kapubvalo.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SoftwareDistribution\Download\vac.sys kapubvalo.exe File created C:\Windows\SoftwareDistribution\Download\drvloader.exe kapubvalo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2136 kapubvalo.exe 2136 kapubvalo.exe 2424 dialer.exe 2424 dialer.exe 2136 kapubvalo.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2944 drvloader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2944 drvloader.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2944 2136 kapubvalo.exe 32 PID 2136 wrote to memory of 2944 2136 kapubvalo.exe 32 PID 2136 wrote to memory of 2944 2136 kapubvalo.exe 32 PID 2136 wrote to memory of 2424 2136 kapubvalo.exe 34 PID 2136 wrote to memory of 2424 2136 kapubvalo.exe 34 PID 2136 wrote to memory of 2424 2136 kapubvalo.exe 34 PID 2136 wrote to memory of 2424 2136 kapubvalo.exe 34 PID 2136 wrote to memory of 2424 2136 kapubvalo.exe 34 PID 2136 wrote to memory of 2752 2136 kapubvalo.exe 35 PID 2136 wrote to memory of 2752 2136 kapubvalo.exe 35 PID 2136 wrote to memory of 2752 2136 kapubvalo.exe 35 PID 2136 wrote to memory of 2792 2136 kapubvalo.exe 36 PID 2136 wrote to memory of 2792 2136 kapubvalo.exe 36 PID 2136 wrote to memory of 2792 2136 kapubvalo.exe 36 PID 2136 wrote to memory of 2772 2136 kapubvalo.exe 37 PID 2136 wrote to memory of 2772 2136 kapubvalo.exe 37 PID 2136 wrote to memory of 2772 2136 kapubvalo.exe 37 PID 2136 wrote to memory of 2716 2136 kapubvalo.exe 38 PID 2136 wrote to memory of 2716 2136 kapubvalo.exe 38 PID 2136 wrote to memory of 2716 2136 kapubvalo.exe 38 PID 2136 wrote to memory of 2680 2136 kapubvalo.exe 39 PID 2136 wrote to memory of 2680 2136 kapubvalo.exe 39 PID 2136 wrote to memory of 2680 2136 kapubvalo.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\kapubvalo.exe"C:\Users\Admin\AppData\Local\Temp\kapubvalo.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SoftwareDistribution\Download\drvloader.exe"C:\Windows\SoftwareDistribution\Download\drvloader.exe" C:\Windows\SoftwareDistribution\Download\vac.sys3⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color e3⤵PID:2752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color c3⤵PID:2772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color c3⤵PID:2680
-
-
-
C:\Windows\system32\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD534cfbe3ff70461820ccc31a1afeec0b3
SHA15d32e91c039c9a6f723ba3c04c1179d02e6a0ce9
SHA2566ebcc6896b243c761da4fc28a26249b0c146ae17aff7697c09bc447008e831df
SHA5121ca4661be645e7e954d89c83f1fd126a5e936533052d4e330c9faccb83bb5942d28265375cee743e468b1625a0c1f10888e7957fe88c718e8501a86a78cdc06e