Edit tour
Windows
Analysis Report
Loader.exe
Overview
General Information
Detection
RHADAMANTHYS
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected RHADAMANTHYS Stealer
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Overwrites Mozilla Firefox settings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Explorer Process Tree Break
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Classification
- System is w10x64
- Loader.exe (PID: 1900 cmdline:
"C:\Users\ user\Deskt op\Loader. exe" MD5: 031BAFFF0A790EFC6955A90DAFC6D0E1) - CampaignHardwareLauncher.exe (PID: 6204 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\Campaig nHardwareL auncher\Ca mpaignHard wareLaunch er.exe MD5: ABE04EC3EDDF9D00B7E948E5404E172C) - javaw.exe (PID: 5908 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\Campai gnHardware Launcher\d dfrt657\bi n\javaw.ex e" -Dfile. encoding=U TF-8 -clas spath "ddf rt658\.;dd frt658\..; ddfrt658\a sm-all.jar ;ddfrt658\ dn-compile d-module.j ar;ddfrt65 8\dn-php-s dk.jar;ddf rt658\gson .jar;ddfrt 658\jfoeni x.jar;ddfr t658\jphp- app-framew ork.jar;dd frt658\jph p-core.jar ;ddfrt658\ jphp-deskt op-ext.jar ;ddfrt658\ jphp-gui-e xt.jar;ddf rt658\jphp -gui-jfoen ix-ext.jar ;ddfrt658\ jphp-json- ext.jar;dd frt658\jph p-jsoup-ex t.jar;ddfr t658\jphp- runtime.ja r;ddfrt658 \jphp-xml- ext.jar;dd frt658\jph p-zend-ext .jar;ddfrt 658\jphp-z ip-ext.jar ;ddfrt658\ jsoup.jar; ddfrt658\s lf4j-api.j ar;ddfrt65 8\slf4j-si mple.jar;d dfrt658\zt -zip.jar" org.develn ext.jphp.e xt.javafx. FXLauncher MD5: 48C96771106DBDD5D42BBA3772E4B414) - cmd.exe (PID: 2516 cmdline:
C:\Windows \system32\ cmd.exe /c C:\Users\ user\AppDa ta\Local\T emp\8b774b 6fbd21273c 42f034e15d 863942.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6672 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1088 cmdline:
powershell -inputfor mat none - outputform at none -N onInteract ive -Execu tionPolicy Bypass -C ommand Add -MpPrefere nce -Exclu sionPath $ env:USERPR OFILE MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - WmiPrvSE.exe (PID: 3852 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) - explorer.exe (PID: 3836 cmdline:
explorer C :\Users\us er\AppData \Local\Tem p\medicala nalysispro \medicalan alysispro. exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
- explorer.exe (PID: 5244 cmdline:
C:\Windows \explorer. exe /facto ry,{75dff2 b7-6936-4c 06-a8bb-67 6a7b00b24b } -Embeddi ng MD5: 662F4F92FDE3557E86D110526BB578D5) - medicalanalysispro.exe (PID: 7164 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\medica lanalysisp ro\medical analysispr o.exe" MD5: 178A2A89CB76EFEA6DF50CC884991226) - medicalanalysis.exe (PID: 5648 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\IXP000. TMP\medica lanalysis. exe MD5: 443B43ADCB78164D40C977ABAC54C18E) - InstallUtil.exe (PID: 3148 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Ins tallUtil.e xe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57) - svchost.exe (PID: 6100 cmdline:
"C:\Window s\System32 \svchost.e xe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B) - svchost.exe (PID: 6588 cmdline:
"C:\Window s\System32 \svchost.e xe" MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - chrome.exe (PID: 5884 cmdline:
--user-da ta-dir="C: \Users\use r\AppData\ Local\Temp \chr34F8.t mp" --expl icitly-all owed-ports =8000 --di sable-gpu --new-wind ow "http:/ /127.0.0.1 :8000/446d 3de0/c4624 49b" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6780 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-G B --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2864 --fi eld-trial- handle=276 0,i,891140 9876451875 060,104972 8892193320 1454,26214 4 /prefetc h:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - msedge.exe (PID: 4760 cmdline:
--user-da ta-dir="C: \Users\use r\AppData\ Local\Temp \chr417C.t mp" --expl icitly-all owed-ports =8000 --di sable-gpu --new-wind ow "http:/ /127.0.0.1 :8000/446d 3de0/c7af6 c55" MD5: 69222B8101B0601CC6663F8381E7E00F) - msedge.exe (PID: 2020 cmdline:
"C:\Progra m Files (x 86)\Micros oft\Edge\A pplication \msedge.ex e" --type= utility -- utility-su b-type=net work.mojom .NetworkSe rvice --la ng=en-GB - -service-s andbox-typ e=none --m ojo-platfo rm-channel -handle=32 32 --field -trial-han dle=2952,i ,153761069 8116710288 8,36933655 7334880880 6,262144 / prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F) - wmplayer.exe (PID: 7388 cmdline:
"C:\Progra m Files\Wi ndows Medi a Player\w mplayer.ex e" MD5: 89DCD2D4C0EC638AADC00D3530E07E1D) - WerFault.exe (PID: 3252 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 3 148 -s 348 MD5: C31336C1EFC2CCB44B4326EA793040F2) - medicallanalysis.exe (PID: 5796 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\IXP000. TMP\medica llanalysis .exe MD5: 2DBC39DCE4C3B66019E84A28A342EAD0) - cmd.exe (PID: 3792 cmdline:
"cmd.exe" /C timeout 1 && del "C:\Users\ user\AppDa ta\Local\T emp\IXP000 .TMP\medic allanalysi s.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3992 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - timeout.exe (PID: 6984 cmdline:
timeout 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Rhadamanthys | According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine. |
{"C2 url": "https://104.37.175.218:7982/da03ab84e7f8187e6/v3iuaiea.tsf2o"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_RHADAMANTHYS | Yara detected RHADAMANTHYS Stealer | Joe Security | ||
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security | ||
JoeSecurity_Keylogger_Generic | Yara detected Keylogger Generic | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems), @gott_cyber: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-22T23:54:57.147487+0100 | 2854824 | 2 | Potentially Bad Traffic | 104.37.175.218 | 7982 | 192.168.2.5 | 49929 | TCP |
2024-12-22T23:55:08.286084+0100 | 2854824 | 2 | Potentially Bad Traffic | 104.37.175.218 | 7982 | 192.168.2.5 | 49959 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-22T23:54:30.170802+0100 | 2854802 | 1 | Domain Observed Used for C2 Detected | 104.37.175.218 | 7982 | 192.168.2.5 | 49859 | TCP |
2024-12-22T23:54:57.147487+0100 | 2854802 | 1 | Domain Observed Used for C2 Detected | 104.37.175.218 | 7982 | 192.168.2.5 | 49929 | TCP |
2024-12-22T23:55:08.286084+0100 | 2854802 | 1 | Domain Observed Used for C2 Detected | 104.37.175.218 | 7982 | 192.168.2.5 | 49959 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Code function: | 12_2_00007FF7600A30EC |
Source: | Static PE information: |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 | |
Source: | Code function: | 12_2_00007FF7600A204C |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 13_2_04AA0DE0 | |
Source: | Code function: | 13_2_04AA0DD5 | |
Source: | Code function: | 13_2_0571DDB0 | |
Source: | Code function: | 13_2_0571DDA8 | |
Source: | Code function: | 13_2_05A37B50 | |
Source: | Code function: | 13_2_05A37B17 |
Source: | Memory has grown: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: |
Source: | URLs: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |