File name: | 702ab38086350094b28c8df1b670f84f.exe |
Full analysis: | https://app.any.run/tasks/5ad2aa1b-6e72-4b70-a841-8ff51037d505 |
Verdict: | Malicious activity |
Threats: | Rhadamanthys is a C++ information-stealing malware that extracts sensitive data from infiltrated machines. Its layered operational chain and advanced evasion tactics make it a major risk in cybersecurity landscapes. |
Analysis date: | August 20, 2024, 07:37:43 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive |
MD5: | 702AB38086350094B28C8DF1B670F84F |
SHA1: | 3A6FF038D4E70D9F5E4A48F617612F9FC330BC03 |
SHA256: | 8B738C9057BAA2C3219120919226E95659CCCEC0DC61ACA579BBA58C7090719E |
SSDEEP: | 98304:B/kvuFbGjL9rLTNamBbetKeDB7hZlPUffCFG3VGGqw:L |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
ProductName: | InnoWave |
---|---|
LegalTrademarks: | InnoWave is a trademark of DesignWave Technologies |
LegalCopyright: | Copyright © DesignWave Technologies 2017 All rights reserved. |
FileVersion: | 7.6292.0.5224 |
FileDescription: | Empowers creative minds with cutting-edge tools for design and innovation. |
CompanyName: | DesignWave Technologies |
Comments: | Empowers creative minds with cutting-edge tools for design and innovation. |
CharacterSet: | Unicode |
LanguageCode: | English (U.S.) |
FileSubtype: | - |
ObjectFileType: | Executable application |
FileOS: | Win32 |
FileFlags: | (none) |
FileFlagsMask: | 0x0000 |
ProductVersionNumber: | 7.6292.0.5224 |
FileVersionNumber: | 7.6292.0.5224 |
Subsystem: | Windows GUI |
SubsystemVersion: | 5 |
ImageVersion: | 6 |
OSVersion: | 5 |
EntryPoint: | 0x3415 |
UninitializedDataSize: | 16896 |
InitializedDataSize: | 475136 |
CodeSize: | 26624 |
LinkerVersion: | 9 |
PEType: | PE32 |
ImageFileCharacteristics: | No relocs, Executable, 32-bit |
TimeStamp: | 2010:04:10 12:19:38+00:00 |
MachineType: | Intel 386 or later, and compatibles |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
6884 | "C:\Users\admin\AppData\Local\Temp\702ab38086350094b28c8df1b670f84f.exe" | C:\Users\admin\AppData\Local\Temp\702ab38086350094b28c8df1b670f84f.exe | — | explorer.exe | |||||||||||
User: admin Company: DesignWave Technologies Integrity Level: MEDIUM Description: Empowers creative minds with cutting-edge tools for design and innovation. Exit code: 0 Version: 7.6292.0.5224 Modules
| |||||||||||||||
6968 | "C:\Windows\System32\cmd.exe" /k move Almost Almost.cmd & Almost.cmd & exit | C:\Windows\SysWOW64\cmd.exe | 702ab38086350094b28c8df1b670f84f.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 9009 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
6984 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
7044 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
7056 | findstr /I "wrsa.exe opssvc.exe" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6488 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6428 | findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6712 | cmd /c md 561944 | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
6784 | findstr /V "ZealandInvitationMonoMessage" Import | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3176 | cmd /c copy /b ..\Reports + ..\Ontario + ..\Contacting + ..\Midlands + ..\Guestbook + ..\Placement + ..\Patricia + ..\Saving + ..\Addition + ..\Publisher + ..\Machine + ..\Blowjobs + ..\Ni E | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
|
(PID) Process: | (6884) 702ab38086350094b28c8df1b670f84f.exe | Key: | HKEY_CURRENT_USER |
Operation: | delete value | Name: | JobCrisis |
Value: | |||
(PID) Process: | (6884) 702ab38086350094b28c8df1b670f84f.exe | Key: | HKEY_CURRENT_USER |
Operation: | delete value | Name: | WishWasher |
Value: | |||
(PID) Process: | (6884) 702ab38086350094b28c8df1b670f84f.exe | Key: | HKEY_CURRENT_USER |
Operation: | delete value | Name: | IncreasesFees |
Value: | |||
(PID) Process: | (6884) 702ab38086350094b28c8df1b670f84f.exe | Key: | HKEY_CURRENT_USER |
Operation: | delete value | Name: | CohenAware |
Value: | |||
(PID) Process: | (6884) 702ab38086350094b28c8df1b670f84f.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (6884) 702ab38086350094b28c8df1b670f84f.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (6884) 702ab38086350094b28c8df1b670f84f.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (6884) 702ab38086350094b28c8df1b670f84f.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (6884) 702ab38086350094b28c8df1b670f84f.exe | Key: | HKEY_CURRENT_USER |
Operation: | delete value | Name: | BecauseEquilibrium |
Value: | |||
(PID) Process: | (5492) Internet.pif | Key: | HKEY_CURRENT_USER\SOFTWARE\SibCode |
Operation: | write | Name: | sn2 |
Value: C659EAF00D41CB2BF6BC589924FF76AA0F95F4EDD1D40368556CEE15391B9632B46F0F0C3B3F3FE0C9404F47EE4215ABF12C942420C3DF64B8FF98B245B8706F |
PID | Process | Filename | Type | |
---|---|---|---|---|
6884 | 702ab38086350094b28c8df1b670f84f.exe | C:\Users\admin\AppData\Local\Temp\Publisher | binary | |
MD5:598FFCA35E33B4FC2302A61BF056658E | SHA256:775D09D656B3BEB4D711CBB12759CB876F3A6A39B711E805BC94D1EEFB98FD7A | |||
6884 | 702ab38086350094b28c8df1b670f84f.exe | C:\Users\admin\AppData\Local\Temp\Midlands | binary | |
MD5:8C7367EC5AA6710A1F86257B6CB93C0E | SHA256:2848A8FDE81CA7346A6C2FF41221E5685EFE6C16E446A60D58E336632F2862DA | |||
6884 | 702ab38086350094b28c8df1b670f84f.exe | C:\Users\admin\AppData\Local\Temp\Almost | text | |
MD5:F629C391BB2A555D7201BA313533CB61 | SHA256:A841624B9936A625F45CFFFC446271BE2191C3204BF7BAA7BDF8890E6DB691F3 | |||
6884 | 702ab38086350094b28c8df1b670f84f.exe | C:\Users\admin\AppData\Local\Temp\Import | binary | |
MD5:B9991072E589E18038FF84065B53AF77 | SHA256:4FCBF02FF9DBAAB6570A24DFC8377D05433D124C3B6CD5AFE08E3D0E5A36E78E | |||
6968 | cmd.exe | C:\Users\admin\AppData\Local\Temp\561944\Internet.pif | executable | |
MD5:C7F4524EE853537A20DE830FCEAA3346 | SHA256:BAF7B144B41F37B997C2D238FD5C1813AFD538CBCA9CBE29E8C020AF59960AA6 | |||
5492 | Internet.pif | C:\Users\admin\AppData\Local\DesignWave Technologies\y | binary | |
MD5:E0CCB032F8A542FAC39F8DFB475FD99D | SHA256:1825A57BFD027E96B47E85F789DD3E15F56980464DF7C60FA7600F0F37153167 | |||
6884 | 702ab38086350094b28c8df1b670f84f.exe | C:\Users\admin\AppData\Local\Temp\Guestbook | binary | |
MD5:79EFBA76FD8B1B30963707B8BF350501 | SHA256:7A41B11BB70E4BABB6ED10A663A67CC5B9B74C3112BB2B2258DB5AB74082E141 | |||
6884 | 702ab38086350094b28c8df1b670f84f.exe | C:\Users\admin\AppData\Local\Temp\Ontario | binary | |
MD5:8B6E671BCDE125B3094E8A844DC83EB9 | SHA256:05536696A886B9FFC228F97BF9399113E0E335F6D416C53AE15053F595D8AB78 | |||
6884 | 702ab38086350094b28c8df1b670f84f.exe | C:\Users\admin\AppData\Local\Temp\Machine | binary | |
MD5:71426D9AA93B60C078ED07AD60C6A8E2 | SHA256:DFACBE1A810D928348AF9A9E49C57532EBAE04209C0250733512656AC9719786 | |||
6968 | cmd.exe | C:\Users\admin\AppData\Local\Temp\Almost.cmd | text | |
MD5:F629C391BB2A555D7201BA313533CB61 | SHA256:A841624B9936A625F45CFFFC446271BE2191C3204BF7BAA7BDF8890E6DB691F3 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2628 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7136 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
6792 | SIHClient.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3412 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
252 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
3260 | svchost.exe | 40.115.3.253:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2628 | svchost.exe | 20.190.159.73:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2628 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
7136 | backgroundTaskHost.exe | 20.103.156.88:443 | arc.msn.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | unknown |
7136 | backgroundTaskHost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
fkoPkbWVIq.fkoPkbWVIq |
| unknown |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | STEALER [ANY.RUN] Rhadamanthys SSL Certificate and JA3s |
— | — | A Network Trojan was detected | STEALER [ANY.RUN] Rhadamanthys SSL Certificate and JA3s |