Overview
overview
6Static
static
3LithiumNuk...re.dll
windows7-x64
1LithiumNuk...re.dll
windows10-2004-x64
1LithiumNuk...V2.exe
windows7-x64
6LithiumNuk...V2.exe
windows10-2004-x64
3LithiumNuk...on.dll
windows7-x64
1LithiumNuk...on.dll
windows10-2004-x64
1LithiumNuk...ib.dll
windows7-x64
1LithiumNuk...ib.dll
windows10-2004-x64
1Analysis
-
max time kernel
43s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
LithiumNukerV2-main/LithiumCore.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LithiumNukerV2-main/LithiumCore.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
LithiumNukerV2-main/LithiumNukerV2.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
LithiumNukerV2-main/LithiumNukerV2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
LithiumNukerV2-main/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
LithiumNukerV2-main/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
LithiumNukerV2-main/Veylib.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
LithiumNukerV2-main/Veylib.dll
Resource
win10v2004-20240802-en
General
-
Target
LithiumNukerV2-main/LithiumNukerV2.exe
-
Size
17KB
-
MD5
141296b8484e510e357fc620613fd4ba
-
SHA1
ad5dcb55883e74b53da1c6d94ce18b1788ba67a6
-
SHA256
0a918070f9cf821847b17df6c9d8858e1dd2da30a7d7121e06efe27eff740ad4
-
SHA512
dde9ef0c074ea607c7acf6d248f4b6980cb9e057ade6885d2c5091ebc71f7842dc113f813a4d5d54a7a0d6acbb2437cbd9684d1472872313d2c62f8794e42b2e
-
SSDEEP
192:zvrvG+/dLz9R3nLc8MGzSnCs3Hznvjd0p6oUYc84C3LZm94qt5fOrool:zzn/d08fSvXznvjd0/cu3L0flo
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 39 discord.com 40 discord.com 38 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LithiumNukerV2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1204 chrome.exe 1204 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe Token: SeShutdownPrivilege 1204 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe 1204 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2288 1204 chrome.exe 31 PID 1204 wrote to memory of 2288 1204 chrome.exe 31 PID 1204 wrote to memory of 2288 1204 chrome.exe 31 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2224 1204 chrome.exe 33 PID 1204 wrote to memory of 2756 1204 chrome.exe 34 PID 1204 wrote to memory of 2756 1204 chrome.exe 34 PID 1204 wrote to memory of 2756 1204 chrome.exe 34 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35 PID 1204 wrote to memory of 2764 1204 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\LithiumNukerV2-main\LithiumNukerV2.exe"C:\Users\Admin\AppData\Local\Temp\LithiumNukerV2-main\LithiumNukerV2.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2412
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7169758,0x7fef7169768,0x7fef71697782⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:22⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1384 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1452 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2248 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:12⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2256 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2060 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:22⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2060 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:12⤵PID:108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3376 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:82⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3232 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:82⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3252 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:82⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1036 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:12⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3728 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:12⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1116 --field-trial-handle=1768,i,8712398961612623041,2998890325872910621,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
363B
MD5a0469f3ed98dbef7ca30c6daaba7a7ee
SHA19dcced90997d9fd587710b0b1e3a2d82868a889d
SHA256b8692d130a78f4b4d150204ca9de5231edba87145cc8eaf7d48f1868f398b6b8
SHA5127475d16786bd96bc5d355a20c609c8224f05ce50728abf786978b24c2098babd33e65041087e28e4e3c5d18d8488e52937345b3a7d62b387bf651b1498a22888
-
Filesize
363B
MD5cc3edfa6093cc6cea06421e5537d1d48
SHA14e21b7175361a5c264b42963c8b53c0ffeefcf43
SHA256b6a4cb1c96f6e36e69bd23c8c0debcca5b6f2ad00a7b608597d9d4cf8ed5081a
SHA512b1d18da77218b498977e9b191d2773898a62ca46b00630b457c0ee7d5f7828cb78885c66e5904601a44aa6ebe6cabb7e49b35e5f03cdefe5babaf3fdcb0900e8
-
Filesize
6KB
MD597b8f216a05bc4bd494886a5ffeff818
SHA1ae4f04a06f3489d012893ce5bf007fc50df88503
SHA25614c7fd04a3011b7b0718689a38c4875047c34ecf5c17a49ab1dd5d650459bd73
SHA512006c7f3ee94ac95d4bf512f504ec30785a6d66b16c1172eb8b0ba14418844517cfcb0e72aba543d937d786b3be3fd3254737e62fa47bbdbd26646be15cffe4c9
-
Filesize
5KB
MD5bdbe036527450bc33d40d7820eefd73d
SHA1b2942c42cee31e9c84f9fe2f40603bf4c4e1b2d3
SHA25697c0b084a4aaf5b28da988c70cd63a9b947eb342f1e3e938fc1d4f9d73b49175
SHA512fc7ce992512b6312e2ac9efacb7b4ff380c0bf96e5d4b2d0ed3923bff9f03508d982b9a3502651d4031fc7d522832fb9ade1059fbc917d5dcef8e85cf6624d26
-
Filesize
5KB
MD50d60f93c6f319ab9f7536b518d9da235
SHA1c3ef97a3d0bf0316bda99df338b81f997b035c31
SHA2560cca0b041f46e3723dedcf323432d13933b6f2317322152e7943657f8e46eb34
SHA51217f80f0a538529e74c6afb239a96844cf0368585ac3844a2491281c16fe71ae939e7b88b9c149626dfe400971ddcbe7b2167c981260de04895d302693a8df686
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2