Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
vdd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
vdd.exe
Resource
win10v2004-20250129-en
General
-
Target
vdd.exe
-
Size
4.7MB
-
MD5
04e9992febe7ddbd2a6ca03018e247d5
-
SHA1
6c2fbeda5e2678d79c7bff728156b2e7c943c295
-
SHA256
bd741c9630aa46864c872c6cc89269659f2a99a0185295dc6d8c080340beab70
-
SHA512
564414e4f064ddd5d8c966729cd8e391a59726377c877ae9ad3380a8eadc370140c3e0b676267d938fbd344b5e6602d4a274f0ec627c9686a39bd4c12b5a116b
-
SSDEEP
98304:PWiVNyVD9FGM2+bA4+b4gq/3YqL3VYZiLeYqE6cDu8SztDbf+W7i:PWiHyVDbB2b4gq/3pLmWa/bf+W7i
Malware Config
Extracted
lumma
https://paleboreei.biz/api
Signatures
-
Detects Rhadamanthys payload 4 IoCs
resource yara_rule behavioral2/memory/4524-57-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral2/memory/4524-59-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral2/memory/4524-60-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral2/memory/4524-58-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 -
Lumma family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4524 created 2576 4524 AddInProcess32.exe 42 -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4484 set thread context of 1876 4484 vdd.exe 96 PID 4484 set thread context of 4524 4484 vdd.exe 102 PID 1876 set thread context of 2140 1876 AddInProcess32.exe 103 -
Program crash 1 IoCs
pid pid_target Process procid_target 3272 4524 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4484 vdd.exe 4484 vdd.exe 1876 AddInProcess32.exe 4484 vdd.exe 4484 vdd.exe 1876 AddInProcess32.exe 4524 AddInProcess32.exe 4524 AddInProcess32.exe 4524 AddInProcess32.exe 4524 AddInProcess32.exe 1928 fontdrvhost.exe 1928 fontdrvhost.exe 1928 fontdrvhost.exe 1928 fontdrvhost.exe 2140 AddInProcess32.exe 2140 AddInProcess32.exe 2140 AddInProcess32.exe 2140 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4484 vdd.exe Token: SeDebugPrivilege 1876 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4484 wrote to memory of 1876 4484 vdd.exe 96 PID 4484 wrote to memory of 1876 4484 vdd.exe 96 PID 4484 wrote to memory of 1876 4484 vdd.exe 96 PID 4484 wrote to memory of 1876 4484 vdd.exe 96 PID 4484 wrote to memory of 1876 4484 vdd.exe 96 PID 4484 wrote to memory of 1876 4484 vdd.exe 96 PID 4484 wrote to memory of 1876 4484 vdd.exe 96 PID 4484 wrote to memory of 1876 4484 vdd.exe 96 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 3400 4484 vdd.exe 101 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 4484 wrote to memory of 4524 4484 vdd.exe 102 PID 1876 wrote to memory of 2140 1876 AddInProcess32.exe 103 PID 1876 wrote to memory of 2140 1876 AddInProcess32.exe 103 PID 1876 wrote to memory of 2140 1876 AddInProcess32.exe 103 PID 1876 wrote to memory of 2140 1876 AddInProcess32.exe 103 PID 1876 wrote to memory of 2140 1876 AddInProcess32.exe 103 PID 1876 wrote to memory of 2140 1876 AddInProcess32.exe 103 PID 1876 wrote to memory of 2140 1876 AddInProcess32.exe 103 PID 1876 wrote to memory of 2140 1876 AddInProcess32.exe 103 PID 1876 wrote to memory of 2140 1876 AddInProcess32.exe 103 PID 4524 wrote to memory of 1928 4524 AddInProcess32.exe 105 PID 4524 wrote to memory of 1928 4524 AddInProcess32.exe 105 PID 4524 wrote to memory of 1928 4524 AddInProcess32.exe 105 PID 4524 wrote to memory of 1928 4524 AddInProcess32.exe 105 PID 4524 wrote to memory of 1928 4524 AddInProcess32.exe 105
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2576
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\vdd.exe"C:\Users\Admin\AppData\Local\Temp\vdd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:3400
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 3163⤵
- Program crash
PID:3272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4524 -ip 45241⤵PID:368