Analysis
-
max time kernel
106s -
max time network
124s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09-02-2025 14:56
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win11-20250207-en
General
-
Target
Setup.exe
-
Size
2.0MB
-
MD5
67cace08257e46a6ab571d7b0b9b58cb
-
SHA1
a48fab567f9f8e821b45c00a841a6975acda7594
-
SHA256
603ad184c98b1612294dec25a58a9cbee036ea404618910592352d7e5becfeff
-
SHA512
efc1d582f73d050b117d96261ba7198ef3f941117395a9034ce147e1147aec7b814a6247d9f9fc5ac7122353f1d91da39e472269d898657e5a627636749ed8cf
-
SSDEEP
49152:t5ZPhtX6eO4UP84qPuIOV1NhmUabf+W7:tht/V44uFdGbf+W7
Malware Config
Extracted
lumma
https://thritvingnature.click/api
Signatures
-
Detects Rhadamanthys payload 2 IoCs
resource yara_rule behavioral1/memory/3648-20-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral1/memory/3648-21-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 -
Lumma family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3648 created 780 3648 AddInProcess32.exe 52 -
Downloads MZ/PE file 1 IoCs
flow pid Process 13 4616 Process not Found -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4876 set thread context of 556 4876 Setup.exe 93 PID 4876 set thread context of 3648 4876 Setup.exe 96 PID 556 set thread context of 5076 556 AddInProcess32.exe 97 -
Program crash 1 IoCs
pid pid_target Process procid_target 2360 3648 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 116 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4876 Setup.exe 4876 Setup.exe 4876 Setup.exe 4876 Setup.exe 4876 Setup.exe 556 AddInProcess32.exe 556 AddInProcess32.exe 556 AddInProcess32.exe 3648 AddInProcess32.exe 3648 AddInProcess32.exe 3648 AddInProcess32.exe 3648 AddInProcess32.exe 3420 fontdrvhost.exe 3420 fontdrvhost.exe 3420 fontdrvhost.exe 3420 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4876 Setup.exe Token: SeDebugPrivilege 556 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4876 wrote to memory of 3216 4876 Setup.exe 92 PID 4876 wrote to memory of 3216 4876 Setup.exe 92 PID 4876 wrote to memory of 3216 4876 Setup.exe 92 PID 4876 wrote to memory of 3216 4876 Setup.exe 92 PID 4876 wrote to memory of 3216 4876 Setup.exe 92 PID 4876 wrote to memory of 3216 4876 Setup.exe 92 PID 4876 wrote to memory of 3216 4876 Setup.exe 92 PID 4876 wrote to memory of 3216 4876 Setup.exe 92 PID 4876 wrote to memory of 556 4876 Setup.exe 93 PID 4876 wrote to memory of 556 4876 Setup.exe 93 PID 4876 wrote to memory of 556 4876 Setup.exe 93 PID 4876 wrote to memory of 556 4876 Setup.exe 93 PID 4876 wrote to memory of 556 4876 Setup.exe 93 PID 4876 wrote to memory of 556 4876 Setup.exe 93 PID 4876 wrote to memory of 556 4876 Setup.exe 93 PID 4876 wrote to memory of 556 4876 Setup.exe 93 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 4876 wrote to memory of 3648 4876 Setup.exe 96 PID 556 wrote to memory of 5076 556 AddInProcess32.exe 97 PID 556 wrote to memory of 5076 556 AddInProcess32.exe 97 PID 556 wrote to memory of 5076 556 AddInProcess32.exe 97 PID 556 wrote to memory of 5076 556 AddInProcess32.exe 97 PID 556 wrote to memory of 5076 556 AddInProcess32.exe 97 PID 556 wrote to memory of 5076 556 AddInProcess32.exe 97 PID 556 wrote to memory of 5076 556 AddInProcess32.exe 97 PID 556 wrote to memory of 5076 556 AddInProcess32.exe 97 PID 556 wrote to memory of 5076 556 AddInProcess32.exe 97 PID 3648 wrote to memory of 3420 3648 AddInProcess32.exe 98 PID 3648 wrote to memory of 3420 3648 AddInProcess32.exe 98 PID 3648 wrote to memory of 3420 3648 AddInProcess32.exe 98 PID 3648 wrote to memory of 3420 3648 AddInProcess32.exe 98 PID 3648 wrote to memory of 3420 3648 AddInProcess32.exe 98
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:780
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:3216
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5076
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 3723⤵
- Program crash
PID:2360
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbmV4dHZlcnNpb249IiIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMiIgaW5zdGFsbGRhdGV0aW1lPSIxNzM4OTM1NjE1IiBvb2JlX2luc3RhbGxfdGltZT0iMTMzODM0MDc5NTE4NzcwMDAwIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjE3OTg2MiIgc3lzdGVtX3VwdGltZV90aWNrcz0iNDkwNzUxNDk1OSIvPjwvYXBwPjwvcmVxdWVzdD41⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3648 -ip 36481⤵PID:1868