Analysis
-
max time kernel
113s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe
Resource
win10v2004-20250217-en
General
-
Target
SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe
-
Size
1.2MB
-
MD5
428debead98e87580b9d650b373dc205
-
SHA1
4965fb5c56de9a62f4eacf49ec9ff523500a31c7
-
SHA256
5c9f76f84adfb563c3073625481286cfb5059a05d12d635ee26e758c6c881a8a
-
SHA512
4637b63cd4efbb72fdc4b9be7b7346a7bdfb408faa218c2ba26e184902c4b93e1bae2bd5e083a9826529089012015839e276bc8c1a41d9f7e93621950f611899
-
SSDEEP
12288:SvkKkPpLiD4PDM5nN9gSv6Xb2Q0dXyzFAFQgUB39MwT:AksDODM3v6b2QYyxAh4d
Malware Config
Extracted
lumma
https://paleboreei.biz/api
https://uncertainyelemz.bet/api
https://hobbyedsmoker.live/api
https://dsfljsdfjewf.info/api
https://ddeaddereaste.today/api
https://subawhipnator.life/api
https://privileggoe.live/api
https://decreaserid.world/api
https://pastedeputten.life/api
Signatures
-
Detects Rhadamanthys payload 2 IoCs
resource yara_rule behavioral2/memory/2316-57-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 behavioral2/memory/2316-59-0x0000000000400000-0x0000000000481000-memory.dmp Rhadamanthys_v8 -
Lumma family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2316 created 2192 2316 AddInProcess32.exe 50 -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3308 set thread context of 316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 98 PID 3308 set thread context of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 316 set thread context of 1264 316 AddInProcess32.exe 107 -
Program crash 1 IoCs
pid pid_target Process procid_target 464 2316 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 316 AddInProcess32.exe 316 AddInProcess32.exe 316 AddInProcess32.exe 316 AddInProcess32.exe 316 AddInProcess32.exe 316 AddInProcess32.exe 316 AddInProcess32.exe 316 AddInProcess32.exe 316 AddInProcess32.exe 2316 AddInProcess32.exe 2316 AddInProcess32.exe 2316 AddInProcess32.exe 2316 AddInProcess32.exe 3840 fontdrvhost.exe 3840 fontdrvhost.exe 3840 fontdrvhost.exe 3840 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe Token: SeDebugPrivilege 316 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 3308 wrote to memory of 316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 98 PID 3308 wrote to memory of 316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 98 PID 3308 wrote to memory of 316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 98 PID 3308 wrote to memory of 316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 98 PID 3308 wrote to memory of 316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 98 PID 3308 wrote to memory of 316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 98 PID 3308 wrote to memory of 316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 98 PID 3308 wrote to memory of 316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 98 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 3308 wrote to memory of 2316 3308 SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe 103 PID 316 wrote to memory of 2264 316 AddInProcess32.exe 104 PID 316 wrote to memory of 2264 316 AddInProcess32.exe 104 PID 316 wrote to memory of 2264 316 AddInProcess32.exe 104 PID 316 wrote to memory of 2264 316 AddInProcess32.exe 104 PID 316 wrote to memory of 2264 316 AddInProcess32.exe 104 PID 316 wrote to memory of 2264 316 AddInProcess32.exe 104 PID 316 wrote to memory of 2264 316 AddInProcess32.exe 104 PID 316 wrote to memory of 2264 316 AddInProcess32.exe 104 PID 316 wrote to memory of 2264 316 AddInProcess32.exe 104 PID 316 wrote to memory of 212 316 AddInProcess32.exe 105 PID 316 wrote to memory of 212 316 AddInProcess32.exe 105 PID 316 wrote to memory of 212 316 AddInProcess32.exe 105 PID 316 wrote to memory of 212 316 AddInProcess32.exe 105 PID 316 wrote to memory of 212 316 AddInProcess32.exe 105 PID 316 wrote to memory of 212 316 AddInProcess32.exe 105 PID 316 wrote to memory of 212 316 AddInProcess32.exe 105 PID 316 wrote to memory of 212 316 AddInProcess32.exe 105 PID 316 wrote to memory of 212 316 AddInProcess32.exe 105 PID 316 wrote to memory of 1016 316 AddInProcess32.exe 106 PID 316 wrote to memory of 1016 316 AddInProcess32.exe 106 PID 316 wrote to memory of 1016 316 AddInProcess32.exe 106 PID 316 wrote to memory of 1016 316 AddInProcess32.exe 106 PID 316 wrote to memory of 1016 316 AddInProcess32.exe 106 PID 316 wrote to memory of 1016 316 AddInProcess32.exe 106 PID 316 wrote to memory of 1016 316 AddInProcess32.exe 106 PID 316 wrote to memory of 1016 316 AddInProcess32.exe 106 PID 316 wrote to memory of 1016 316 AddInProcess32.exe 106 PID 316 wrote to memory of 1264 316 AddInProcess32.exe 107 PID 316 wrote to memory of 1264 316 AddInProcess32.exe 107 PID 316 wrote to memory of 1264 316 AddInProcess32.exe 107 PID 316 wrote to memory of 1264 316 AddInProcess32.exe 107 PID 316 wrote to memory of 1264 316 AddInProcess32.exe 107 PID 316 wrote to memory of 1264 316 AddInProcess32.exe 107 PID 316 wrote to memory of 1264 316 AddInProcess32.exe 107 PID 316 wrote to memory of 1264 316 AddInProcess32.exe 107 PID 316 wrote to memory of 1264 316 AddInProcess32.exe 107 PID 2316 wrote to memory of 3840 2316 AddInProcess32.exe 112 PID 2316 wrote to memory of 3840 2316 AddInProcess32.exe 112 PID 2316 wrote to memory of 3840 2316 AddInProcess32.exe 112 PID 2316 wrote to memory of 3840 2316 AddInProcess32.exe 112 PID 2316 wrote to memory of 3840 2316 AddInProcess32.exe 112
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2192
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Lumma.1819.32341.28310.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵PID:2264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵PID:212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵PID:1016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1264
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 3363⤵
- Program crash
PID:464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2316 -ip 23161⤵PID:1792