Threat name:
Amadey, LummaC Stealer, PureLog Stealer,
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potentially Suspicious Child Process Of Regsvr32
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Powershell launch regsvr32
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Uses Register-ScheduledTask to add task schedules
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected PureLog Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1602215
Sample:
random.exe
Startdate:
29/01/2025
Architecture:
WINDOWS
Score:
100
180
www.youtube.com
2->180
182
www.wikipedia.org
2->182
184
64 other IPs or domains
2->184
216
Suricata IDS alerts
for network traffic
2->216
218
Found malware configuration
2->218
220
Antivirus detection
for URL or domain
2->220
222
35 other signatures
2->222
14
skotes.exe
2
45
2->14
started
19
random.exe
5
2->19
started
21
f77543ff11.exe
2->21
started
23
7 other processes
2->23
signatures3
process4
dnsIp5
188
185.215.113.16, 51035, 51043, 51049
WHOLESALECONNECTIONSNL
Portugal
14->188
190
185.215.113.43, 51019, 51020, 51022
WHOLESALECONNECTIONSNL
Portugal
14->190
192
2 other IPs or domains
14->192
164
C:\Users\user\AppData\...\a095d3f2be.exe, PE32
14->164
dropped
166
C:\Users\user\AppData\...\f06b66484e.exe, PE32
14->166
dropped
168
C:\Users\user\AppData\...\b8d900ea50.exe, PE32+
14->168
dropped
176
23 other malicious files
14->176
dropped
194
Creates multiple autostart
registry keys
14->194
196
Hides threads from debuggers
14->196
198
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
14->198
25
f77543ff11.exe
14->25
started
29
BjOFAcx.exe
14->29
started
31
infinity.exe
2
14->31
started
43
5 other processes
14->43
170
C:\Users\user\AppData\Local\...\skotes.exe, PE32
19->170
dropped
172
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
19->172
dropped
200
Detected unpacking (changes
PE section rights)
19->200
202
Tries to evade debugger
and weak emulator (self
modifying code)
19->202
204
Tries to detect virtualization
through RDTSC time measurements
19->204
33
skotes.exe
19->33
started
174
C:\Users\user\AppData\Local\...\tvL39XaN6.hta, HTML
21->174
dropped
206
Binary is likely a compiled
AutoIt script file
21->206
208
Creates HTA files
21->208
35
mshta.exe
21->35
started
37
cmd.exe
21->37
started
210
Suspicious powershell
command line found
23->210
212
Tries to download and
execute files (via powershell)
23->212
214
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
23->214
39
powershell.exe
23->39
started
41
WerFault.exe
23->41
started
file6
signatures7
process8
dnsIp9
146
C:\Users\user\AppData\Local\...\6d7HYLtgg.hta, HTML
25->146
dropped
242
Multi AV Scanner detection
for dropped file
25->242
244
Binary is likely a compiled
AutoIt script file
25->244
246
Creates HTA files
25->246
46
mshta.exe
25->46
started
49
cmd.exe
25->49
started
148
C:\Users\user\AppData\Local\...\BjOFAcx.tmp, PE32
29->148
dropped
51
BjOFAcx.tmp
29->51
started
150
C:\Users\user\AppData\Local\...\infinity.tmp, PE32
31->150
dropped
54
infinity.tmp
18
26
31->54
started
248
Detected unpacking (changes
PE section rights)
33->248
250
Tries to evade debugger
and weak emulator (self
modifying code)
33->250
252
Hides threads from debuggers
33->252
264
2 other signatures
33->264
254
Suspicious powershell
command line found
35->254
256
Tries to download and
execute files (via powershell)
35->256
56
powershell.exe
35->56
started
62
2 other processes
37->62
58
conhost.exe
39->58
started
186
climepunneddus.com
104.21.88.148
CLOUDFLARENETUS
United States
43->186
152
C:\Users\user\AppData\Local\...\axplong.exe, PE32
43->152
dropped
258
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
43->258
260
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
43->260
262
Machine Learning detection
for dropped file
43->262
266
5 other signatures
43->266
60
axplong.exe
43->60
started
64
4 other processes
43->64
file10
signatures11
process12
dnsIp13
274
Suspicious powershell
command line found
46->274
276
Tries to download and
execute files (via powershell)
46->276
67
powershell.exe
46->67
started
278
Uses schtasks.exe or
at.exe to add and modify
task schedules
49->278
83
2 other processes
49->83
120
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
51->120
dropped
122
C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32
51->122
dropped
124
C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32
51->124
dropped
71
BjOFAcx.exe
51->71
started
126
C:\Users\user\...\widescreenrecorder31.exe, PE32
54->126
dropped
128
C:\Users\user\AppData\...\unins000.exe (copy), PE32
54->128
dropped
130
C:\Users\user\AppData\Local\...\is-C0EK8.tmp, PE32
54->130
dropped
136
21 other files (11 malicious)
54->136
dropped
73
widescreenrecorder31.exe
1
3
54->73
started
132
TempAZ39Z6U8HMWWVAOKNDXK1NUTMH8EUJMH.EXE, PE32
56->132
dropped
75
conhost.exe
56->75
started
280
Multi AV Scanner detection
for dropped file
60->280
282
Detected unpacking (changes
PE section rights)
60->282
284
Tries to evade debugger
and weak emulator (self
modifying code)
60->284
292
3 other signatures
60->292
178
innerkomen.com
172.67.178.239, 443, 51024, 51026
CLOUDFLARENETUS
United States
64->178
134
C:\Temp\C0eI3oS6H.hta, HTML
64->134
dropped
286
Query firmware table
information (likely
to detect VMs)
64->286
288
Found many strings related
to Crypto-Wallets (likely
being stolen)
64->288
290
Tries to harvest and
steal ftp login credentials
64->290
294
3 other signatures
64->294
77
mshta.exe
64->77
started
79
cmd.exe
64->79
started
81
cmd.exe
64->81
started
85
4 other processes
64->85
file14
signatures15
process16
file17
138
Temp79NNKXWDGXPKNR6F9BHAN1CF4G32IWQD.EXE, PE32
67->138
dropped
228
Powershell drops PE
file
67->228
87
Temp79NNKXWDGXPKNR6F9BHAN1CF4G32IWQD.EXE
67->87
started
90
conhost.exe
67->90
started
140
C:\Users\user\AppData\Local\...\BjOFAcx.tmp, PE32
71->140
dropped
92
BjOFAcx.tmp
71->92
started
142
C:\ProgramData\...\sqlite3.dll, PE32
73->142
dropped
144
C:\ProgramData\...\WideScreenRecorder.exe, PE32
73->144
dropped
230
Suspicious powershell
command line found
77->230
232
Tries to download and
execute files (via powershell)
77->232
95
powershell.exe
77->95
started
97
powershell.exe
79->97
started
99
powershell.exe
81->99
started
101
powershell.exe
85->101
started
signatures18
process19
file20
234
Multi AV Scanner detection
for dropped file
87->234
236
Detected unpacking (changes
PE section rights)
87->236
238
Machine Learning detection
for dropped file
87->238
240
8 other signatures
87->240
154
C:\Users\user\AppData\Roaming\is-4I2IV.tmp, PE32+
92->154
dropped
156
C:\Users\user\...\8dnsapi_5.drv (copy), PE32+
92->156
dropped
158
C:\Users\user\AppData\...\unins000.exe (copy), PE32
92->158
dropped
162
4 other files (3 malicious)
92->162
dropped
103
regsvr32.exe
92->103
started
160
C:\Users\...\483d2fa8a0d53818306efeb32d3.exe, PE32
95->160
dropped
105
conhost.exe
95->105
started
signatures21
process22
process23
107
regsvr32.exe
103->107
started
signatures24
268
Suspicious powershell
command line found
107->268
270
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
107->270
272
Uses Register-ScheduledTask
to add task schedules
107->272
110
powershell.exe
107->110
started
113
powershell.exe
107->113
started
process25
signatures26
296
Loading BitLocker PowerShell
Module
110->296
115
conhost.exe
110->115
started
118
conhost.exe
113->118
started
process27
signatures28
224
Suspicious powershell
command line found
115->224
226
Tries to download and
execute files (via powershell)
115->226
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.