Threat name:
LummaC, Djvu, Go Injector, LummaC Steale
Alert
Classification:
rans.troj.adwa.spyw.evad.mine
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies Windows Defender protection settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Queries Google from non browser process on port 80
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Stop EventLog
Sigma detected: Suspicious Scheduled Task Creation Involving Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Djvu Ransomware
Yara detected Go Injector
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1496361
Sample:
3QKcKCEzYP.exe
Startdate:
21/08/2024
Architecture:
WINDOWS
Score:
100
143
service-domain.xyz
2->143
145
api5.check-data.xyz
2->145
147
32 other IPs or domains
2->147
157
Multi AV Scanner detection
for domain / URL
2->157
159
Suricata IDS alerts
for network traffic
2->159
161
Found malware configuration
2->161
165
27 other signatures
2->165
13
3QKcKCEzYP.exe
1
27
2->13
started
18
erzljnhmzkuz.exe
2->18
started
signatures3
163
Performs DNS queries
to domains with low
reputation
145->163
process4
dnsIp5
149
147.45.44.104, 49719, 49720, 80
FREE-NET-ASFREEnetEU
Russian Federation
13->149
151
147.45.47.57, 49713, 80
FREE-NET-ASFREEnetEU
Russian Federation
13->151
153
8 other IPs or domains
13->153
133
C:\Users\...\zVS6xq86P4Kl0c26CfULXfv4.exe, PE32+
13->133
dropped
135
C:\Users\...\yZBxqqQICO50PLfWYKwJeSL5.exe, PE32+
13->135
dropped
137
C:\Users\...\r0bVQRH8Dto7infNi6DOB01w.exe, PE32
13->137
dropped
141
9 other malicious files
13->141
dropped
217
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
13->217
219
Drops PE files to the
document folder of the
user
13->219
221
Creates HTML files with
.exe extension (expired
dropper behavior)
13->221
229
3 other signatures
13->229
20
r0bVQRH8Dto7infNi6DOB01w.exe
7
13->20
started
24
zVS6xq86P4Kl0c26CfULXfv4.exe
2
13->24
started
26
fOzLadrzZNRnwv2woTdiFoXM.exe
1
13->26
started
34
3 other processes
13->34
139
C:\Windows\Temp\hbxzipnhyvsr.sys, PE32+
18->139
dropped
223
Multi AV Scanner detection
for dropped file
18->223
225
Found strings related
to Crypto-Mining
18->225
227
Modifies the context
of a thread in another
process (thread injection)
18->227
231
2 other signatures
18->231
28
powercfg.exe
18->28
started
30
powercfg.exe
18->30
started
32
powercfg.exe
18->32
started
file6
signatures7
process8
file9
125
C:\Users\user\AppData\Local\...\Install.exe, PE32
20->125
dropped
167
Machine Learning detection
for dropped file
20->167
36
Install.exe
4
20->36
started
127
C:\ProgramData\...\erzljnhmzkuz.exe, PE32+
24->127
dropped
169
Multi AV Scanner detection
for dropped file
24->169
171
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
24->171
173
Uses powercfg.exe to
modify the power settings
24->173
189
2 other signatures
24->189
40
powercfg.exe
24->40
started
42
powercfg.exe
24->42
started
44
sc.exe
24->44
started
55
5 other processes
24->55
175
Writes to foreign memory
regions
26->175
177
Allocates memory in
foreign processes
26->177
179
Injects a PE file into
a foreign processes
26->179
46
MSBuild.exe
13
26->46
started
49
conhost.exe
28->49
started
51
conhost.exe
30->51
started
53
conhost.exe
32->53
started
129
C:\Users\user\AppData\Roaming\afasdfga.exe, PE32
34->129
dropped
181
Contains functionality
to inject code into
remote processes
34->181
183
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
34->183
185
Sample uses process
hollowing technique
34->185
187
LummaC encrypted strings
found
34->187
signatures10
process11
dnsIp12
131
C:\Users\user\AppData\Local\...\Install.exe, PE32
36->131
dropped
191
Machine Learning detection
for dropped file
36->191
57
Install.exe
1
36->57
started
193
Suspicious powershell
command line found
40->193
60
conhost.exe
40->60
started
62
powershell.exe
42->62
started
64
conhost.exe
42->64
started
66
conhost.exe
44->66
started
68
Conhost.exe
44->68
started
155
193.176.190.41
AGROSVITUA
unknown
46->155
70
conhost.exe
55->70
started
72
conhost.exe
55->72
started
74
3 other processes
55->74
file13
signatures14
process15
signatures16
203
Antivirus detection
for dropped file
57->203
205
Suspicious powershell
command line found
57->205
207
Machine Learning detection
for dropped file
57->207
209
2 other signatures
57->209
76
cmd.exe
57->76
started
79
forfiles.exe
57->79
started
81
schtasks.exe
57->81
started
83
gpupdate.exe
62->83
started
85
conhost.exe
62->85
started
process17
signatures18
211
Suspicious powershell
command line found
76->211
213
Uses cmd line tools
excessively to alter
registry or file data
76->213
215
Modifies Windows Defender
protection settings
76->215
87
forfiles.exe
76->87
started
90
forfiles.exe
76->90
started
92
forfiles.exe
76->92
started
100
3 other processes
76->100
94
cmd.exe
79->94
started
96
conhost.exe
79->96
started
98
conhost.exe
83->98
started
process19
signatures20
199
Modifies Windows Defender
protection settings
87->199
102
cmd.exe
87->102
started
105
cmd.exe
90->105
started
107
cmd.exe
92->107
started
201
Suspicious powershell
command line found
94->201
109
powershell.exe
94->109
started
111
cmd.exe
100->111
started
113
cmd.exe
100->113
started
process21
signatures22
195
Uses cmd line tools
excessively to alter
registry or file data
102->195
115
reg.exe
102->115
started
117
reg.exe
105->117
started
119
reg.exe
107->119
started
121
WMIC.exe
109->121
started
123
reg.exe
111->123
started
197
Suspicious powershell
command line found
113->197
process23
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.