Threat name:
PureCrypter, LummaC, Amadey, LummaC Stea, LummaC Stealer, XWorm
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Detected PureCrypter Trojan
Detected unpacking (changes PE section rights)
Drops PE files to the user root directory
Drops VBS files to the startup folder
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1549314
Sample:
file.exe
Startdate:
05/11/2024
Architecture:
WINDOWS
Score:
100
126
husktools.duckdns.org
2->126
128
bakedstusteeb.shop
2->128
130
61 other IPs or domains
2->130
154
Suricata IDS alerts
for network traffic
2->154
156
Found malware configuration
2->156
158
Malicious sample detected
(through community Yara
rule)
2->158
162
25 other signatures
2->162
11
skotes.exe
4
34
2->11
started
16
file.exe
5
2->16
started
18
wscript.exe
2->18
started
20
5 other processes
2->20
signatures3
160
Uses dynamic DNS services
126->160
process4
dnsIp5
140
185.215.113.43, 49891, 49905, 49926
WHOLESALECONNECTIONSNL
Portugal
11->140
142
husktools.duckdns.org
31.13.224.189, 49938, 49996, 7000
SARNICA-ASBG
Bulgaria
11->142
144
2 other IPs or domains
11->144
108
C:\Users\user\AppData\...\ca201f8633.exe, PE32
11->108
dropped
110
C:\Users\user\AppData\...\8dcd877e15.exe, PE32
11->110
dropped
112
C:\Users\user\AppData\...\8da6fd7419.exe, PE32
11->112
dropped
118
11 other malicious files
11->118
dropped
208
Creates multiple autostart
registry keys
11->208
210
Hides threads from debuggers
11->210
232
2 other signatures
11->232
22
xwo.exe
1
11->22
started
25
10dca837a3.exe
11->25
started
28
kiwi.exe
11->28
started
39
3 other processes
11->39
114
C:\Users\user\AppData\Local\...\skotes.exe, PE32
16->114
dropped
116
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
16->116
dropped
212
Detected unpacking (changes
PE section rights)
16->212
214
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
16->214
216
Tries to evade debugger
and weak emulator (self
modifying code)
16->216
218
Tries to detect virtualization
through RDTSC time measurements
16->218
31
skotes.exe
16->31
started
220
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
18->220
222
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
18->222
33
TypeId.exe
18->33
started
224
Query firmware table
information (likely
to detect VMs)
20->224
226
Tries to harvest and
steal ftp login credentials
20->226
228
Tries to harvest and
steal browser information
(history, passwords,
etc)
20->228
230
Tries to steal Crypto
Currency Wallets
20->230
35
conhost.exe
20->35
started
37
conhost.exe
20->37
started
41
2 other processes
20->41
file6
signatures7
process8
dnsIp9
164
Multi AV Scanner detection
for dropped file
22->164
166
Machine Learning detection
for dropped file
22->166
180
2 other signatures
22->180
43
MSBuild.exe
1
7
22->43
started
47
conhost.exe
22->47
started
49
WerFault.exe
22->49
started
132
founpiuer.store
104.21.5.155
CLOUDFLARENETUS
United States
25->132
168
Antivirus detection
for dropped file
25->168
170
Detected unpacking (changes
PE section rights)
25->170
172
Query firmware table
information (likely
to detect VMs)
25->172
182
4 other signatures
25->182
120
C:\Users\user\AppData\Roaming\TypeId.exe, PE32
28->120
dropped
122
C:\Users\user\AppData\Roaming\...\TypeId.vbs, ASCII
28->122
dropped
174
Drops VBS files to the
startup folder
28->174
184
2 other signatures
28->184
51
InstallUtil.exe
28->51
started
176
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
31->176
186
2 other signatures
31->186
178
Injects a PE file into
a foreign processes
33->178
53
InstallUtil.exe
33->53
started
134
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
39->134
136
smithpropertysolutions.com
74.208.236.140, 49919, 80
ONEANDONE-ASBrauerstrasse48DE
United States
39->136
138
127.0.0.1
unknown
unknown
39->138
124
C:\ProgramData\chrome.dll, PE32
39->124
dropped
188
2 other signatures
39->188
55
taskkill.exe
39->55
started
57
taskkill.exe
39->57
started
59
taskkill.exe
39->59
started
61
2 other processes
39->61
file10
signatures11
process12
file13
102
C:\Users\user\AppData\Local\Temp\xlxacz.exe, PE32
43->102
dropped
104
C:\Users\user\AppData\Local\Temp\rfpbcm.exe, PE32
43->104
dropped
106
C:\Users\user\XClient.exe, PE32
43->106
dropped
190
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
43->190
192
Creates multiple autostart
registry keys
43->192
194
Drops PE files to the
user root directory
43->194
196
Uses schtasks.exe or
at.exe to add and modify
task schedules
43->196
63
xlxacz.exe
43->63
started
66
rfpbcm.exe
43->66
started
69
schtasks.exe
43->69
started
198
Queries sensitive physical
memory information (via
WMI, Win32_PhysicalMemory,
often done to detect
virtual machines)
51->198
200
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
51->200
202
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
51->202
206
2 other signatures
51->206
204
Detected PureCrypter
Trojan
53->204
71
conhost.exe
55->71
started
73
conhost.exe
57->73
started
75
conhost.exe
59->75
started
77
conhost.exe
61->77
started
signatures14
process15
file16
234
Found many strings related
to Crypto-Wallets (likely
being stolen)
63->234
236
Injects a PE file into
a foreign processes
63->236
238
LummaC encrypted strings
found
63->238
79
xlxacz.exe
63->79
started
83
WerFault.exe
63->83
started
86
conhost.exe
63->86
started
96
C:\Users\user\AppData\...\gxdcjnbfhdqn.nuts, PE32+
66->96
dropped
88
cmd.exe
66->88
started
90
conhost.exe
69->90
started
signatures17
process18
dnsIp19
146
bakedstusteeb.shop
172.67.218.30
CLOUDFLARENETUS
United States
79->146
148
Query firmware table
information (likely
to detect VMs)
79->148
150
Found many strings related
to Crypto-Wallets (likely
being stolen)
79->150
152
Tries to steal Crypto
Currency Wallets
79->152
98
C:\ProgramData\Microsoft\...\Report.wer, Unicode
83->98
dropped
100
C:\Users\user\AppData\Local\...\foksdes.exe, PE32
88->100
dropped
92
conhost.exe
88->92
started
94
foksdes.exe
88->94
started
file20
signatures21
process22
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.