Threat name:
Aurora, Amadey, Eternity Stealer, LockBi
Alert
Classification:
rans.phis.troj.spyw.expl.evad
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Posts data to a JPG file (protocol mismatch)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Capture Wi-Fi password
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Eternity Stealer
Yara detected Generic Downloader
Yara detected LockBit ransomware
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
787067
Sample:
2c25b70f08a34cc52989882c471...
Startdate:
19/01/2023
Architecture:
WINDOWS
Score:
100
142
Snort IDS alert for
network traffic
2->142
144
Malicious sample detected
(through community Yara
rule)
2->144
146
Antivirus detection
for URL or domain
2->146
148
22 other signatures
2->148
10
2c25b70f08a34cc52989882c4715854c4f488dacfa2c4.exe
4
2->10
started
14
nbveek.exe
2->14
started
16
vertu.exe
2->16
started
process3
file4
92
C:\Users\user\AppData\Local\...\nbveek.exe, PE32
10->92
dropped
94
C:\Users\user\...\nbveek.exe:Zone.Identifier, ASCII
10->94
dropped
192
Contains functionality
to inject code into
remote processes
10->192
18
nbveek.exe
2
75
10->18
started
signatures5
process6
dnsIp7
118
62.204.41.121, 49696, 49697, 49698
TNNET-ASTNNetOyMainnetworkFI
United Kingdom
18->118
120
62.204.41.32, 49707, 80
TNNET-ASTNNetOyMainnetworkFI
United Kingdom
18->120
122
6 other IPs or domains
18->122
84
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
18->84
dropped
86
C:\Users\user\AppData\...\buildppb.exe, PE32
18->86
dropped
88
C:\Users\user\AppData\Local\Temp\...\tube.exe, PE32
18->88
dropped
90
33 other malicious files
18->90
dropped
166
Multi AV Scanner detection
for dropped file
18->166
168
Creates an undocumented
autostart registry key
18->168
170
Found stalling execution
ending in API Sleep
call
18->170
172
2 other signatures
18->172
23
qiv1ow16wzuw.exe
18->23
started
26
Player3.exe
18->26
started
29
Amadey.exe
18->29
started
31
8 other processes
18->31
file8
signatures9
process10
dnsIp11
174
Multi AV Scanner detection
for dropped file
23->174
176
Writes to foreign memory
regions
23->176
178
Allocates memory in
foreign processes
23->178
180
Injects a PE file into
a foreign processes
23->180
34
vbc.exe
23->34
started
38
conhost.exe
23->38
started
40
WerFault.exe
23->40
started
96
C:\Users\user\AppData\Local\...\nbveek.exe, PE32
26->96
dropped
42
nbveek.exe
26->42
started
98
C:\Users\user\AppData\Local\...\nbveek.exe, PE32
29->98
dropped
45
nbveek.exe
29->45
started
138
151.80.89.233
OVHFR
Italy
31->138
140
62.204.41.159
TNNET-ASTNNetOyMainnetworkFI
United Kingdom
31->140
100
C:\Users\user\AppData\Local\...\nbveek.exe, PE32
31->100
dropped
182
Antivirus detection
for dropped file
31->182
184
Detected unpacking (changes
PE section rights)
31->184
186
Detected unpacking (overwrites
its own PE header)
31->186
188
7 other signatures
31->188
47
rundll32.exe
21
31->47
started
49
conhost.exe
31->49
started
51
conhost.exe
31->51
started
53
11 other processes
31->53
file12
signatures13
process14
dnsIp15
124
66.181.33.16
UNREAL-SERVERSUS
United States
34->124
126
ip-api.com
208.95.112.1, 49703, 80
TUT-ASUS
United States
34->126
134
3 other IPs or domains
34->134
150
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
34->150
152
May check the online
IP address of the machine
34->152
154
Tries to steal Mail
credentials (via file
/ registry access)
34->154
164
4 other signatures
34->164
55
cmd.exe
34->55
started
58
cmd.exe
34->58
started
136
5 other IPs or domains
42->136
102
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
42->102
dropped
104
C:\Users\user\AppData\Local\...\handdiy_1.exe, PE32
42->104
dropped
106
C:\Users\user\AppData\Local\...\random.exe, PE32
42->106
dropped
116
5 other malicious files
42->116
dropped
156
Multi AV Scanner detection
for dropped file
42->156
60
cmd.exe
42->60
started
62
schtasks.exe
42->62
started
128
193.42.33.28
EENET-ASEE
Germany
45->128
130
escrow.lol
172.67.220.72
CLOUDFLARENETUS
United States
45->130
108
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
45->108
dropped
110
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
45->110
dropped
112
C:\Users\user\AppData\Local\...\clip64[1].dll, PE32
45->112
dropped
114
C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+
45->114
dropped
132
192.168.2.1
unknown
unknown
47->132
158
System process connects
to network (likely due
to code injection or
exploit)
47->158
160
Tries to steal Instant
Messenger accounts or
passwords
47->160
162
Tries to harvest and
steal ftp login credentials
47->162
64
tar.exe
47->64
started
file16
signatures17
process18
signatures19
190
Tries to harvest and
steal WLAN passwords
55->190
66
conhost.exe
55->66
started
68
chcp.com
55->68
started
70
netsh.exe
55->70
started
72
findstr.exe
55->72
started
74
conhost.exe
58->74
started
80
3 other processes
58->80
82
3 other processes
60->82
76
conhost.exe
62->76
started
78
conhost.exe
64->78
started
process20
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.