Threat name:
CryptOne, Djvu, LummaC Stealer, Mars Ste
Alert
Classification:
rans.troj.spyw.evad
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected CryptOne packer
Yara detected Djvu Ransomware
Yara detected LummaC Stealer
Yara detected Mars stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1447048
Sample:
BI6oo9z4In.exe
Startdate:
24/05/2024
Architecture:
WINDOWS
Score:
100
105
service-domain.xyz
2->105
107
f.123654987.xyz
2->107
109
37 other IPs or domains
2->109
137
Snort IDS alert for
network traffic
2->137
139
Multi AV Scanner detection
for domain / URL
2->139
141
Found malware configuration
2->141
145
27 other signatures
2->145
9
BI6oo9z4In.exe
11
54
2->9
started
14
MPGPH131.exe
2->14
started
16
svchost.exe
2->16
started
18
4 other processes
2->18
signatures3
143
Performs DNS queries
to domains with low
reputation
107->143
process4
dnsIp5
121
5.42.66.10, 49734, 49735, 80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
9->121
123
f.123654987.xyz
37.221.125.202
PTSERVIDORPT
Lithuania
9->123
129
18 other IPs or domains
9->129
95
C:\Users\...\uyMYdkI0kpEOwxO0H1smOiYQ.exe, PE32+
9->95
dropped
97
C:\Users\...\unbmFXV_GPtCMFoyWe7JMXak.exe, PE32
9->97
dropped
99
C:\Users\...\nDCHNmvRZpJ9pfO5sjkcNCmB.exe, PE32
9->99
dropped
103
24 other malicious files
9->103
dropped
185
Query firmware table
information (likely
to detect VMs)
9->185
187
Drops PE files to the
document folder of the
user
9->187
189
Creates HTML files with
.exe extension (expired
dropper behavior)
9->189
199
10 other signatures
9->199
20
jNWxa0Pc_jGneI3LjcIqUJSt.exe
9->20
started
23
DbsmJHnmNOlKFVGvWfuU03Cy.exe
9->23
started
26
HXqqC3YwnKDsi7zeJNheTOoZ.exe
9->26
started
30
13 other processes
9->30
125
104.26.5.15
CLOUDFLARENETUS
United States
14->125
101
C:\Users\user\...\jYL1hclCVelFzk05W8_PnMT.zip, Zip
14->101
dropped
191
Detected unpacking (changes
PE section rights)
14->191
193
Tries to steal Mail
credentials (via file
/ registry access)
14->193
195
Machine Learning detection
for dropped file
14->195
197
Tries to harvest and
steal browser information
(history, passwords,
etc)
14->197
28
WerFault.exe
16->28
started
127
127.0.0.1
unknown
unknown
18->127
file6
signatures7
process8
dnsIp9
83
C:\Users\...\jNWxa0Pc_jGneI3LjcIqUJSt.tmp, PE32
20->83
dropped
33
jNWxa0Pc_jGneI3LjcIqUJSt.tmp
20->33
started
85
C:\Users\user\AppData\Local\...\katC73D.tmp, PE32
23->85
dropped
165
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
23->165
167
Writes to foreign memory
regions
23->167
169
Allocates memory in
foreign processes
23->169
171
Sample uses process
hollowing technique
23->171
36
katC73D.tmp
23->36
started
173
Contains functionality
to inject code into
remote processes
26->173
175
Injects a PE file into
a foreign processes
26->175
39
RegAsm.exe
26->39
started
131
5.42.65.116
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
30->131
133
5.42.67.8
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
30->133
135
3 other IPs or domains
30->135
87
C:\Users\user\...\kvTtAU2MzY2s2DUs95B8.exe, PE32
30->87
dropped
89
C:\Users\user\...\ZUeumQ5vReRlBxyeuYnI.exe, PE32
30->89
dropped
91
C:\Users\user\AppData\...\Protect544cd51a.dll, PE32
30->91
dropped
93
27 other files (23 malicious)
30->93
dropped
177
Detected unpacking (changes
PE section rights)
30->177
179
Detected unpacking (overwrites
its own PE header)
30->179
181
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
30->181
183
18 other signatures
30->183
42
RegAsm.exe
30->42
started
44
unbmFXV_GPtCMFoyWe7JMXak.exe
30->44
started
46
Install.exe
30->46
started
48
5 other processes
30->48
file10
signatures11
process12
dnsIp13
63
C:\Users\user\...\zvaervideorecorder.exe, PE32
33->63
dropped
65
C:\Users\user\AppData\...\unins000.exe (copy), PE32
33->65
dropped
67
C:\Users\user\AppData\...\openh264.dll (copy), PE32+
33->67
dropped
75
35 other files (24 malicious)
33->75
dropped
50
zvaervideorecorder.exe
33->50
started
69
C:\Users\user\AppData\...\softokn3[1].dll, PE32
36->69
dropped
77
11 other files (7 malicious)
36->77
dropped
147
Tries to harvest and
steal ftp login credentials
36->147
149
Tries to harvest and
steal browser information
(history, passwords,
etc)
36->149
151
Tries to steal Crypto
Currency Wallets
36->151
111
78.47.123.174
HETZNER-ASDE
Germany
39->111
113
steamcommunity.com
104.102.42.29
AKAMAI-ASUS
United States
39->113
79
13 other files (9 malicious)
39->79
dropped
153
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
39->153
155
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
39->155
157
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
39->157
163
2 other signatures
39->163
115
5.42.65.115
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
42->115
159
Installs new ROOT certificates
42->159
117
api.2ip.ua
188.114.96.3
CLOUDFLARENETUS
European Union
44->117
71
C:\Users\...\unbmFXV_GPtCMFoyWe7JMXak.exe, PE32
44->71
dropped
161
Creates multiple autostart
registry keys
44->161
53
icacls.exe
44->53
started
73
C:\Users\user\AppData\Local\...\Install.exe, PE32
46->73
dropped
55
Install.exe
46->55
started
119
239.255.255.250
unknown
Reserved
48->119
57
conhost.exe
48->57
started
59
conhost.exe
48->59
started
61
conhost.exe
48->61
started
file14
signatures15
process16
file17
81
C:\ProgramData\...\ICodecLibrary 1.22.66.exe, PE32
50->81
dropped
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://185.172.128.82/server/12/AppGate2103v01.exe