Threat name:
LummaC, Djvu, LummaC Stealer, RedLine, S
Alert
Classification:
rans.troj.adwa.spyw.evad
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Powershell is started from unusual location (likely to bypass HIPS)
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Yara detected Djvu Ransomware
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1376446
Sample:
toolspub2.exe
Startdate:
18/01/2024
Architecture:
WINDOWS
Score:
100
77
trad-einmyus.com
2->77
79
regardvelvettynerverf.site
2->79
81
12 other IPs or domains
2->81
111
Snort IDS alert for
network traffic
2->111
113
Multi AV Scanner detection
for domain / URL
2->113
115
Found malware configuration
2->115
117
14 other signatures
2->117
10
toolspub2.exe
2->10
started
13
taicfsf
2->13
started
15
2858.exe
2->15
started
signatures3
process4
signatures5
153
Detected unpacking (changes
PE section rights)
10->153
155
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
10->155
157
Maps a DLL or memory
area into another process
10->157
165
2 other signatures
10->165
17
explorer.exe
14
16
10->17
injected
159
Antivirus detection
for dropped file
13->159
161
Multi AV Scanner detection
for dropped file
13->161
163
Machine Learning detection
for dropped file
13->163
process6
dnsIp7
71
45.15.156.13, 443, 49737
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
17->71
73
146.0.41.68, 49731, 80
MYLOC-ASIPBackboneofmyLocmanagedITAGDE
Germany
17->73
75
7 other IPs or domains
17->75
57
C:\Users\user\AppData\Roaming\taicfsf, PE32
17->57
dropped
59
C:\Users\user\AppData\Local\Temp\D595.exe, PE32+
17->59
dropped
61
C:\Users\user\AppData\Local\Temp\BB55.exe, MS-DOS
17->61
dropped
63
5 other malicious files
17->63
dropped
119
System process connects
to network (likely due
to code injection or
exploit)
17->119
121
Benign windows process
drops PE files
17->121
123
Deletes itself after
installation
17->123
125
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
17->125
22
BB55.exe
17->22
started
26
477A.exe
17->26
started
28
86F5.exe
7
17->28
started
31
6 other processes
17->31
file8
signatures9
process10
dnsIp11
83
23.162.152.49, 49747, 49754, 49755
VALLEY-COMMUNICATIONSUS
Reserved
22->83
85
www.google.com
142.250.176.196, 49746, 80
GOOGLEUS
United States
22->85
87
google.com
142.251.40.142, 49745, 80
GOOGLEUS
United States
22->87
127
Antivirus detection
for dropped file
22->127
129
Multi AV Scanner detection
for dropped file
22->129
131
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
22->131
145
7 other signatures
22->145
33
cmd.exe
22->33
started
89
fleetconsciousnessjuiw.site
172.67.143.121, 443, 49729, 49730
CLOUDFLARENETUS
United States
26->89
133
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
26->133
135
Query firmware table
information (likely
to detect VMs)
26->135
147
3 other signatures
26->147
91
52.147.121.107, 19530, 49750
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
28->91
67
C:\Users\user\AppData\Roaming\...\qemu-ga.exe, PE32
28->67
dropped
137
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
28->137
149
3 other signatures
28->149
36
qemu-ga.exe
28->36
started
38
conhost.exe
28->38
started
93
www.cbr.ru
185.178.208.7, 443, 49753
DDOS-GUARDRU
Russian Federation
31->93
69
C:\ProgramData\...\SecurityHealthService.Scan, PE32+
31->69
dropped
139
Detected unpacking (changes
PE section rights)
31->139
141
Detected unpacking (overwrites
its own PE header)
31->141
143
Obfuscated command line
found
31->143
151
2 other signatures
31->151
40
SecurityHealthService.Scan
31->40
started
43
2858.exe
31->43
started
file12
signatures13
process14
dnsIp15
103
Uses ping.exe to check
the status of other
devices and networks
33->103
46
PING.EXE
33->46
started
49
conhost.exe
33->49
started
105
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
36->105
95
drive.usercontent.google.com
142.250.176.193, 443, 49752
GOOGLEUS
United States
40->95
97
drive.google.com
142.250.81.238, 443, 49751
GOOGLEUS
United States
40->97
107
Powershell is started
from unusual location
(likely to bypass HIPS)
40->107
109
Found suspicious powershell
code related to unpacking
or dynamic code loading
40->109
51
conhost.exe
40->51
started
99
api.2ip.ua
104.21.65.24, 443, 49749
CLOUDFLARENETUS
United States
43->99
65
C:\Users\user\AppData\Local\...\2858.exe, PE32
43->65
dropped
53
icacls.exe
43->53
started
55
2858.exe
43->55
started
file16
signatures17
process18
dnsIp19
101
127.0.0.1
unknown
unknown
46->101
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.