Threat name:
LummaC Stealer, PrivateLoader, RedLine,
Alert
Classification:
troj.spyw.evad
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check for running processes (XOR)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1349935
Sample:
E7WCcasinf.exe
Startdate:
29/11/2023
Architecture:
WINDOWS
Score:
100
155
pic.himanfast.com
2->155
157
ipinfo.io
2->157
197
Snort IDS alert for
network traffic
2->197
199
Found malware configuration
2->199
201
Malicious sample detected
(through community Yara
rule)
2->201
203
18 other signatures
2->203
13
E7WCcasinf.exe
1
4
2->13
started
16
XsdType.exe
2->16
started
19
OfficeTrackerNMP131.exe
2->19
started
21
6 other processes
2->21
signatures3
process4
dnsIp5
143
C:\Users\user\AppData\Local\...\Ct3zm66.exe, PE32
13->143
dropped
145
C:\Users\user\AppData\Local\...\5Hv1pF6.exe, PE32
13->145
dropped
24
Ct3zm66.exe
1
4
13->24
started
183
Antivirus detection
for dropped file
16->183
185
Multi AV Scanner detection
for dropped file
16->185
187
Machine Learning detection
for dropped file
16->187
189
3 other signatures
16->189
28
chrome.exe
19->28
started
159
127.0.0.1
unknown
unknown
21->159
30
WerFault.exe
21->30
started
file6
signatures7
process8
file9
135
C:\Users\user\AppData\Local\...\hf2WE47.exe, PE32
24->135
dropped
137
C:\Users\user\AppData\Local\...\4qv773ML.exe, PE32
24->137
dropped
227
Antivirus detection
for dropped file
24->227
229
Binary is likely a compiled
AutoIt script file
24->229
231
Machine Learning detection
for dropped file
24->231
32
hf2WE47.exe
1
4
24->32
started
36
4qv773ML.exe
24->36
started
signatures10
process11
file12
115
C:\Users\user\AppData\Local\...\wM6yJ36.exe, PE32
32->115
dropped
117
C:\Users\user\AppData\Local\...\3CW36NV.exe, PE32
32->117
dropped
191
Antivirus detection
for dropped file
32->191
193
Machine Learning detection
for dropped file
32->193
38
3CW36NV.exe
32->38
started
41
wM6yJ36.exe
1
4
32->41
started
195
Binary is likely a compiled
AutoIt script file
36->195
44
chrome.exe
36->44
started
47
chrome.exe
36->47
started
49
chrome.exe
36->49
started
51
7 other processes
36->51
signatures13
process14
dnsIp15
205
Antivirus detection
for dropped file
38->205
207
Multi AV Scanner detection
for dropped file
38->207
209
Machine Learning detection
for dropped file
38->209
211
5 other signatures
38->211
53
explorer.exe
38->53
injected
139
C:\Users\user\AppData\Local\...\2tJ8730.exe, PE32
41->139
dropped
141
C:\Users\user\AppData\Local\...\1Lz43pU7.exe, PE32
41->141
dropped
58
1Lz43pU7.exe
1
41->58
started
60
2tJ8730.exe
1
41->60
started
175
239.255.255.250
unknown
Reserved
44->175
62
chrome.exe
44->62
started
64
chrome.exe
47->64
started
66
chrome.exe
49->66
started
68
chrome.exe
51->68
started
70
chrome.exe
51->70
started
72
4 other processes
51->72
file16
signatures17
process18
dnsIp19
161
185.196.8.238
SIMPLECARRER2IT
Switzerland
53->161
163
5.42.65.80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
53->163
169
2 other IPs or domains
53->169
127
C:\Users\user\AppData\Local\Temp\FAC9.exe, PE32
53->127
dropped
129
C:\Users\user\AppData\Local\TempAE9.exe, PE32
53->129
dropped
131
C:\Users\user\AppData\Local\Temp\D5A.exe, PE32
53->131
dropped
133
4 other malicious files
53->133
dropped
213
System process connects
to network (likely due
to code injection or
exploit)
53->213
215
Benign windows process
drops PE files
53->215
74
BC37.exe
53->74
started
77
B178.exe
53->77
started
93
5 other processes
53->93
217
Machine Learning detection
for dropped file
58->217
219
Contains functionality
to inject code into
remote processes
58->219
221
Writes to foreign memory
regions
58->221
80
AppLaunch.exe
11
508
58->80
started
83
AppLaunch.exe
58->83
started
85
conhost.exe
58->85
started
87
AppLaunch.exe
58->87
started
223
Allocates memory in
foreign processes
60->223
225
Injects a PE file into
a foreign processes
60->225
89
AppLaunch.exe
5
60->89
started
91
conhost.exe
60->91
started
165
static.ads-twitter.com
62->165
167
t.co
104.244.42.133, 443, 49758
TWITTERUS
United States
62->167
171
38 other IPs or domains
62->171
file20
signatures21
process22
dnsIp23
235
Antivirus detection
for dropped file
74->235
237
Multi AV Scanner detection
for dropped file
74->237
239
Machine Learning detection
for dropped file
74->239
255
3 other signatures
74->255
95
BC37.exe
74->95
started
177
194.169.175.235
CLOUDCOMPUTINGDE
Germany
77->177
241
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
77->241
243
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
77->243
179
194.49.94.152, 19053, 49710, 49711
EQUEST-ASNL
unknown
80->179
181
ipinfo.io
34.117.59.81, 443, 49712
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
80->181
119
C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII
80->119
dropped
121
C:\Users\user\AppData\...\FANBooster131.exe, PE32
80->121
dropped
123
C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32
80->123
dropped
125
C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32
80->125
dropped
245
Tries to steal Mail
credentials (via file
/ registry access)
80->245
247
Disables Windows Defender
(deletes autostart)
80->247
257
5 other signatures
80->257
98
schtasks.exe
1
80->98
started
100
schtasks.exe
80->100
started
102
WerFault.exe
80->102
started
249
Contains functionality
to check for running
processes (XOR)
83->249
251
Found stalling execution
ending in API Sleep
call
83->251
259
2 other signatures
83->259
253
Found many strings related
to Crypto-Wallets (likely
being stolen)
89->253
104
chrome.exe
89->104
started
file24
signatures25
process26
dnsIp27
147
C:\Users\user\AppData\Local\...\XsdType.exe, PE32+
95->147
dropped
108
conhost.exe
98->108
started
110
conhost.exe
100->110
started
173
192.168.2.6, 19053, 443, 49706
unknown
unknown
104->173
233
Found many strings related
to Crypto-Wallets (likely
being stolen)
104->233
112
chrome.exe
104->112
started
file28
signatures29
process30
dnsIp31
149
plus.l.google.com
142.250.31.100
GOOGLEUS
United States
112->149
151
142.251.16.84
GOOGLEUS
United States
112->151
153
7 other IPs or domains
112->153
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.