Threat name:
LummaC Stealer, PrivateLoader, PureLog S
Alert
Classification:
troj.spyw.evad.mine
.NET source code contains potential unpacker
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1356445
Sample:
t0iZaKuIFB.exe
Startdate:
08/12/2023
Architecture:
WINDOWS
Score:
100
120
ipinfo.io
2->120
154
Found malware configuration
2->154
156
Malicious sample detected
(through community Yara
rule)
2->156
158
Antivirus detection
for URL or domain
2->158
160
16 other signatures
2->160
13
t0iZaKuIFB.exe
1
4
2->13
started
17
svchost.exe
2->17
started
19
svchost.exe
1
2->19
started
21
12 other processes
2->21
signatures3
process4
file5
96
C:\Users\user\AppData\Local\...\gG7nW35.exe, PE32
13->96
dropped
98
C:\Users\user\AppData\Local\...\6nW2ca8.exe, PE32
13->98
dropped
220
Binary is likely a compiled
AutoIt script file
13->220
23
gG7nW35.exe
1
4
13->23
started
222
Changes security center
settings (notifications,
updates, antivirus,
firewall)
17->222
224
Query firmware table
information (likely
to detect VMs)
19->224
27
WerFault.exe
21->27
started
29
WerFault.exe
21->29
started
signatures6
process7
file8
92
C:\Users\user\AppData\Local\...\TI4ji42.exe, PE32
23->92
dropped
94
C:\Users\user\AppData\Local\...\5ok1AV0.exe, PE32
23->94
dropped
200
Antivirus detection
for dropped file
23->200
202
Machine Learning detection
for dropped file
23->202
31
TI4ji42.exe
1
4
23->31
started
signatures9
process10
file11
100
C:\Users\user\AppData\Local\...\xu3MF69.exe, PE32
31->100
dropped
102
C:\Users\user\AppData\Local\...\4oC416uQ.exe, PE32
31->102
dropped
138
Antivirus detection
for dropped file
31->138
140
Machine Learning detection
for dropped file
31->140
35
xu3MF69.exe
1
4
31->35
started
39
4oC416uQ.exe
31->39
started
signatures12
process13
file14
82
C:\Users\user\AppData\Local\...\3OR33jN.exe, PE32
35->82
dropped
84
C:\Users\user\AppData\Local\...\1eb74op8.exe, PE32
35->84
dropped
162
Antivirus detection
for dropped file
35->162
164
Machine Learning detection
for dropped file
35->164
41
3OR33jN.exe
35->41
started
44
1eb74op8.exe
35->44
started
86
C:\...\gJiG61vJLrLkyv6Ry1G7S5yxf9d0a3_h.zip, Zip
39->86
dropped
166
Tries to steal Mail
credentials (via file
/ registry access)
39->166
168
Found many strings related
to Crypto-Wallets (likely
being stolen)
39->168
170
Disables Windows Defender
(deletes autostart)
39->170
172
4 other signatures
39->172
signatures15
process16
signatures17
204
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
41->204
206
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
41->206
208
Maps a DLL or memory
area into another process
41->208
218
2 other signatures
41->218
46
explorer.exe
41->46
injected
210
Contains functionality
to inject code into
remote processes
44->210
212
Writes to foreign memory
regions
44->212
214
Allocates memory in
foreign processes
44->214
216
Injects a PE file into
a foreign processes
44->216
51
AppLaunch.exe
11
508
44->51
started
process18
dnsIp19
128
81.19.131.34, 49715, 80
IVC-ASRU
Russian Federation
46->128
130
185.196.8.238
SIMPLECARRER2IT
Switzerland
46->130
132
185.172.128.19, 49716, 80
NADYMSS-ASRU
Russian Federation
46->132
104
C:\Users\user\AppData\Local\Temp\F1C8.exe, PE32+
46->104
dropped
106
C:\Users\user\AppData\Local\TempB7.exe, PE32
46->106
dropped
108
C:\Users\user\AppData\Local\Temp\D7A7.exe, PE32
46->108
dropped
116
5 other malicious files
46->116
dropped
142
Benign windows process
drops PE files
46->142
144
Found many strings related
to Crypto-Wallets (likely
being stolen)
46->144
53
69F5.exe
46->53
started
57
7FD1.exe
46->57
started
59
76E7.exe
46->59
started
68
4 other processes
46->68
134
ipinfo.io
34.117.59.81, 443, 49706, 49708
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
51->134
136
193.233.132.51, 49705, 49707, 50500
FREE-NET-ASFREEnetEU
Russian Federation
51->136
110
C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII
51->110
dropped
112
C:\...\lFzLHI2RMWUr2_cW7WECjo6WM4hyBkyB.zip, Zip
51->112
dropped
114
C:\Users\user\AppData\...\FANBooster131.exe, PE32
51->114
dropped
118
2 other files (none is malicious)
51->118
dropped
146
Tries to steal Mail
credentials (via file
/ registry access)
51->146
148
Found stalling execution
ending in API Sleep
call
51->148
150
Disables Windows Defender
(deletes autostart)
51->150
152
7 other signatures
51->152
62
schtasks.exe
51->62
started
64
schtasks.exe
51->64
started
66
WerFault.exe
51->66
started
file20
signatures21
process22
dnsIp23
88
C:\Users\user\AppData\Roaming\...\File2.exe, PE32
53->88
dropped
90
C:\Users\user\AppData\Roaming\...\File1.exe, PE32
53->90
dropped
174
Multi AV Scanner detection
for dropped file
53->174
176
Machine Learning detection
for dropped file
53->176
70
File2.exe
53->70
started
74
File1.exe
53->74
started
76
conhost.exe
53->76
started
178
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
57->178
180
Modifies the context
of a thread in another
process (thread injection)
57->180
182
Injects a PE file into
a foreign processes
57->182
126
77.105.132.87
PLUSTELECOM-ASRU
Russian Federation
59->126
184
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
59->184
186
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
59->186
188
Tries to steal Crypto
Currency Wallets
59->188
78
conhost.exe
62->78
started
80
conhost.exe
64->80
started
file24
signatures25
process26
dnsIp27
122
176.123.7.190
ALEXHOSTMD
Moldova Republic of
70->122
190
Multi AV Scanner detection
for dropped file
70->190
192
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
70->192
194
Found many strings related
to Crypto-Wallets (likely
being stolen)
70->194
124
176.123.10.211
ALEXHOSTMD
Moldova Republic of
74->124
196
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
74->196
198
Tries to harvest and
steal browser information
(history, passwords,
etc)
74->198
signatures28
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.