Threat name:
LummaC, Python Stealer, Amadey, Monster
Alert
Classification:
troj.spyw.evad
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Disable Task Manager(disabletaskmgr)
Disables the Windows task manager (taskmgr)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Powershell downloading file from url shortener site
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal communication platform credentials (via file / registry access)
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Python Stealer
Yara detected Monster Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1461206
Sample:
file.exe
Startdate:
23/06/2024
Architecture:
WINDOWS
Score:
100
202
Found malware configuration
2->202
204
Malicious sample detected
(through community Yara
rule)
2->204
206
Antivirus detection
for dropped file
2->206
208
22 other signatures
2->208
11
file.exe
5
2->11
started
15
Hkbsse.exe
2->15
started
17
axplong.exe
2->17
started
19
5 other processes
2->19
process3
dnsIp4
152
C:\Users\user\AppData\Local\...\axplong.exe, PE32
11->152
dropped
154
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
11->154
dropped
282
Detected unpacking (changes
PE section rights)
11->282
284
Tries to evade debugger
and weak emulator (self
modifying code)
11->284
286
Tries to detect virtualization
through RDTSC time measurements
11->286
288
Potentially malicious
time measurement code
found
11->288
22
axplong.exe
43
11->22
started
156
C:\Users\user\AppData\Local\Temp\...\1.exe, PE32
15->156
dropped
158
C:\Users\user\AppData\Local\...\1[1].exe, PE32
15->158
dropped
27
1.exe
15->27
started
290
Hides threads from debuggers
17->290
292
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
17->292
294
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
17->294
172
184.28.90.27
AKAMAI-ASUS
United States
19->172
174
127.0.0.1
unknown
unknown
19->174
176
2 other IPs or domains
19->176
29
chrome.exe
19->29
started
31
WerFault.exe
19->31
started
33
chrome.exe
19->33
started
file5
signatures6
process7
dnsIp8
178
185.172.128.116
NADYMSS-ASRU
Russian Federation
22->178
180
140.82.121.4
GITHUBUS
United States
22->180
186
2 other IPs or domains
22->186
134
C:\Users\user\AppData\Local\...\googleads.exe, PE32
22->134
dropped
136
C:\Users\user\AppData\Local\...\judit.exe, PE32+
22->136
dropped
138
C:\Users\user\AppData\...\taskweaker.exe, PE32+
22->138
dropped
140
17 other malicious files
22->140
dropped
266
Multi AV Scanner detection
for dropped file
22->266
268
Detected unpacking (changes
PE section rights)
22->268
270
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
22->270
278
5 other signatures
22->278
35
judit.exe
22->35
started
39
deep.exe
8
22->39
started
41
gold.exe
22->41
started
46
7 other processes
22->46
272
Machine Learning detection
for dropped file
27->272
274
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
27->274
276
Maps a DLL or memory
area into another process
27->276
280
3 other signatures
27->280
43
explorer.exe
27->43
injected
182
142.250.186.130
GOOGLEUS
United States
29->182
184
142.250.186.68
GOOGLEUS
United States
29->184
188
7 other IPs or domains
29->188
file9
signatures10
process11
dnsIp12
120
C:\Users\user\AppData\...\_quoting_c.pyd, PE32+
35->120
dropped
122
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
35->122
dropped
124
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
35->124
dropped
132
32 other files (31 malicious)
35->132
dropped
236
Multi AV Scanner detection
for dropped file
35->236
238
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
35->238
48
stub.exe
35->48
started
126
C:\Users\user\AppData\...\da_protected.exe, PE32
39->126
dropped
240
Machine Learning detection
for dropped file
39->240
53
da_protected.exe
39->53
started
242
Contains functionality
to inject code into
remote processes
41->242
244
Writes to foreign memory
regions
41->244
258
2 other signatures
41->258
55
RegAsm.exe
41->55
started
196
186.4.194.68
TelconetSAEC
Ecuador
43->196
198
212.112.110.243
AKNET-ASKG
Kyrgyzstan
43->198
128
C:\Users\user\AppData\Roaming\fjebrgc, PE32
43->128
dropped
246
System process connects
to network (likely due
to code injection or
exploit)
43->246
248
Benign windows process
drops PE files
43->248
250
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
43->250
200
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
46->200
130
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
46->130
dropped
252
Antivirus detection
for dropped file
46->252
254
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
46->254
256
Found many strings related
to Crypto-Wallets (likely
being stolen)
46->256
260
4 other signatures
46->260
57
cmd.exe
46->57
started
59
BitLockerToGo.exe
46->59
started
61
RegAsm.exe
46->61
started
63
4 other processes
46->63
file13
signatures14
process15
dnsIp16
160
208.95.112.1
TUT-ASUS
United States
48->160
162
65.0.21.192
AMAZON-02US
United States
48->162
112
C:\Users\user\AppData\Local\...\Monster.exe, PE32+
48->112
dropped
114
C:\Users\user\AppData\...\system_info.txt, Algol
48->114
dropped
232
2 other signatures
48->232
65
cmd.exe
48->65
started
67
cmd.exe
48->67
started
69
cmd.exe
48->69
started
81
7 other processes
48->81
164
195.2.71.70
VDSINA-ASRU
Russian Federation
53->164
116
C:\Users\user\AppData\Local\Temp\izhfef.exe, PE32+
53->116
dropped
210
Multi AV Scanner detection
for dropped file
53->210
212
Detected unpacking (changes
PE section rights)
53->212
214
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
53->214
234
4 other signatures
53->234
71
izhfef.exe
53->71
started
166
4.185.27.237
LEVEL3US
United States
55->166
216
Found many strings related
to Crypto-Wallets (likely
being stolen)
55->216
218
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
55->218
220
Tries to harvest and
steal browser information
(history, passwords,
etc)
55->220
118
C:\Users\user\AppData\Local\...\install.bat, ASCII
57->118
dropped
222
Suspicious powershell
command line found
57->222
224
Uses schtasks.exe or
at.exe to add and modify
task schedules
57->224
226
Uses attrib.exe to hide
files
57->226
75
powershell.exe
57->75
started
77
powershell.exe
57->77
started
83
4 other processes
57->83
168
188.114.96.3
CLOUDFLARENETUS
European Union
59->168
228
Query firmware table
information (likely
to detect VMs)
59->228
230
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
61->230
79
conhost.exe
61->79
started
170
20.42.73.29
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
63->170
file17
signatures18
process19
dnsIp20
85
conhost.exe
65->85
started
87
WMIC.exe
65->87
started
89
conhost.exe
67->89
started
91
tasklist.exe
67->91
started
99
2 other processes
69->99
190
172.67.198.131
CLOUDFLARENETUS
United States
71->190
142
C:\Users\user\AppData\Local\Temp\setup.exe, PE32+
71->142
dropped
144
C:\Users\user\AppData\Local\...\setup[1].exe, PE32+
71->144
dropped
146
C:\Users\user\AppData\Local\...\setup[4].exe, PE32+
71->146
dropped
150
3 other malicious files
71->150
dropped
93
cmd.exe
75->93
started
95
Conhost.exe
75->95
started
148
C:\Users\user\AppData\Local\Corporation.zip, Zip
77->148
dropped
97
conhost.exe
81->97
started
101
6 other processes
81->101
192
67.199.248.11
GOOGLE-PRIVATE-CLOUDUS
United States
83->192
194
54.67.42.145
AMAZON-02US
United States
83->194
file21
process22
process23
103
reg.exe
93->103
started
106
conhost.exe
93->106
started
108
schtasks.exe
93->108
started
110
2 other processes
93->110
signatures24
262
Disable Task Manager(disabletaskmgr)
103->262
264
Disables the Windows
task manager (taskmgr)
103->264
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.