Threat name:
LummaC, Amadey, LummaC Stealer, PureLog
Alert
Classification:
phis.troj.spyw.evad.mine
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Capture Wi-Fi password
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Instant Messenger accounts or passwords
Uses netsh to modify the Windows network and firewall settings
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1387494
Sample:
SecuriteInfo.com.Win32.PWSX...
Startdate:
06/02/2024
Architecture:
WINDOWS
Score:
100
103
triangleseasonbenchwj.shop
2->103
105
secretionsuitcasenioise.shop
2->105
107
5 other IPs or domains
2->107
125
Snort IDS alert for
network traffic
2->125
127
Multi AV Scanner detection
for domain / URL
2->127
129
Found malware configuration
2->129
131
23 other signatures
2->131
10
explorgu.exe
35
2->10
started
15
explorgu.exe
2->15
started
17
SecuriteInfo.com.Win32.PWSX-gen.11847.1098.exe
5
2->17
started
19
4 other processes
2->19
signatures3
process4
dnsIp5
117
185.215.113.32, 49705, 49706, 49708
WHOLESALECONNECTIONSNL
Portugal
10->117
119
193.233.132.167, 49707, 49746, 49754
FREE-NET-ASFREEnetEU
Russian Federation
10->119
121
109.107.182.3, 49712, 49721, 80
TELEPORT-TV-ASRU
Russian Federation
10->121
87
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
10->87
dropped
89
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
10->89
dropped
91
C:\Users\user\AppData\Local\...\art22.exe, PE32+
10->91
dropped
99
11 other malicious files
10->99
dropped
155
Hides threads from debuggers
10->155
157
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->157
159
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
10->159
21
lumma123142124.exe
10->21
started
24
rundll32.exe
10->24
started
26
mrk1234.exe
10->26
started
37
3 other processes
10->37
161
Antivirus detection
for dropped file
15->161
163
Multi AV Scanner detection
for dropped file
15->163
165
Detected unpacking (changes
PE section rights)
15->165
179
3 other signatures
15->179
93
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
17->93
dropped
167
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
17->167
169
Tries to evade debugger
and weak emulator (self
modifying code)
17->169
171
Tries to detect virtualization
through RDTSC time measurements
17->171
95
C:\Windows\Temp\rljxappkaarw.sys, PE32+
19->95
dropped
97
C:\Windows\Temp\ejecottirzko.sys, PE32+
19->97
dropped
173
Injects code into the
Windows Explorer (explorer.exe)
19->173
175
Modifies the context
of a thread in another
process (thread injection)
19->175
177
Sample is not signed
and drops a device driver
19->177
28
explorer.exe
19->28
started
31
WerFault.exe
19->31
started
33
WerFault.exe
19->33
started
35
WerFault.exe
19->35
started
file6
signatures7
process8
dnsIp9
133
Multi AV Scanner detection
for dropped file
21->133
135
Machine Learning detection
for dropped file
21->135
137
Contains functionality
to inject code into
remote processes
21->137
139
LummaC encrypted strings
found
21->139
40
RegAsm.exe
21->40
started
43
conhost.exe
21->43
started
45
rundll32.exe
23
24->45
started
141
Writes to foreign memory
regions
26->141
143
Allocates memory in
foreign processes
26->143
145
Injects a PE file into
a foreign processes
26->145
48
RegAsm.exe
26->48
started
50
RegAsm.exe
26->50
started
123
pool.hashvault.pro
142.202.242.43, 49742, 49767, 80
1GSERVERSUS
Reserved
28->123
147
System process connects
to network (likely due
to code injection or
exploit)
28->147
149
Query firmware table
information (likely
to detect VMs)
28->149
83
C:\ProgramData\...\uyzpsnbeowaz.exe, PE32+
37->83
dropped
85
C:\ProgramData\...\uwgxswmtctao.exe, PE32+
37->85
dropped
151
Uses powercfg.exe to
modify the power settings
37->151
153
Modifies power options
to not sleep / hibernate
37->153
52
sc.exe
37->52
started
54
sc.exe
37->54
started
56
sc.exe
37->56
started
58
9 other processes
37->58
file10
signatures11
process12
dnsIp13
109
claimconcessionrebe.shop
104.21.58.31, 443, 49716, 49728
CLOUDFLARENETUS
United States
40->109
111
triangleseasonbenchwj.shop
104.21.77.52, 443, 49713
CLOUDFLARENETUS
United States
40->111
115
3 other IPs or domains
40->115
60
WerFault.exe
40->60
started
181
Tries to steal Instant
Messenger accounts or
passwords
45->181
183
Uses netsh to modify
the Windows network
and firewall settings
45->183
185
Tries to harvest and
steal ftp login credentials
45->185
187
2 other signatures
45->187
62
powershell.exe
25
45->62
started
65
netsh.exe
2
45->65
started
113
mealroomrallpassiveer.shop
172.67.149.126, 443, 49722
CLOUDFLARENETUS
United States
48->113
67
WerFault.exe
48->67
started
69
WerFault.exe
48->69
started
71
conhost.exe
52->71
started
73
conhost.exe
54->73
started
75
conhost.exe
56->75
started
77
9 other processes
58->77
signatures14
process15
file16
101
C:\Users\user\...\246122658369_Desktop.zip, Zip
62->101
dropped
79
conhost.exe
62->79
started
81
conhost.exe
65->81
started
process17
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.