Threat name:
Glupteba, LummaC Stealer, PrivateLoader,
Alert
Classification:
troj.adwa.spyw.expl.evad
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found malware configuration
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1358088
Sample:
KQiRKJl9Ci.exe
Startdate:
11/12/2023
Architecture:
WINDOWS
Score:
100
132
Multi AV Scanner detection
for domain / URL
2->132
134
Found malware configuration
2->134
136
Malicious sample detected
(through community Yara
rule)
2->136
138
16 other signatures
2->138
11
KQiRKJl9Ci.exe
1
4
2->11
started
14
svchost.exe
2->14
started
16
svchost.exe
2->16
started
18
5 other processes
2->18
process3
file4
106
C:\Users\user\AppData\Local\...\yo6PH81.exe, PE32
11->106
dropped
108
C:\Users\user\AppData\Local\...\4XL763tv.exe, PE32
11->108
dropped
20
yo6PH81.exe
1
4
11->20
started
24
WerFault.exe
14->24
started
process5
file6
92
C:\Users\user\AppData\Local\...\3Eo80hP.exe, PE32
20->92
dropped
94
C:\Users\user\AppData\Local\...\1Ma25Tt3.exe, PE32
20->94
dropped
152
Antivirus detection
for dropped file
20->152
154
Multi AV Scanner detection
for dropped file
20->154
156
Machine Learning detection
for dropped file
20->156
26
3Eo80hP.exe
20->26
started
29
1Ma25Tt3.exe
20->29
started
31
tuc3.tmp
20->31
started
signatures7
process8
signatures9
192
Antivirus detection
for dropped file
26->192
194
Multi AV Scanner detection
for dropped file
26->194
196
Machine Learning detection
for dropped file
26->196
206
5 other signatures
26->206
33
explorer.exe
26
12
26->33
injected
198
Contains functionality
to inject code into
remote processes
29->198
200
Writes to foreign memory
regions
29->200
202
Allocates memory in
foreign processes
29->202
204
Injects a PE file into
a foreign processes
29->204
38
AppLaunch.exe
11
508
29->38
started
process10
dnsIp11
118
185.172.128.19
NADYMSS-ASRU
Russian Federation
33->118
120
81.19.131.34
IVC-ASRU
Russian Federation
33->120
76
C:\Users\user\AppData\Local\Temp\9486.exe, PE32
33->76
dropped
78
C:\Users\user\AppData\Local\Temp\8C0A.exe, PE32
33->78
dropped
80
C:\Users\user\AppData\Local\Temp\81A8.exe, PE32
33->80
dropped
88
2 other malicious files
33->88
dropped
140
System process connects
to network (likely due
to code injection or
exploit)
33->140
142
Benign windows process
drops PE files
33->142
40
765D.exe
33->40
started
44
81A8.exe
33->44
started
47
47AB.exe
33->47
started
55
7 other processes
33->55
122
34.117.59.81
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
38->122
124
193.233.132.51
FREE-NET-ASFREEnetEU
Russian Federation
38->124
82
C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII
38->82
dropped
84
C:\...\hUA6QSgRLwV0sQHLfbH0iHUCRdU8IH2J.zip, Zip
38->84
dropped
86
C:\Users\user\AppData\...\FANBooster131.exe, PE32
38->86
dropped
90
2 other files (none is malicious)
38->90
dropped
144
Tries to steal Mail
credentials (via file
/ registry access)
38->144
146
Found stalling execution
ending in API Sleep
call
38->146
148
Disables Windows Defender
(deletes autostart)
38->148
150
7 other signatures
38->150
49
schtasks.exe
1
38->49
started
51
schtasks.exe
1
38->51
started
53
WerFault.exe
38->53
started
file12
signatures13
process14
dnsIp15
96
C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32
40->96
dropped
98
C:\Users\user\AppData\Local\...\toolspub2.exe, PE32
40->98
dropped
100
C:\Users\user\AppData\Local\...\latestX.exe, PE32+
40->100
dropped
104
2 other malicious files
40->104
dropped
158
Antivirus detection
for dropped file
40->158
160
Multi AV Scanner detection
for dropped file
40->160
162
Machine Learning detection
for dropped file
40->162
57
31839b57a4f11171d6abc8bbc4451ee4.exe
40->57
started
60
toolspub2.exe
40->60
started
62
latestX.exe
40->62
started
71
4 other processes
40->71
126
176.123.7.190
ALEXHOSTMD
Moldova Republic of
44->126
164
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
44->164
166
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
44->166
168
Tries to harvest and
steal browser information
(history, passwords,
etc)
44->168
128
77.105.132.87
PLUSTELECOM-ASRU
Russian Federation
47->128
170
Tries to steal Crypto
Currency Wallets
47->170
65
conhost.exe
49->65
started
67
conhost.exe
51->67
started
130
52.182.143.212
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
53->130
102
C:\Users\user\AppData\...\Protect544cd51a.dll, PE32
55->102
dropped
172
Sample uses process
hollowing technique
55->172
69
conhost.exe
55->69
started
file16
signatures17
process18
file19
174
Antivirus detection
for dropped file
57->174
176
Multi AV Scanner detection
for dropped file
57->176
178
Detected unpacking (changes
PE section rights)
57->178
188
4 other signatures
57->188
180
Sample uses process
hollowing technique
60->180
182
Injects a PE file into
a foreign processes
60->182
110
C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+
62->110
dropped
112
C:\Windows\System32\drivers\etc\hosts, ASCII
62->112
dropped
184
Modifies the hosts file
62->184
114
C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32
71->114
dropped
116
C:\Users\user\AppData\Local\Temp\Broom.exe, PE32
71->116
dropped
186
Machine Learning detection
for dropped file
71->186
73
Broom.exe
71->73
started
signatures20
process21
signatures22
190
Multi AV Scanner detection
for dropped file
73->190
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.