Threat name:
LummaC, Amadey, Clipboard Hijacker, Lumm
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Drops VBS files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the System eventlog
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Clipboard Hijacker
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1534847
Sample:
jYDYjpSbvf.exe
Startdate:
16/10/2024
Architecture:
WINDOWS
Score:
100
158
Found malware configuration
2->158
160
Malicious sample detected
(through community Yara
rule)
2->160
162
Antivirus detection
for dropped file
2->162
164
23 other signatures
2->164
10
axplong.exe
2
45
2->10
started
15
Hkbsse.exe
2->15
started
17
jYDYjpSbvf.exe
5
2->17
started
19
7 other processes
2->19
process3
dnsIp4
138
185.215.113.103
WHOLESALECONNECTIONSNL
Portugal
10->138
140
185.215.113.117
WHOLESALECONNECTIONSNL
Portugal
10->140
148
4 other IPs or domains
10->148
94
C:\Users\user\AppData\Local\Temp\...\app.exe, PE32
10->94
dropped
96
C:\Users\user\AppData\Local\...\splwow64.exe, PE32
10->96
dropped
98
C:\Users\user\AppData\...\processclass.exe, PE32
10->98
dropped
106
17 other malicious files
10->106
dropped
220
Creates multiple autostart
registry keys
10->220
222
Hides threads from debuggers
10->222
224
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->224
21
7608066a6e.exe
10->21
started
26
stealc_default2.exe
10->26
started
28
24b0ec2052.exe
10->28
started
38
7 other processes
10->38
142
176.113.115.95
SELECTELRU
Russian Federation
15->142
144
147.45.60.44
FREE-NET-ASFREEnetEU
Russian Federation
15->144
108
6 other malicious files
15->108
dropped
30
setup2.exe
15->30
started
32
JavUmar1.exe
15->32
started
100
C:\Users\user\AppData\Local\...\axplong.exe, PE32
17->100
dropped
102
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
17->102
dropped
226
Detected unpacking (changes
PE section rights)
17->226
228
Tries to evade debugger
and weak emulator (self
modifying code)
17->228
230
Tries to detect virtualization
through RDTSC time measurements
17->230
34
axplong.exe
17->34
started
146
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
19->146
150
3 other IPs or domains
19->150
104
C:\Users\user\AppData\...\ab5c599ede.exe, PE32
19->104
dropped
110
6 other malicious files
19->110
dropped
232
Injects a PE file into
a foreign processes
19->232
234
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->234
36
WerFault.exe
19->36
started
file5
signatures6
process7
dnsIp8
122
185.215.113.37
WHOLESALECONNECTIONSNL
Portugal
21->122
88
6 other files (4 malicious)
21->88
dropped
166
Multi AV Scanner detection
for dropped file
21->166
168
Detected unpacking (changes
PE section rights)
21->168
170
Tries to steal Mail
credentials (via file
/ registry access)
21->170
124
185.215.113.17
WHOLESALECONNECTIONSNL
Portugal
26->124
90
12 other files (8 malicious)
26->90
dropped
172
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->172
180
2 other signatures
26->180
76
C:\Users\user\AppData\Local\...\skotes.exe, PE32
28->76
dropped
182
3 other signatures
28->182
40
skotes.exe
28->40
started
184
6 other signatures
30->184
43
explorer.exe
30->43
injected
126
185.244.181.140
BELCLOUDBG
Russian Federation
32->126
78
C:\Users\user\AppData\...\service123.exe, PE32
32->78
dropped
80
C:\Users\user\...\fzmIlmsRrViqfoTPmTCM.dll, PE32
32->80
dropped
186
2 other signatures
32->186
174
Creates HTML files with
.exe extension (expired
dropper behavior)
34->174
188
2 other signatures
34->188
128
104.21.53.8
CLOUDFLARENETUS
United States
38->128
130
104.102.49.254
AKAMAI-ASUS
United States
38->130
82
C:\Windows\System32\context.exe, PE32
38->82
dropped
84
C:\Users\user\AppData\Local\sqdqsd.exe, PE32
38->84
dropped
86
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
38->86
dropped
92
3 other malicious files
38->92
dropped
176
Query firmware table
information (likely
to detect VMs)
38->176
178
Drops VBS files to the
startup folder
38->178
190
5 other signatures
38->190
47
RegAsm.exe
38->47
started
49
MSBuild.exe
3
38->49
started
51
RegAsm.exe
38->51
started
53
5 other processes
38->53
file9
signatures10
process11
dnsIp12
194
Detected unpacking (changes
PE section rights)
40->194
196
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
40->196
198
Tries to evade debugger
and weak emulator (self
modifying code)
40->198
218
3 other signatures
40->218
152
148.230.249.9
LVLT-3549US
Mexico
43->152
112
C:\Users\user\AppData\Roaming\fcghahc, PE32
43->112
dropped
200
Benign windows process
drops PE files
43->200
202
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
43->202
154
89.105.223.196
NOVOSERVE-GMBH-ASFrankfurtGermanyNL
Netherlands
47->154
204
Installs new ROOT certificates
47->204
206
Tries to harvest and
steal browser information
(history, passwords,
etc)
47->206
208
Tries to steal Crypto
Currency Wallets
47->208
114
C:\Users\user\AppData\...\uIsjVzmjCp.exe, PE32
49->114
dropped
116
C:\Users\user\AppData\...\nSJNWzIwZm.exe, PE32
49->116
dropped
55
nSJNWzIwZm.exe
49->55
started
58
uIsjVzmjCp.exe
49->58
started
60
Conhost.exe
49->60
started
210
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
51->210
212
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
51->212
156
20.42.65.92
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
53->156
214
Multi AV Scanner detection
for dropped file
53->214
216
Drops executables to
the windows directory
(C:\Windows) and
starts them
53->216
62
context.exe
53->62
started
64
conhost.exe
53->64
started
file13
signatures14
process15
signatures16
192
Reads the System eventlog
55->192
66
chrome.exe
62->66
started
69
chrome.exe
62->69
started
process17
dnsIp18
118
192.168.2.9
unknown
unknown
66->118
120
239.255.255.250
unknown
Reserved
66->120
71
chrome.exe
66->71
started
74
chrome.exe
69->74
started
process19
dnsIp20
132
104.208.16.92
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
71->132
134
13.107.246.45
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
71->134
136
11 other IPs or domains
71->136
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.