Threat name:
LummaC Stealer, Mars Stealer, PureLog St
Alert
Classification:
troj.spyw.evad.mine
Adds extensions / path to Windows Defender exclusion list (Registry)
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected Mars stealer
Yara detected MSILDownloaderGeneric
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1465682
Sample:
1719859269.0326595_setup.exe
Startdate:
02/07/2024
Architecture:
WINDOWS
Score:
100
110
service-domain.xyz
2->110
112
ellaboratepwsz.xyz
2->112
114
30 other IPs or domains
2->114
136
Found malware configuration
2->136
138
Malicious sample detected
(through community Yara
rule)
2->138
140
Antivirus detection
for URL or domain
2->140
144
26 other signatures
2->144
9
1719859269.0326595_setup.exe
11
40
2->9
started
14
WinTrackerSP.exe
2->14
started
16
svchost.exe
2->16
started
18
4 other processes
2->18
signatures3
142
Performs DNS queries
to domains with low
reputation
112->142
process4
dnsIp5
128
a.884736279.xyz
79.174.95.43
HOSTING-COMPANY-ASRU
Russian Federation
9->128
130
vk.com
87.240.132.78, 49718, 49719, 49725
VKONTAKTE-SPB-AShttpvkcomRU
Russian Federation
9->130
134
15 other IPs or domains
9->134
102
C:\Users\...\yTXn1eeuAPe6JeFa5Kfn6hMY.exe, PE32+
9->102
dropped
104
C:\Users\...\yHP2Z5SFUIZjI8pAKB_H3QUP.exe, PE32
9->104
dropped
106
C:\Users\...\kUJOpvLlbhqCDkTlllfRFIPb.exe, PE32
9->106
dropped
108
15 other malicious files
9->108
dropped
184
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
9->184
186
Drops PE files to the
document folder of the
user
9->186
188
Creates HTML files with
.exe extension (expired
dropper behavior)
9->188
196
7 other signatures
9->196
20
H1pBxuA3W1wJGbhYT2DZXaLH.exe
2
9->20
started
23
Lbg6Jgx2PuK0JimgGIFCI5UU.exe
37
9->23
started
27
yHP2Z5SFUIZjI8pAKB_H3QUP.exe
3
9->27
started
31
8 other processes
9->31
190
Multi AV Scanner detection
for dropped file
14->190
192
Query firmware table
information (likely
to detect VMs)
14->192
194
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
14->194
198
4 other signatures
14->198
29
WerFault.exe
16->29
started
132
127.0.0.1
unknown
unknown
18->132
file6
signatures7
process8
dnsIp9
84
C:\Users\...\H1pBxuA3W1wJGbhYT2DZXaLH.tmp, PE32
20->84
dropped
33
H1pBxuA3W1wJGbhYT2DZXaLH.tmp
20->33
started
124
85.28.47.4
GES-ASRU
Russian Federation
23->124
126
77.91.77.81
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
23->126
86
C:\Users\user\AppData\...\AAAAKJKJEB.exe, PE32
23->86
dropped
88
C:\Users\user\AppData\...\softokn3[1].dll, PE32
23->88
dropped
90
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
23->90
dropped
98
11 other files (7 malicious)
23->98
dropped
162
Multi AV Scanner detection
for dropped file
23->162
164
Detected unpacking (changes
PE section rights)
23->164
166
Tries to steal Mail
credentials (via file
/ registry access)
23->166
180
5 other signatures
23->180
168
Writes to foreign memory
regions
27->168
170
Allocates memory in
foreign processes
27->170
172
Injects a PE file into
a foreign processes
27->172
36
MSBuild.exe
27->36
started
92
C:\Users\user\AppData\...\PowerExpertNT.exe, PE32
31->92
dropped
94
C:\Users\user\AppData\Local\...\Install.exe, PE32
31->94
dropped
96
C:\Users\user\AppData\Local\...\Install.exe, PE32
31->96
dropped
100
3 other malicious files
31->100
dropped
174
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
31->174
176
Query firmware table
information (likely
to detect VMs)
31->176
178
Uses schtasks.exe or
at.exe to add and modify
task schedules
31->178
182
5 other signatures
31->182
40
RegAsm.exe
31->40
started
42
Install.exe
31->42
started
44
Install.exe
31->44
started
46
11 other processes
31->46
file10
signatures11
process12
dnsIp13
66
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
33->66
dropped
68
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
33->68
dropped
70
C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32
33->70
dropped
82
34 other files (23 malicious)
33->82
dropped
48
mp3doctorfree32_64.exe
33->48
started
116
t.me
149.154.167.99
TELEGRAMRU
United Kingdom
36->116
118
77.105.132.27
PLUSTELECOM-ASRU
Russian Federation
36->118
122
2 other IPs or domains
36->122
72
C:\Users\user\AppData\...\lumma2806[1].exe, PE32
36->72
dropped
74
C:\Users\user\AppData\Local\...\sqlt[1].dll, PE32
36->74
dropped
76
C:\ProgramData\FCBFBGDBKJ.exe, PE32
36->76
dropped
148
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
36->148
150
Tries to harvest and
steal ftp login credentials
36->150
152
Tries to harvest and
steal browser information
(history, passwords,
etc)
36->152
154
Tries to harvest and
steal Bitcoin Wallet
information
36->154
120
77.105.135.107
PLUSTELECOM-ASRU
Russian Federation
40->120
156
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
40->156
158
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
40->158
160
Tries to steal Crypto
Currency Wallets
40->160
78
C:\Users\user\AppData\Local\...\Install.exe, PE32
42->78
dropped
51
Install.exe
42->51
started
80
C:\Users\user\AppData\Local\...\Install.exe, PE32
44->80
dropped
54
Install.exe
44->54
started
56
conhost.exe
46->56
started
58
conhost.exe
46->58
started
60
conhost.exe
46->60
started
62
5 other processes
46->62
file14
signatures15
process16
file17
64
C:\ProgramData\...\AIRP Next Stage 7.1.66.exe, PE32
48->64
dropped
146
Multi AV Scanner detection
for dropped file
51->146
signatures18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.