Threat name:
ScreenConnect Tool, Amadey, LummaC Steal
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Enables network access during safeboot for specific services
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies security policies related information
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected Salat Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1768923
Sample:
2U9403.exe
Startdate:
01/09/2025
Architecture:
WINDOWS
Score:
100
136
t.me
2->136
138
relay.darkypanel.click
2->138
140
9 other IPs or domains
2->140
176
Suricata IDS alerts
for network traffic
2->176
178
Found malware configuration
2->178
180
Antivirus detection
for dropped file
2->180
182
22 other signatures
2->182
11
2U9403.exe
1
2->11
started
16
msiexec.exe
2->16
started
18
0efe587036.exe
2->18
started
20
11 other processes
2->20
signatures3
process4
dnsIp5
160
178.16.55.189, 49757, 49761, 49764
DUSNET-ASDE
Germany
11->160
162
earffgm.top
31.220.109.219, 443, 49718, 49750
AS-HOSTINGERLT
Lithuania
11->162
124
C:\Users\...\1XCQ9II90KCBTTYFWE9UM3Q4V4E.exe, PE32
11->124
dropped
228
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
11->228
230
Query firmware table
information (likely
to detect VMs)
11->230
232
Tries to harvest and
steal ftp login credentials
11->232
252
2 other signatures
11->252
22
1XCQ9II90KCBTTYFWE9UM3Q4V4E.exe
7
49
11->22
started
27
chrome.exe
11->27
started
29
chrome.exe
11->29
started
37
2 other processes
11->37
126
C:\Windows\Installer\MSIFE31.tmp, PE32
16->126
dropped
128
C:\Windows\Installer\MSIC2E.tmp, PE32
16->128
dropped
130
C:\Windows\Installer\MSI6AF.tmp, PE32
16->130
dropped
132
10 other malicious files
16->132
dropped
234
Enables network access
during safeboot for
specific services
16->234
236
Modifies security policies
related information
16->236
31
msiexec.exe
16->31
started
33
msiexec.exe
16->33
started
238
Tries to steal Crypto
Currency Wallets
18->238
240
Hides threads from debuggers
18->240
242
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
18->242
35
chrome.exe
18->35
started
39
2 other processes
18->39
164
relay.darkypanel.click
107.189.21.122
PONYNETUS
United States
20->164
166
127.0.0.1
unknown
unknown
20->166
244
Changes security center
settings (notifications,
updates, antivirus,
firewall)
20->244
246
Found many strings related
to Crypto-Wallets (likely
being stolen)
20->246
248
Reads the Security eventlog
20->248
250
Reads the System eventlog
20->250
41
3 other processes
20->41
file6
signatures7
process8
dnsIp9
150
94.154.35.25, 49759, 49760, 49762
SELECTELRU
Ukraine
22->150
104
C:\Users\user\AppData\Local\...\FaPJWth.exe, PE32+
22->104
dropped
106
C:\Users\user\AppData\Local\...\Tse2E3k.exe, PE32+
22->106
dropped
108
C:\Users\user\AppData\Local\...\YXJ9Hvg.exe, PE32+
22->108
dropped
110
15 other malicious files
22->110
dropped
184
Multi AV Scanner detection
for dropped file
22->184
186
Contains functionality
to start a terminal
service
22->186
188
Creates multiple autostart
registry keys
22->188
190
Contains functionality
to inject code into
remote processes
22->190
43
0efe587036.exe
22->43
started
58
8 other processes
22->58
152
192.168.2.4, 443, 49710, 49711
unknown
unknown
27->152
47
chrome.exe
27->47
started
50
chrome.exe
29->50
started
52
rundll32.exe
31->52
started
54
chrome.exe
35->54
started
60
2 other processes
37->60
62
2 other processes
39->62
56
conhost.exe
41->56
started
file10
signatures11
process12
dnsIp13
114
C:\Users\user\...\2CDXJMT62QZR9POG8.exe, PE32
43->114
dropped
212
Antivirus detection
for dropped file
43->212
214
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
43->214
216
Query firmware table
information (likely
to detect VMs)
43->216
224
10 other signatures
43->224
64
chrome.exe
43->64
started
66
chrome.exe
43->66
started
68
chrome.exe
43->68
started
70
chrome.exe
43->70
started
168
www.google.com
142.250.65.196, 443, 49721, 49722
GOOGLEUS
United States
47->168
170
142.251.40.100, 443, 49736, 49737
GOOGLEUS
United States
50->170
116
C:\Windows\...\ScreenConnect.Windows.dll, PE32
52->116
dropped
118
C:\...\ScreenConnect.InstallerActions.dll, PE32
52->118
dropped
120
C:\Windows\...\ScreenConnect.Core.dll, PE32
52->120
dropped
122
4 other malicious files
52->122
dropped
172
142.251.41.4
GOOGLEUS
United States
54->172
174
mastwin.in
129.226.128.168
TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN
Singapore
58->174
218
Multi AV Scanner detection
for dropped file
58->218
220
Suspicious powershell
command line found
58->220
222
Obfuscated command line
found
58->222
226
3 other signatures
58->226
72
MSBuild.exe
58->72
started
76
powershell.exe
58->76
started
79
MSBuild.exe
58->79
started
81
8 other processes
58->81
file14
signatures15
process16
dnsIp17
83
chrome.exe
64->83
started
86
chrome.exe
66->86
started
154
107.189.21.235
PONYNETUS
United States
72->154
192
Tries to steal Mail
credentials (via file
/ registry access)
72->192
194
Tries to harvest and
steal browser information
(history, passwords,
etc)
72->194
196
Writes to foreign memory
regions
72->196
208
4 other signatures
72->208
88
chrome.exe
72->88
started
156
45.67.138.11, 49763, 80
NEWMEDIAEXPRESSCHINA-AS-APNewMediaExpressPteLtdCN
Germany
76->156
134
C:\Users\user\AppData\Roaming\...\install.exe, PE32
76->134
dropped
198
Found many strings related
to Crypto-Wallets (likely
being stolen)
76->198
200
Loading BitLocker PowerShell
Module
76->200
202
Powershell drops PE
file
76->202
90
install.exe
76->90
started
94
attrib.exe
76->94
started
158
t.me
149.154.167.99, 443, 49781
TELEGRAMRU
United Kingdom
79->158
204
Tries to steal Crypto
Currency Wallets
79->204
96
chrome.exe
79->96
started
206
Switches to a custom
stack to bypass stack
traces
81->206
98
net1.exe
81->98
started
100
net1.exe
81->100
started
file18
signatures19
process20
dnsIp21
142
142.251.35.164, 443, 49773, 49774
GOOGLEUS
United States
83->142
144
www.google.com
83->144
146
dns.google
8.8.8.8
GOOGLEUS
United States
90->146
148
104.21.16.1
CLOUDFLARENETUS
United States
90->148
112
C:\...\Tp3JSY1xHrCquXEBdsNrWy.exe, PE32
90->112
dropped
210
Creates multiple autostart
registry keys
90->210
102
Tp3JSY1xHrCquXEBdsNrWy.exe
90->102
started
file22
signatures23
process24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.