Threat name:
LummaC, Amadey, LummaC Stealer, PureLog
Alert
Classification:
phis.troj.spyw.expl.evad
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the System eventlog
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1425954
Sample:
bUWKfj04aU.exe
Startdate:
15/04/2024
Architecture:
WINDOWS
Score:
100
173
Found malware configuration
2->173
175
Malicious sample detected
(through community Yara
rule)
2->175
177
Antivirus detection
for dropped file
2->177
179
22 other signatures
2->179
9
explorgu.exe
1
48
2->9
started
14
bUWKfj04aU.exe
5
2->14
started
16
svchost.exe
2->16
started
18
NewB.exe
2->18
started
process3
dnsIp4
149
185.215.113.32
WHOLESALECONNECTIONSNL
Portugal
9->149
151
185.172.128.19
NADYMSS-ASRU
Russian Federation
9->151
157
3 other IPs or domains
9->157
121
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
9->121
dropped
123
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
9->123
dropped
125
C:\Users\user\AppData\Local\...\DocuWorks.exe, PE32+
9->125
dropped
129
21 other malicious files
9->129
dropped
249
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
9->249
251
Tries to evade debugger
and weak emulator (self
modifying code)
9->251
253
Hides threads from debuggers
9->253
263
2 other signatures
9->263
20
file300un.exe
9->20
started
23
NewB.exe
9->23
started
27
alexxxxxxxx.exe
9->27
started
29
7 other processes
9->29
127
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
14->127
dropped
255
Detected unpacking (changes
PE section rights)
14->255
257
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
14->257
259
Tries to detect virtualization
through RDTSC time measurements
14->259
261
Potentially malicious
time measurement code
found
14->261
153
23.62.134.148
AKAMAI-ASUS
United States
16->153
155
127.0.0.1
unknown
unknown
16->155
file5
signatures6
process7
dnsIp8
207
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
20->207
209
Writes to foreign memory
regions
20->209
211
Allocates memory in
foreign processes
20->211
213
Sample uses process
hollowing technique
20->213
31
MSBuild.exe
20->31
started
46
2 other processes
20->46
141
185.172.128.59
NADYMSS-ASRU
Russian Federation
23->141
143
104.21.92.190
CLOUDFLARENETUS
United States
23->143
145
172.67.187.204
CLOUDFLARENETUS
United States
23->145
113
C:\Users\user\AppData\Local\...\Uni400uni.exe, PE32+
23->113
dropped
115
C:\Users\user\AppData\Local\...\FirstZ.exe, PE32+
23->115
dropped
117
C:\Users\user\AppData\Local\...\ISetup8.exe, PE32
23->117
dropped
119
5 other malicious files
23->119
dropped
215
Creates an undocumented
autostart registry key
23->215
217
Uses schtasks.exe or
at.exe to add and modify
task schedules
23->217
35
Uni400uni.exe
23->35
started
48
4 other processes
23->48
219
Contains functionality
to inject code into
remote processes
27->219
221
Injects a PE file into
a foreign processes
27->221
38
RegAsm.exe
27->38
started
40
conhost.exe
27->40
started
147
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
29->147
223
System process connects
to network (likely due
to code injection or
exploit)
29->223
225
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
29->225
227
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
29->227
229
5 other signatures
29->229
42
rundll32.exe
19
29->42
started
44
RegAsm.exe
29->44
started
50
4 other processes
29->50
file9
signatures10
process11
dnsIp12
159
104.21.79.77
CLOUDFLARENETUS
United States
31->159
161
172.67.34.170
CLOUDFLARENETUS
United States
31->161
85
C:\Users\...\zkP3dJByFmLvW6zaaFPB4q1s.exe, PE32
31->85
dropped
87
C:\Users\...\yhDNs5CKgcvWpHQdXrg6et6I.exe, PE32+
31->87
dropped
89
C:\Users\...\uuRE7gXsEM4RR1NoZUBwtrlp.exe, PE32
31->89
dropped
101
73 other malicious files
31->101
dropped
181
Writes to foreign memory
regions
35->181
183
Allocates memory in
foreign processes
35->183
185
Sample uses process
hollowing technique
35->185
187
Injects a PE file into
a foreign processes
35->187
52
MSBuild.exe
35->52
started
57
WerFault.exe
35->57
started
71
2 other processes
35->71
91
C:\Users\user\AppData\Roaming\...\propro.exe, PE32
38->91
dropped
93
C:\Users\user\AppData\Roaming\...\Traffic.exe, PE32
38->93
dropped
59
propro.exe
38->59
started
61
Traffic.exe
38->61
started
189
Tries to steal Instant
Messenger accounts or
passwords
42->189
191
Uses netsh to modify
the Windows network
and firewall settings
42->191
193
Tries to harvest and
steal ftp login credentials
42->193
195
Tries to harvest and
steal WLAN passwords
42->195
63
powershell.exe
26
42->63
started
65
netsh.exe
2
42->65
started
163
104.21.47.60
CLOUDFLARENETUS
United States
44->163
197
Query firmware table
information (likely
to detect VMs)
44->197
199
Found many strings related
to Crypto-Wallets (likely
being stolen)
44->199
201
Tries to harvest and
steal browser information
(history, passwords,
etc)
44->201
165
185.172.128.228
NADYMSS-ASRU
Russian Federation
48->165
167
185.172.128.90
NADYMSS-ASRU
Russian Federation
48->167
95
C:\Users\user\AppData\Local\Temp\u5ps.1.exe, PE32
48->95
dropped
97
C:\Users\user\AppData\Local\Temp\u5ps.0.exe, PE32
48->97
dropped
99
C:\ProgramData\...\reakuqnanrkn.exe, PE32+
48->99
dropped
203
Adds a directory exclusion
to Windows Defender
48->203
67
conhost.exe
48->67
started
69
powershell.exe
48->69
started
169
20.42.65.92
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
50->169
171
172.67.181.34
CLOUDFLARENETUS
United States
50->171
205
Tries to steal Crypto
Currency Wallets
50->205
file13
signatures14
process15
dnsIp16
131
107.167.110.211
OPERASOFTWAREUS
United States
52->131
133
193.233.132.175
FREE-NET-ASFREEnetEU
Russian Federation
52->133
139
8 other IPs or domains
52->139
103
C:\Users\...\wZuV3PgWQZH6WkVb85MHgKez.exe, MS-DOS
52->103
dropped
105
C:\Users\...\tLniRa1wNfVBc8wtGlFeZuV5.exe, PE32
52->105
dropped
107
C:\Users\...\sx0rXq9mQR9aeLWBWHbPdr14.exe, PE32
52->107
dropped
111
49 other malicious files
52->111
dropped
231
Creates HTML files with
.exe extension (expired
dropper behavior)
52->231
135
104.208.16.94
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
57->135
137
185.172.128.33
NADYMSS-ASRU
Russian Federation
59->137
233
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
59->233
235
Installs new ROOT certificates
59->235
237
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
59->237
239
Tries to steal Crypto
Currency Wallets
59->239
241
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
61->241
243
Reads the System eventlog
61->243
73
conhost.exe
61->73
started
109
C:\Users\user\...\246122658369_Desktop.zip, Zip
63->109
dropped
245
Found many strings related
to Crypto-Wallets (likely
being stolen)
63->245
247
Loading BitLocker PowerShell
Module
63->247
75
conhost.exe
63->75
started
77
conhost.exe
65->77
started
79
WerFault.exe
67->79
started
81
WerFault.exe
67->81
started
83
conhost.exe
69->83
started
file17
signatures18
process19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.