Threat name:
LummaC, Amadey, Mars Stealer, PureLog St
Alert
Classification:
troj.spyw.evad.mine
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Disable Task Manager(disabletaskmgr)
Disables the Windows task manager (taskmgr)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell downloading file from url shortener site
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Mars stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1463420
Sample:
1Vkf7silOj.exe
Startdate:
27/06/2024
Architecture:
WINDOWS
Score:
100
135
slammyslideplanntywks.xyz
2->135
137
proffyrobharborye.xyz
2->137
139
21 other IPs or domains
2->139
185
Snort IDS alert for
network traffic
2->185
187
Multi AV Scanner detection
for domain / URL
2->187
189
Found malware configuration
2->189
193
24 other signatures
2->193
11
axplong.exe
37
2->11
started
16
1Vkf7silOj.exe
19
19
2->16
started
18
svchost.exe
2->18
started
20
8 other processes
2->20
signatures3
191
Tries to resolve many
domain names, but no
domain seems valid
137->191
process4
dnsIp5
145
94.228.166.74, 49742, 80
PRANET-ASRU
Russian Federation
11->145
147
185.172.128.116, 49732, 49739, 49749
NADYMSS-ASRU
Russian Federation
11->147
157
3 other IPs or domains
11->157
99
C:\Users\user\AppData\...\TpWWMUpe0LEV.exe, PE32
11->99
dropped
101
C:\Users\user\AppData\...\O3B6wY7ZkFhh.exe, PE32+
11->101
dropped
103
C:\Users\user\AppData\Local\Temp\...\123.exe, PE32
11->103
dropped
111
13 other malicious files
11->111
dropped
225
Detected unpacking (changes
PE section rights)
11->225
227
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
11->227
229
Tries to evade debugger
and weak emulator (self
modifying code)
11->229
239
4 other signatures
11->239
22
TpWWMUpe0LEV.exe
11->22
started
26
alex5555555.exe
11->26
started
28
NewLatest.exe
11->28
started
37
5 other processes
11->37
149
185.215.113.67, 40960, 49707
WHOLESALECONNECTIONSNL
Portugal
16->149
151
77.91.77.81, 49726, 49729, 49730
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
16->151
153
moreapp4you.online
31.31.196.208, 443, 49709
AS-REGRU
Russian Federation
16->153
105
C:\Users\user\AppData\Local\Temp\7.exe, PE32
16->105
dropped
107
C:\Users\user\AppData\Local\Temp\6.exe, PE32
16->107
dropped
109
C:\Users\user\AppData\...\1Vkf7silOj.exe.log, ASCII
16->109
dropped
231
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
16->231
233
Found many strings related
to Crypto-Wallets (likely
being stolen)
16->233
235
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
16->235
237
Tries to steal Crypto
Currency Wallets
16->237
30
7.exe
4
16->30
started
32
6.exe
16->32
started
34
chrome.exe
16->34
started
39
2 other processes
18->39
155
127.0.0.1
unknown
unknown
20->155
41
2 other processes
20->41
file6
signatures7
process8
dnsIp9
91
C:\Users\user\AppData\Roaming\d3d9.dll, PE32
22->91
dropped
199
Multi AV Scanner detection
for dropped file
22->199
201
Writes to foreign memory
regions
22->201
203
Allocates memory in
foreign processes
22->203
43
aspnet_regiis.exe
22->43
started
48
conhost.exe
22->48
started
205
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->205
207
Injects a PE file into
a foreign processes
26->207
50
RegAsm.exe
26->50
started
52
WerFault.exe
26->52
started
93
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
28->93
dropped
54
Hkbsse.exe
28->54
started
95
C:\Users\user\AppData\Local\...\axplong.exe, PE32
30->95
dropped
209
Detected unpacking (changes
PE section rights)
30->209
221
5 other signatures
30->221
56
axplong.exe
30->56
started
211
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
32->211
223
2 other signatures
32->223
141
192.168.2.7, 1110, 40960, 443
unknown
unknown
34->141
143
239.255.255.250
unknown
Reserved
34->143
58
chrome.exe
34->58
started
97
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
37->97
dropped
213
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
37->213
215
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
37->215
217
Contains functionality
to inject code into
remote processes
37->217
219
Tries to steal Crypto
Currency Wallets
37->219
60
cmd.exe
37->60
started
62
3 other processes
37->62
file10
signatures11
process12
dnsIp13
159
65.21.175.0
CP-ASDE
United States
43->159
113
C:\Users\user\AppData\...\softokn3[1].dll, PE32
43->113
dropped
115
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
43->115
dropped
117
C:\Users\user\AppData\...\mozglue[1].dll, PE32
43->117
dropped
127
9 other files (5 malicious)
43->127
dropped
241
Tries to steal Mail
credentials (via file
/ registry access)
43->241
243
Found many strings related
to Crypto-Wallets (likely
being stolen)
43->243
245
Tries to harvest and
steal ftp login credentials
43->245
259
3 other signatures
43->259
119
C:\Users\user\AppData\Roaming\...\svhosts.exe, PE32
50->119
dropped
121
C:\Users\user\AppData\...xplorers.exe, PE32
50->121
dropped
64
svhosts.exe
50->64
started
68
Explorers.exe
50->68
started
161
biancolevrin.com
103.28.36.182, 443, 49743
NHANHOA-AS-VNNhanHoaSoftwarecompanyVN
Viet Nam
54->161
123
C:\Users\user\AppData\Local\Temp\...\1.exe, PE32
54->123
dropped
125
C:\Users\user\AppData\Local\...\1[1].exe, PE32
54->125
dropped
247
Multi AV Scanner detection
for dropped file
54->247
70
1.exe
54->70
started
249
Hides threads from debuggers
56->249
251
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
56->251
253
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
56->253
163
www.google.com
216.58.206.36, 443, 49725
GOOGLEUS
United States
58->163
165
iplogger.co
172.67.167.249, 443, 49710, 49720
CLOUDFLARENETUS
United States
58->165
255
Suspicious powershell
command line found
60->255
257
Uses schtasks.exe or
at.exe to add and modify
task schedules
60->257
72
powershell.exe
60->72
started
74
powershell.exe
60->74
started
76
conhost.exe
60->76
started
78
2 other processes
60->78
167
4.184.236.127, 1110, 49731, 49744
LEVEL3US
United States
62->167
file14
signatures15
process16
dnsIp17
129
185.172.128.33
NADYMSS-ASRU
Russian Federation
64->129
169
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
64->169
171
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
64->171
173
Tries to harvest and
steal browser information
(history, passwords,
etc)
64->173
175
Tries to steal Crypto
Currency Wallets
64->175
80
conhost.exe
68->80
started
177
Multi AV Scanner detection
for dropped file
70->177
179
Detected unpacking (changes
PE section rights)
70->179
181
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
70->181
183
5 other signatures
70->183
82
cmd.exe
72->82
started
131
bit.ly
67.199.248.11, 443, 49745
GOOGLE-PRIVATE-CLOUDUS
United States
74->131
133
pixel.com
54.67.42.145, 443, 49747
AMAZON-02US
United States
74->133
signatures18
process19
process20
84
reg.exe
82->84
started
87
conhost.exe
82->87
started
89
schtasks.exe
82->89
started
signatures21
195
Disable Task Manager(disabletaskmgr)
84->195
197
Disables the Windows
task manager (taskmgr)
84->197
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://77.91.77.81/lend/123.exe