Threat name:
ScreenConnect Tool, Amadey, LummaC Steal
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to hide user accounts
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Enables network access during safeboot for specific services
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies security policies related information
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Tries to steal Mail credentials (via file / registry access)
Uses attrib.exe to hide files
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected PureLog Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1768788
Sample:
Hsu5Tn6Jg6.exe
Startdate:
01/09/2025
Architecture:
WINDOWS
Score:
100
146
washerv.ru
2->146
148
t.me
2->148
150
9 other IPs or domains
2->150
206
Suricata IDS alerts
for network traffic
2->206
208
Found malware configuration
2->208
210
Antivirus detection
for dropped file
2->210
212
17 other signatures
2->212
11
Hsu5Tn6Jg6.exe
1
2->11
started
16
msiexec.exe
2->16
started
18
ScreenConnect.ClientService.exe
2->18
started
20
9 other processes
2->20
signatures3
process4
dnsIp5
184
178.16.55.189, 49752, 49755, 49758
DUSNET-ASDE
Germany
11->184
186
earffgm.top
31.220.109.219, 443, 49687, 49744
AS-HOSTINGERLT
Lithuania
11->186
128
C:\Users\user\...\PPW0BLMF4TI4Y96CXZGIK.exe, PE32
11->128
dropped
236
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
11->236
238
Query firmware table
information (likely
to detect VMs)
11->238
240
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
11->240
252
8 other signatures
11->252
22
PPW0BLMF4TI4Y96CXZGIK.exe
6
43
11->22
started
27
chrome.exe
11->27
started
29
chrome.exe
11->29
started
39
2 other processes
11->39
130
C:\Windows\Installer\MSIA506.tmp, PE32
16->130
dropped
132
C:\Windows\Installer\MSIA2D2.tmp, PE32
16->132
dropped
134
C:\Windows\Installer\MSI9EE8.tmp, PE32
16->134
dropped
136
10 other malicious files
16->136
dropped
242
Enables network access
during safeboot for
specific services
16->242
244
Modifies security policies
related information
16->244
31
msiexec.exe
16->31
started
33
msiexec.exe
16->33
started
188
relay.darkypanel.click
107.189.21.122
PONYNETUS
United States
18->188
246
Reads the Security eventlog
18->246
248
Reads the System eventlog
18->248
35
ScreenConnect.WindowsClient.exe
18->35
started
37
ScreenConnect.WindowsClient.exe
18->37
started
250
Changes security center
settings (notifications,
updates, antivirus,
firewall)
20->250
41
2 other processes
20->41
file6
signatures7
process8
dnsIp9
166
94.154.35.25, 49753, 49754, 49756
SELECTELRU
Ukraine
22->166
112
C:\Users\user\AppData\Local\...\sQNHMrP.exe, PE32+
22->112
dropped
114
C:\Users\user\AppData\Local\...\FaPJWth.exe, PE32+
22->114
dropped
116
C:\Users\user\AppData\Local\...\Tse2E3k.exe, PE32+
22->116
dropped
118
14 other malicious files
22->118
dropped
214
Multi AV Scanner detection
for dropped file
22->214
216
Contains functionality
to start a terminal
service
22->216
218
Contains functionality
to inject code into
remote processes
22->218
43
G9Qkcq0.exe
22->43
started
46
fbfb0c1260.exe
22->46
started
48
YXJ9Hvg.exe
22->48
started
60
6 other processes
22->60
168
192.168.2.6, 443, 49687, 49690
unknown
unknown
27->168
50
chrome.exe
27->50
started
53
chrome.exe
29->53
started
220
Suspicious execution
chain found
31->220
55
rundll32.exe
31->55
started
222
Contains functionality
to hide user accounts
35->222
62
2 other processes
39->62
58
conhost.exe
41->58
started
file10
signatures11
process12
dnsIp13
224
Multi AV Scanner detection
for dropped file
43->224
226
Writes to foreign memory
regions
43->226
228
Allocates memory in
foreign processes
43->228
64
MSBuild.exe
43->64
started
230
Injects a PE file into
a foreign processes
46->230
68
MSBuild.exe
46->68
started
70
MSBuild.exe
46->70
started
72
MSBuild.exe
46->72
started
74
MSBuild.exe
48->74
started
152
www.google.com
142.250.80.100, 443, 49690, 49693
GOOGLEUS
United States
50->152
154
142.250.65.196, 443, 49711, 49712
GOOGLEUS
United States
53->154
156
trainisshit.shop
53->156
120
C:\Windows\...\ScreenConnect.Windows.dll, PE32
55->120
dropped
122
C:\...\ScreenConnect.InstallerActions.dll, PE32
55->122
dropped
124
C:\Windows\...\ScreenConnect.Core.dll, PE32
55->124
dropped
126
4 other malicious files
55->126
dropped
232
Contains functionality
to hide user accounts
55->232
158
mastwin.in
129.226.128.168
TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN
Singapore
60->158
160
185.102.115.104
MaxihostLTDABR
Poland
60->160
234
Uses attrib.exe to hide
files
60->234
76
xcopy.exe
60->76
started
79
MSBuild.exe
60->79
started
81
conhost.exe
60->81
started
83
4 other processes
60->83
162
142.251.40.100, 443, 49737, 49738
GOOGLEUS
United States
62->162
file14
signatures15
process16
dnsIp17
140
107.189.21.235
PONYNETUS
United States
64->140
190
Tries to steal Mail
credentials (via file
/ registry access)
64->190
192
Writes to foreign memory
regions
64->192
194
Allocates memory in
foreign processes
64->194
204
3 other signatures
64->204
85
chrome.exe
64->85
started
88
chrome.exe
64->88
injected
90
chrome.exe
64->90
injected
92
chrome.exe
64->92
injected
142
t.me
149.154.167.99, 443, 49757
TELEGRAMRU
United Kingdom
68->142
196
Found many strings related
to Crypto-Wallets (likely
being stolen)
68->196
198
Tries to harvest and
steal browser information
(history, passwords,
etc)
68->198
200
Tries to steal Crypto
Currency Wallets
68->200
94
chrome.exe
68->94
started
97
chrome.exe
68->97
started
99
chrome.exe
68->99
started
101
chrome.exe
68->101
started
202
Switches to a custom
stack to bypass stack
traces
70->202
103
WerFault.exe
74->103
started
138
C:\Users\user\AppData\...\tv9IK83.cmd.Jta, PE32
76->138
dropped
144
trainisshit.shop
87.120.126.216
UNACS-AS-BG8000BurgasBG
Bulgaria
79->144
file18
signatures19
process20
dnsIp21
164
192.168.2.9
unknown
unknown
85->164
105
chrome.exe
85->105
started
254
Found many strings related
to Crypto-Wallets (likely
being stolen)
94->254
108
chrome.exe
94->108
started
110
chrome.exe
97->110
started
signatures22
process23
dnsIp24
170
googlehosted.l.googleusercontent.com
142.250.65.225
GOOGLEUS
United States
105->170
172
142.250.80.36
GOOGLEUS
United States
105->172
182
2 other IPs or domains
105->182
174
142.251.32.100
GOOGLEUS
United States
108->174
176
www.google.com
108->176
178
142.250.72.100
GOOGLEUS
United States
110->178
180
www.google.com
110->180
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.