Threat name:
LummaC, Amadey, LummaC Stealer, PureLog
Alert
Classification:
troj.spyw.evad
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Disable Task Manager(disabletaskmgr)
Disables the Windows task manager (taskmgr)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell downloading file from url shortener site
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1461336
Sample:
hsRju5CPK2.exe
Startdate:
24/06/2024
Architecture:
WINDOWS
Score:
100
140
github.com
2->140
142
bit.ly
2->142
144
8 other IPs or domains
2->144
170
Snort IDS alert for
network traffic
2->170
172
Multi AV Scanner detection
for domain / URL
2->172
174
Found malware configuration
2->174
176
25 other signatures
2->176
12
hsRju5CPK2.exe
5
2->12
started
16
Hkbsse.exe
2->16
started
19
axplong.exe
2->19
started
21
8 other processes
2->21
signatures3
process4
dnsIp5
118
C:\Users\user\AppData\Local\...\axplong.exe, PE32
12->118
dropped
120
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
12->120
dropped
234
Detected unpacking (changes
PE section rights)
12->234
236
Tries to evade debugger
and weak emulator (self
modifying code)
12->236
238
Tries to detect virtualization
through RDTSC time measurements
12->238
23
axplong.exe
34
12->23
started
132
comrex.pk
58.65.168.132, 443, 49724
NAYATEL-PKNayatelPvtLtdPK
Pakistan
16->132
122
C:\Users\user\AppData\Local\...\FirstZ.exe, PE32+
16->122
dropped
124
C:\Users\user\AppData\Local\Temp\...\1.exe, PE32
16->124
dropped
126
C:\Users\user\AppData\Local\...\1[1].exe, PE32
16->126
dropped
128
C:\Users\user\AppData\Local\...\FirstZ[1].exe, PE32+
16->128
dropped
240
Multi AV Scanner detection
for dropped file
16->240
28
FirstZ.exe
16->28
started
242
Hides threads from debuggers
19->242
244
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
19->244
246
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->246
134
192.168.2.5, 13528, 40960, 443
unknown
unknown
21->134
136
127.0.0.1
unknown
unknown
21->136
138
3 other IPs or domains
21->138
130
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
21->130
dropped
248
Machine Learning detection
for dropped file
21->248
30
chrome.exe
21->30
started
32
WerFault.exe
21->32
started
34
chrome.exe
21->34
started
file6
signatures7
process8
dnsIp9
146
185.172.128.116, 49711, 49718, 49726
NADYMSS-ASRU
Russian Federation
23->146
148
github.com
140.82.121.3, 443, 49714
GITHUBUS
United States
23->148
154
2 other IPs or domains
23->154
104
C:\Users\user\AppData\...\taskweaker.exe, PE32+
23->104
dropped
106
C:\Users\user\AppData\Local\Temp\...\legs.exe, PE32
23->106
dropped
108
C:\Users\user\AppData\Local\...\Installer.exe, PE32+
23->108
dropped
112
11 other malicious files
23->112
dropped
212
Antivirus detection
for dropped file
23->212
214
Multi AV Scanner detection
for dropped file
23->214
216
Detected unpacking (changes
PE section rights)
23->216
228
6 other signatures
23->228
36
Installer.exe
23->36
started
39
ama.exe
19
19
23->39
started
43
legs.exe
23->43
started
51
3 other processes
23->51
110
C:\ProgramData\...\reakuqnanrkn.exe, PE32+
28->110
dropped
218
Uses cmd line tools
excessively to alter
registry or file data
28->218
220
Uses powercfg.exe to
modify the power settings
28->220
222
Adds a directory exclusion
to Windows Defender
28->222
224
Modifies power options
to not sleep / hibernate
28->224
45
powershell.exe
28->45
started
47
cmd.exe
28->47
started
49
sc.exe
28->49
started
53
6 other processes
28->53
150
starjod.xyz
30->150
152
findalltechs.xyz
30->152
156
5 other IPs or domains
30->156
file10
226
Performs DNS queries
to domains with low
reputation
152->226
signatures11
process12
dnsIp13
178
Multi AV Scanner detection
for dropped file
36->178
55
cmd.exe
36->55
started
158
185.215.113.67, 40960, 49707
WHOLESALECONNECTIONSNL
Portugal
39->158
160
moreapp4you.online
31.31.196.208
AS-REGRU
Russian Federation
39->160
162
2 other IPs or domains
39->162
114
C:\Users\user\AppData\Local\Temp\8.exe, PE32
39->114
dropped
116
C:\Users\user\AppData\Local\Temp\6.exe, PE32
39->116
dropped
180
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
39->180
182
Machine Learning detection
for dropped file
39->182
184
Found many strings related
to Crypto-Wallets (likely
being stolen)
39->184
200
3 other signatures
39->200
186
Writes to foreign memory
regions
43->186
188
Allocates memory in
foreign processes
43->188
190
Injects a PE file into
a foreign processes
43->190
59
RegAsm.exe
43->59
started
68
2 other processes
43->68
192
Loading BitLocker PowerShell
Module
45->192
70
2 other processes
45->70
72
2 other processes
47->72
61
conhost.exe
49->61
started
194
Antivirus detection
for dropped file
51->194
196
Contains functionality
to inject code into
remote processes
51->196
198
LummaC encrypted strings
found
51->198
63
RegAsm.exe
2
51->63
started
66
RegAsm.exe
51->66
started
74
5 other processes
53->74
file14
signatures15
process16
dnsIp17
102
C:\Users\user\AppData\Local\...\install.bat, ASCII
55->102
dropped
202
Suspicious powershell
command line found
55->202
204
Uses cmd line tools
excessively to alter
registry or file data
55->204
206
Uses schtasks.exe or
at.exe to add and modify
task schedules
55->206
76
powershell.exe
55->76
started
78
powershell.exe
55->78
started
81
powershell.exe
55->81
started
86
3 other processes
55->86
208
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
59->208
84
conhost.exe
59->84
started
168
4.185.27.237, 13528, 49709
LEVEL3US
United States
63->168
file18
signatures19
process20
dnsIp21
88
cmd.exe
76->88
started
164
bit.ly
67.199.248.11
GOOGLE-PRIVATE-CLOUDUS
United States
78->164
166
pixel.com
54.67.42.145
AMAZON-02US
United States
78->166
100
C:\Users\user\AppData\Local\Corporation.zip, Zip
81->100
dropped
file22
process23
signatures24
210
Uses cmd line tools
excessively to alter
registry or file data
88->210
91
reg.exe
88->91
started
94
conhost.exe
88->94
started
96
schtasks.exe
88->96
started
98
2 other processes
88->98
process25
signatures26
230
Disable Task Manager(disabletaskmgr)
91->230
232
Disables the Windows
task manager (taskmgr)
91->232
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://77.91.77.81/soka/random.exe