Threat name:
LummaC Stealer, PrivateLoader, PureLog S
Alert
Classification:
troj.spyw.evad.mine
.NET source code contains potential unpacker
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found malware configuration
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1356444
Sample:
0L3UB5v8CI.exe
Startdate:
08/12/2023
Architecture:
WINDOWS
Score:
100
137
ipinfo.io
2->137
139
connv2.proxies.tv
2->139
161
Snort IDS alert for
network traffic
2->161
163
Found malware configuration
2->163
165
Malicious sample detected
(through community Yara
rule)
2->165
167
18 other signatures
2->167
13
0L3UB5v8CI.exe
1
4
2->13
started
17
svchost.exe
2->17
started
19
svchost.exe
2->19
started
21
7 other processes
2->21
signatures3
process4
file5
123
C:\Users\user\AppData\Local\...\nd1Fm79.exe, PE32
13->123
dropped
125
C:\Users\user\AppData\Local\...\6xd8lC0.exe, PE32
13->125
dropped
213
Binary is likely a compiled
AutoIt script file
13->213
23
nd1Fm79.exe
1
4
13->23
started
26
WerFault.exe
17->26
started
28
WerFault.exe
17->28
started
30
WerFault.exe
17->30
started
signatures6
process7
file8
111
C:\Users\user\AppData\Local\...\zi9kF73.exe, PE32
23->111
dropped
113
C:\Users\user\AppData\Local\...\5rj3VL3.exe, PE32
23->113
dropped
32
zi9kF73.exe
1
4
23->32
started
process9
file10
85
C:\Users\user\AppData\Local\...\gn6yT71.exe, PE32
32->85
dropped
87
C:\Users\user\AppData\Local\...\4SK797Ki.exe, PE32
32->87
dropped
35
gn6yT71.exe
1
4
32->35
started
38
4SK797Ki.exe
32->38
started
process11
file12
105
C:\Users\user\AppData\Local\...\3ai26LM.exe, PE32
35->105
dropped
107
C:\Users\user\AppData\Local\...\1Ef35ob3.exe, PE32
35->107
dropped
41
3ai26LM.exe
35->41
started
44
1Ef35ob3.exe
35->44
started
109
C:\...\l6J5AVz9AqV5U92_OvTEEH4pOD9Y1Oko.zip, Zip
38->109
dropped
169
Tries to steal Mail
credentials (via file
/ registry access)
38->169
171
Disables Windows Defender
(deletes autostart)
38->171
173
Tries to harvest and
steal browser information
(history, passwords,
etc)
38->173
175
3 other signatures
38->175
46
WerFault.exe
38->46
started
signatures13
process14
signatures15
177
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
41->177
179
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
41->179
181
Maps a DLL or memory
area into another process
41->181
191
2 other signatures
41->191
48
explorer.exe
41->48
injected
183
Contains functionality
to inject code into
remote processes
44->183
185
Writes to foreign memory
regions
44->185
187
Allocates memory in
foreign processes
44->187
189
Injects a PE file into
a foreign processes
44->189
53
AppLaunch.exe
11
508
44->53
started
55
AppLaunch.exe
44->55
started
process16
dnsIp17
127
185.196.8.238
SIMPLECARRER2IT
Switzerland
48->127
129
185.172.128.19, 49711, 80
NADYMSS-ASRU
Russian Federation
48->129
131
81.19.131.34, 49710, 80
IVC-ASRU
Russian Federation
48->131
89
C:\Users\user\AppData\Local\Temp\F8A0.exe, PE32
48->89
dropped
91
C:\Users\user\AppData\Local\Temp\D5F4.exe, PE32+
48->91
dropped
93
C:\Users\user\AppData\Local\Temp\C29A.exe, PE32
48->93
dropped
101
5 other malicious files
48->101
dropped
143
System process connects
to network (likely due
to code injection or
exploit)
48->143
145
Benign windows process
drops PE files
48->145
57
AA5E.exe
48->57
started
61
6F37.exe
48->61
started
64
74D6.exe
48->64
started
72
4 other processes
48->72
133
193.233.132.51, 49701, 49703, 50500
FREE-NET-ASFREEnetEU
Russian Federation
53->133
135
ipinfo.io
34.117.59.81, 443, 49702, 49704
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
53->135
95
C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII
53->95
dropped
97
C:\...\9gHNy_UwqhtES3ObRz5j5LEuct7sKtZW.zip, Zip
53->97
dropped
99
C:\Users\user\AppData\...\FANBooster131.exe, PE32
53->99
dropped
103
2 other files (none is malicious)
53->103
dropped
147
Tries to steal Mail
credentials (via file
/ registry access)
53->147
149
Disables Windows Defender
(deletes autostart)
53->149
151
Tries to harvest and
steal browser information
(history, passwords,
etc)
53->151
159
4 other signatures
53->159
66
schtasks.exe
1
53->66
started
68
schtasks.exe
1
53->68
started
70
WerFault.exe
53->70
started
153
Found stalling execution
ending in API Sleep
call
55->153
155
Contains functionality
to inject threads in
other processes
55->155
157
Uses schtasks.exe or
at.exe to add and modify
task schedules
55->157
file18
signatures19
process20
dnsIp21
115
C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32
57->115
dropped
117
C:\Users\user\AppData\Local\...\toolspub2.exe, PE32
57->117
dropped
119
C:\Users\user\AppData\Local\...\latestX.exe, PE32+
57->119
dropped
121
2 other malicious files
57->121
dropped
193
Antivirus detection
for dropped file
57->193
195
Multi AV Scanner detection
for dropped file
57->195
197
Machine Learning detection
for dropped file
57->197
74
InstallSetup9.exe
57->74
started
141
77.105.132.87
PLUSTELECOM-ASRU
Russian Federation
61->141
199
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
61->199
201
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
61->201
203
Tries to harvest and
steal browser information
(history, passwords,
etc)
61->203
205
Tries to steal Crypto
Currency Wallets
61->205
207
Modifies the context
of a thread in another
process (thread injection)
64->207
209
Injects a PE file into
a foreign processes
64->209
77
conhost.exe
66->77
started
79
conhost.exe
68->79
started
81
conhost.exe
72->81
started
83
WerFault.exe
72->83
started
file22
signatures23
process24
signatures25
211
Multi AV Scanner detection
for dropped file
74->211
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.