Threat name:
Amadey, Cryptbot, LummaC Stealer, Nymaim
Alert
Classification:
troj.spyw.expl.evad.mine
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files to the document folder of the user
Drops VBS files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Leaks process information
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1566508
Sample:
file.exe
Startdate:
02/12/2024
Architecture:
WINDOWS
Score:
100
119
www.youtube.com
2->119
121
www.wikipedia.org
2->121
123
33 other IPs or domains
2->123
159
Suricata IDS alerts
for network traffic
2->159
161
Found malware configuration
2->161
163
Malicious sample detected
(through community Yara
rule)
2->163
165
22 other signatures
2->165
10
skotes.exe
4
42
2->10
started
15
file.exe
36
2->15
started
17
skotes.exe
2->17
started
19
firefox.exe
2->19
started
signatures3
process4
dnsIp5
147
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
10->147
149
detectportal.firefox.com
10->149
157
2 other IPs or domains
10->157
101
C:\Users\user\AppData\...\353c50f6d4.exe, PE32
10->101
dropped
103
C:\Users\user\AppData\...\12d3f71ac6.exe, PE32
10->103
dropped
105
C:\Users\user\AppData\...\71d7d59af9.exe, PE32
10->105
dropped
113
12 other malicious files
10->113
dropped
219
Creates multiple autostart
registry keys
10->219
221
Hides threads from debuggers
10->221
223
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->223
21
ACkcr88.exe
10->21
started
25
dd470452d3.exe
10->25
started
28
353c50f6d4.exe
10->28
started
36
5 other processes
10->36
151
185.215.113.206, 49730, 49750, 49761
WHOLESALECONNECTIONSNL
Portugal
15->151
153
185.215.113.16, 49760, 80
WHOLESALECONNECTIONSNL
Portugal
15->153
155
127.0.0.1
unknown
unknown
15->155
107
C:\Users\user\Documents\CFCGIIEHIE.exe, PE32
15->107
dropped
109
C:\Users\user\AppData\...\softokn3[1].dll, PE32
15->109
dropped
111
C:\Users\user\AppData\Local\...\random[1].exe, PE32
15->111
dropped
115
11 other files (7 malicious)
15->115
dropped
225
Detected unpacking (changes
PE section rights)
15->225
227
Attempt to bypass Chrome
Application-Bound Encryption
15->227
229
Drops PE files to the
document folder of the
user
15->229
235
7 other signatures
15->235
30
cmd.exe
1
15->30
started
32
chrome.exe
15->32
started
231
Tries to evade debugger
and weak emulator (self
modifying code)
17->231
233
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
17->233
34
firefox.exe
19->34
started
file6
signatures7
process8
dnsIp9
77
C:\Users\user\AppData\...\RedirectedGuid.exe, PE32
21->77
dropped
79
C:\Users\user\AppData\...\StilKrip02.exe, PE32
21->79
dropped
81
C:\Users\user\AppData\...\RedirectedGuid.vbs, ASCII
21->81
dropped
167
Multi AV Scanner detection
for dropped file
21->167
169
Drops VBS files to the
startup folder
21->169
171
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
21->171
173
Injects a PE file into
a foreign processes
21->173
38
InstallUtil.exe
21->38
started
42
StilKrip02.exe
21->42
started
133
home.fvtekx5pt.top
34.159.64.221
ATGS-MMD-ASUS
United States
25->133
141
2 other IPs or domains
25->141
83
C:\Users\user\AppData\...\service123.exe, PE32
25->83
dropped
85
C:\Users\user\...\rnCMinwLHbrEjcomyVjl.dll, PE32
25->85
dropped
175
Uses schtasks.exe or
at.exe to add and modify
task schedules
25->175
177
Tries to harvest and
steal browser information
(history, passwords,
etc)
25->177
187
5 other signatures
25->187
45
service123.exe
25->45
started
53
2 other processes
25->53
179
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
28->179
181
Modifies windows update
settings
28->181
189
4 other signatures
28->189
47
CFCGIIEHIE.exe
4
30->47
started
49
conhost.exe
30->49
started
143
2 other IPs or domains
32->143
51
chrome.exe
32->51
started
145
10 other IPs or domains
34->145
55
2 other processes
34->55
135
92.63.197.221
NOVOGARA-ASNL
Russian Federation
36->135
137
atten-supporse.biz
104.21.16.9
CLOUDFLARENETUS
United States
36->137
139
detectportal.firefox.com
36->139
87
C:\Users\user\AppData\Roaming\gdi32.dll, PE32
36->87
dropped
89
C:\Users\user\AppData\Local\...\Y-Cleaner.exe, PE32
36->89
dropped
91
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
36->91
dropped
93
2 other malicious files
36->93
dropped
183
Detected unpacking (changes
PE section rights)
36->183
185
Binary is likely a compiled
AutoIt script file
36->185
191
2 other signatures
36->191
57
9 other processes
36->57
file10
signatures11
process12
dnsIp13
125
89.110.100.37
RECONNRU
Ukraine
38->125
193
Queries sensitive physical
memory information (via
WMI, Win32_PhysicalMemory,
often done to detect
virtual machines)
38->193
195
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
38->195
197
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
38->197
215
2 other signatures
38->215
95
C:\Users\user\AppData\Roaming\TypeId.exe, PE32
42->95
dropped
97
C:\Users\user\AppData\Roaming\...\TypeId.vbs, ASCII
42->97
dropped
199
Drops VBS files to the
startup folder
42->199
201
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
42->201
203
Writes to foreign memory
regions
42->203
205
Injects a PE file into
a foreign processes
42->205
59
InstallUtil.exe
42->59
started
207
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
45->207
99
C:\Users\user\AppData\Local\...\skotes.exe, PE32
47->99
dropped
209
Detected unpacking (changes
PE section rights)
47->209
211
Tries to evade debugger
and weak emulator (self
modifying code)
47->211
213
Tries to detect virtualization
through RDTSC time measurements
47->213
217
3 other signatures
47->217
61
skotes.exe
47->61
started
127
apis.google.com
51->127
129
www.google.com
142.250.181.68, 443, 49732, 49733
GOOGLEUS
United States
51->129
131
2 other IPs or domains
51->131
64
chrome.exe
53->64
started
67
conhost.exe
57->67
started
69
conhost.exe
57->69
started
71
conhost.exe
57->71
started
73
2 other processes
57->73
file14
signatures15
process16
dnsIp17
75
WerFault.exe
59->75
started
237
Hides threads from debuggers
61->237
239
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
61->239
241
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
61->241
117
www.google.com
64->117
signatures18
process19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.