Threat name:
LummaC Stealer, PrivateLoader, RedLine,
Alert
Classification:
troj.spyw.evad
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check for running processes (XOR)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1349995
Sample:
N9heIocr8L.exe
Startdate:
29/11/2023
Architecture:
WINDOWS
Score:
100
159
pic.himanfast.com
2->159
161
ipinfo.io
2->161
195
Snort IDS alert for
network traffic
2->195
197
Found malware configuration
2->197
199
Malicious sample detected
(through community Yara
rule)
2->199
201
19 other signatures
2->201
13
N9heIocr8L.exe
1
4
2->13
started
16
XsdType.exe
2->16
started
19
OfficeTrackerNMP131.exe
2->19
started
21
6 other processes
2->21
signatures3
process4
dnsIp5
155
C:\Users\user\AppData\Local\...\xq0Vw24.exe, PE32
13->155
dropped
157
C:\Users\user\AppData\Local\...\5iO2wb6.exe, PE32
13->157
dropped
24
xq0Vw24.exe
1
4
13->24
started
187
Antivirus detection
for dropped file
16->187
189
Multi AV Scanner detection
for dropped file
16->189
191
Machine Learning detection
for dropped file
16->191
193
3 other signatures
16->193
28
XsdType.exe
16->28
started
30
Conhost.exe
19->30
started
169
127.0.0.1
unknown
unknown
21->169
32
WerFault.exe
21->32
started
file6
signatures7
process8
file9
121
C:\Users\user\AppData\Local\...\TE9rS78.exe, PE32
24->121
dropped
123
C:\Users\user\AppData\Local\...\4IZ059Ez.exe, PE32
24->123
dropped
219
Antivirus detection
for dropped file
24->219
221
Multi AV Scanner detection
for dropped file
24->221
223
Binary is likely a compiled
AutoIt script file
24->223
225
Machine Learning detection
for dropped file
24->225
34
TE9rS78.exe
1
4
24->34
started
38
4IZ059Ez.exe
24->38
started
227
Writes to foreign memory
regions
28->227
229
Modifies the context
of a thread in another
process (thread injection)
28->229
231
Sample uses process
hollowing technique
28->231
233
Injects a PE file into
a foreign processes
28->233
signatures10
process11
file12
113
C:\Users\user\AppData\Local\...\ek5hK38.exe, PE32
34->113
dropped
115
C:\Users\user\AppData\Local\...\3mz52FD.exe, PE32
34->115
dropped
203
Antivirus detection
for dropped file
34->203
205
Multi AV Scanner detection
for dropped file
34->205
207
Machine Learning detection
for dropped file
34->207
40
3mz52FD.exe
34->40
started
43
ek5hK38.exe
1
4
34->43
started
209
Binary is likely a compiled
AutoIt script file
38->209
46
chrome.exe
38->46
started
49
chrome.exe
38->49
started
51
chrome.exe
38->51
started
53
7 other processes
38->53
signatures13
process14
dnsIp15
211
Antivirus detection
for dropped file
40->211
213
Multi AV Scanner detection
for dropped file
40->213
215
Machine Learning detection
for dropped file
40->215
217
5 other signatures
40->217
55
explorer.exe
40->55
injected
133
C:\Users\user\AppData\Local\...\2lD8135.exe, PE32
43->133
dropped
135
C:\Users\user\AppData\Local\...\1cA86QQ2.exe, PE32
43->135
dropped
60
1cA86QQ2.exe
1
43->60
started
62
2lD8135.exe
1
43->62
started
183
192.168.2.4
unknown
unknown
46->183
185
239.255.255.250
unknown
Reserved
46->185
64
chrome.exe
46->64
started
72
2 other processes
46->72
66
chrome.exe
49->66
started
68
chrome.exe
51->68
started
70
chrome.exe
53->70
started
74
6 other processes
53->74
file16
signatures17
process18
dnsIp19
171
185.196.8.238
SIMPLECARRER2IT
Switzerland
55->171
173
5.42.65.80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
55->173
179
2 other IPs or domains
55->179
125
C:\Users\user\AppData\Local\Temp\B02A.exe, PE32
55->125
dropped
127
C:\Users\user\AppData\Local\Temp\A319.exe, PE32
55->127
dropped
129
C:\Users\user\AppData\Local\Temp\9DD8.exe, PE32
55->129
dropped
131
4 other malicious files
55->131
dropped
235
System process connects
to network (likely due
to code injection or
exploit)
55->235
237
Benign windows process
drops PE files
55->237
76
87CE.exe
55->76
started
80
60CC.exe
55->80
started
82
5794.exe
55->82
started
93
6 other processes
55->93
239
Multi AV Scanner detection
for dropped file
60->239
241
Machine Learning detection
for dropped file
60->241
243
Contains functionality
to inject code into
remote processes
60->243
85
AppLaunch.exe
11
508
60->85
started
87
conhost.exe
60->87
started
245
Writes to foreign memory
regions
62->245
247
Allocates memory in
foreign processes
62->247
249
Injects a PE file into
a foreign processes
62->249
89
AppLaunch.exe
8
4
62->89
started
91
conhost.exe
62->91
started
175
twitter.com
104.244.42.129
TWITTERUS
United States
64->175
177
tpop-api.twitter.com
104.244.42.130
TWITTERUS
United States
64->177
181
76 other IPs or domains
64->181
file20
signatures21
process22
dnsIp23
137
C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32
76->137
dropped
139
C:\Users\user\AppData\Local\...\toolspub2.exe, PE32
76->139
dropped
141
C:\Users\user\AppData\Local\...\latestX.exe, PE32+
76->141
dropped
153
2 other malicious files
76->153
dropped
251
Antivirus detection
for dropped file
76->251
253
Multi AV Scanner detection
for dropped file
76->253
255
Machine Learning detection
for dropped file
76->255
95
toolspub2.exe
76->95
started
98
InstallSetup9.exe
76->98
started
100
InstallSetup9.exe
76->100
started
257
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
80->257
259
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
80->259
261
Modifies the context
of a thread in another
process (thread injection)
80->261
263
Injects a PE file into
a foreign processes
80->263
103
60CC.exe
80->103
started
163
194.169.175.235
CLOUDCOMPUTINGDE
Germany
82->163
265
Found many strings related
to Crypto-Wallets (likely
being stolen)
82->265
267
Tries to harvest and
steal browser information
(history, passwords,
etc)
82->267
165
194.49.94.152
EQUEST-ASNL
unknown
85->165
167
ipinfo.io
34.117.59.81
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
85->167
143
C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII
85->143
dropped
145
C:\Users\user\AppData\...\FANBooster131.exe, PE32
85->145
dropped
147
C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32
85->147
dropped
149
C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32
85->149
dropped
269
Contains functionality
to check for running
processes (XOR)
85->269
271
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
85->271
273
Tries to steal Mail
credentials (via file
/ registry access)
85->273
275
9 other signatures
85->275
105
schtasks.exe
85->105
started
107
schtasks.exe
85->107
started
151
C:\Users\user\AppData\Local\Temp\...\9859.tmp, PE32
93->151
dropped
file24
signatures25
process26
file27
277
Antivirus detection
for dropped file
95->277
279
Multi AV Scanner detection
for dropped file
95->279
281
Machine Learning detection
for dropped file
95->281
285
2 other signatures
95->285
117
C:\Users\user\AppData\Local\Temp\Broom.exe, PE32
100->117
dropped
119
C:\Users\user\AppData\Local\...\XsdType.exe, PE32+
103->119
dropped
283
Found many strings related
to Crypto-Wallets (likely
being stolen)
103->283
109
conhost.exe
105->109
started
111
conhost.exe
107->111
started
signatures28
process29
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.