Threat name:
LummaC Stealer, PrivateLoader, PureLog S
Alert
Classification:
troj.spyw.evad
.NET source code contains potential unpacker
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found malware configuration
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1356766
Sample:
OV0WnV6CzT.exe
Startdate:
09/12/2023
Architecture:
WINDOWS
Score:
100
136
runeelite.com
2->136
138
ipinfo.io
2->138
140
connv2.proxies.tv
2->140
172
Snort IDS alert for
network traffic
2->172
174
Multi AV Scanner detection
for domain / URL
2->174
176
Found malware configuration
2->176
178
20 other signatures
2->178
14
OV0WnV6CzT.exe
1
4
2->14
started
18
OfficeTrackerNMP131.exe
2->18
started
20
OfficeTrackerNMP131.exe
2->20
started
22
rundll32.exe
2->22
started
signatures3
process4
file5
116
C:\Users\user\AppData\Local\...\lT9kJ82.exe, PE32
14->116
dropped
118
C:\Users\user\AppData\Local\...\6yM7Cv7.exe, PE32
14->118
dropped
230
Binary is likely a compiled
AutoIt script file
14->230
24
lT9kJ82.exe
1
4
14->24
started
signatures6
process7
file8
108
C:\Users\user\AppData\Local\...\Pt4YC55.exe, PE32
24->108
dropped
110
C:\Users\user\AppData\Local\...\5KF8ZE3.exe, PE32
24->110
dropped
210
Antivirus detection
for dropped file
24->210
212
Multi AV Scanner detection
for dropped file
24->212
214
Machine Learning detection
for dropped file
24->214
28
Pt4YC55.exe
1
4
24->28
started
signatures9
process10
file11
112
C:\Users\user\AppData\Local\...\Qr0zI47.exe, PE32
28->112
dropped
114
C:\Users\user\AppData\Local\...\4AE270nN.exe, PE32
28->114
dropped
224
Antivirus detection
for dropped file
28->224
226
Multi AV Scanner detection
for dropped file
28->226
228
Machine Learning detection
for dropped file
28->228
32
Qr0zI47.exe
1
4
28->32
started
36
4AE270nN.exe
28->36
started
signatures12
process13
file14
92
C:\Users\user\AppData\Local\...\3Le36le.exe, PE32
32->92
dropped
94
C:\Users\user\AppData\Local\...\1Cz78iI2.exe, PE32
32->94
dropped
158
Antivirus detection
for dropped file
32->158
160
Multi AV Scanner detection
for dropped file
32->160
162
Machine Learning detection
for dropped file
32->162
38
3Le36le.exe
32->38
started
41
1Cz78iI2.exe
32->41
started
96
C:\...\vUgMXLhr7AyWezZVNzdLlnBFFiXMTKQX.zip, Zip
36->96
dropped
164
Tries to steal Mail
credentials (via file
/ registry access)
36->164
166
Disables Windows Defender
(deletes autostart)
36->166
168
Tries to harvest and
steal browser information
(history, passwords,
etc)
36->168
170
3 other signatures
36->170
43
WerFault.exe
36->43
started
signatures15
process16
signatures17
180
Antivirus detection
for dropped file
38->180
182
Multi AV Scanner detection
for dropped file
38->182
184
Machine Learning detection
for dropped file
38->184
194
5 other signatures
38->194
45
explorer.exe
38->45
injected
186
Contains functionality
to inject code into
remote processes
41->186
188
Writes to foreign memory
regions
41->188
190
Allocates memory in
foreign processes
41->190
192
Injects a PE file into
a foreign processes
41->192
50
AppLaunch.exe
11
508
41->50
started
52
AppLaunch.exe
41->52
started
process18
dnsIp19
148
185.196.8.238, 49747, 80
SIMPLECARRER2IT
Switzerland
45->148
150
185.172.128.19, 80
NADYMSS-ASRU
Russian Federation
45->150
156
2 other IPs or domains
45->156
120
C:\Users\user\AppData\Local\TempCFE.exe, PE32
45->120
dropped
122
C:\Users\user\AppData\Local\Temp9B1.exe, PE32
45->122
dropped
124
C:\Users\user\AppData\Local\Temp\AC3B.exe, PE32
45->124
dropped
132
3 other malicious files
45->132
dropped
232
System process connects
to network (likely due
to code injection or
exploit)
45->232
234
Benign windows process
drops PE files
45->234
54
E9B1.exe
45->54
started
58
6C9F.exe
45->58
started
60
ECFE.exe
45->60
started
71
7 other processes
45->71
152
193.233.132.51, 49729, 49731, 50500
FREE-NET-ASFREEnetEU
Russian Federation
50->152
154
ipinfo.io
34.117.59.81, 443, 49730, 49732
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
50->154
126
C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII
50->126
dropped
128
C:\...\JBWoTtCWm2LgjuvoR3EibrMKSNUfnpFE.zip, Zip
50->128
dropped
130
C:\Users\user\AppData\...\FANBooster131.exe, PE32
50->130
dropped
134
2 other files (none is malicious)
50->134
dropped
236
Tries to steal Mail
credentials (via file
/ registry access)
50->236
238
Disables Windows Defender
(deletes autostart)
50->238
240
Exclude list of file
types from scheduled,
custom, and real-time
scanning
50->240
248
3 other signatures
50->248
63
oXnyHd.exe
50->63
started
65
schtasks.exe
1
50->65
started
67
schtasks.exe
1
50->67
started
69
WerFault.exe
50->69
started
242
Found stalling execution
ending in API Sleep
call
52->242
244
Contains functionality
to inject threads in
other processes
52->244
246
Uses schtasks.exe or
at.exe to add and modify
task schedules
52->246
file20
signatures21
process22
dnsIp23
100
C:\Users\user\AppData\Roaming\...\File2.exe, PE32
54->100
dropped
102
C:\Users\user\AppData\Roaming\...\File1.exe, PE32
54->102
dropped
196
Machine Learning detection
for dropped file
54->196
73
File1.exe
54->73
started
77
File2.exe
54->77
started
79
conhost.exe
54->79
started
198
Antivirus detection
for dropped file
58->198
200
Multi AV Scanner detection
for dropped file
58->200
202
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
58->202
204
Modifies the context
of a thread in another
process (thread injection)
58->204
81
6C9F.exe
58->81
started
146
77.105.132.87, 20104, 49746
PLUSTELECOM-ASRU
Russian Federation
60->146
206
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
60->206
84
conhost.exe
65->84
started
86
conhost.exe
67->86
started
104
C:\Users\user\AppData\Roaming\oXnyHd.exe, PE32
71->104
dropped
106
C:\Users\user\AppData\Local\...\tmp9998.tmp, XML
71->106
dropped
208
Injects a PE file into
a foreign processes
71->208
88
schtasks.exe
71->88
started
file24
signatures25
process26
dnsIp27
142
176.123.10.211, 47430, 49742
ALEXHOSTMD
Moldova Republic of
73->142
216
Multi AV Scanner detection
for dropped file
73->216
218
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
73->218
220
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
73->220
222
2 other signatures
73->222
144
176.123.7.190, 32927, 49741
ALEXHOSTMD
Moldova Republic of
77->144
98
C:\Users\user\...\ContextProperties.exe, PE32+
81->98
dropped
90
conhost.exe
88->90
started
file28
signatures29
process30
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.