Edit tour
Windows
Analysis Report
PT54FFSL7ET46RASB.exe
Overview
General Information
Detection
LummaC, PureLog Stealer, Xmrig, zgRAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Xmrig
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected Stratum mining protocol
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Potential Crypto Mining Activity
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Tries to harvest and steal Bitcoin Wallet information
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected PersistenceViaHiddenTask
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: AspNetCompiler Execution
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Suspicious Execution of Powershell with Base64
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- PT54FFSL7ET46RASB.exe (PID: 5712 cmdline:
"C:\Users\ user\Deskt op\PT54FFS L7ET46RASB .exe" MD5: 8199C105289D70AF5446C7FD64496D7B) - conhost.exe (PID: 1664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - RegAsm.exe (PID: 6184 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Reg Asm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13) - HPd7I3vQri.exe (PID: 5476 cmdline:
"C:\Users\ user\AppDa ta\Roaming \HPd7I3vQr i.exe" MD5: C164ED9887BD51CBA150379514DC4E81) - cmd.exe (PID: 2528 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\Cfpe Am3lJAky.b at" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4092 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chcp.com (PID: 2348 cmdline:
chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF) - PING.EXE (PID: 420 cmdline:
ping -n 5 localhost MD5: B3624DD758CCECF93A1226CEF252CA12) - l6E.exe (PID: 4788 cmdline:
"C:\Users\ user\AppDa ta\Roaming \l6E.exe" MD5: FAC2188E4A28A0CF32BF4417D797B0F8) - conhost.exe (PID: 3544 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - RegAsm.exe (PID: 4800 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Reg Asm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13) - WerFault.exe (PID: 7100 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 800 -s 178 0 MD5: C31336C1EFC2CCB44B4326EA793040F2) - yTRfYxWiym.exe (PID: 764 cmdline:
"C:\Users\ user\AppDa ta\Roaming \yTRfYxWiy m.exe" MD5: FD3AD0AE7FE1BBEE4B2F2BD43A359393)
- powershell.exe (PID: 3604 cmdline:
powershell .exe -Exec utionPolic y Bypass - WindowStyl e Hidden - NoProfile -enc QQBkA GQALQBNAHA AUAByAGUAZ gBlAHIAZQB uAGMAZQAgA C0ARQB4AGM AbAB1AHMAa QBvAG4AUAB hAHQAaAAgA EMAOgBcAFU AcwBlAHIAc wBcAGUAbgB nAGkAbgBlA GUAcgBcAEE AcABwAEQAY QB0AGEAXAB SAG8AYQBtA GkAbgBnAFw AQQByAGcAd QBtAGUAbgB 0AEMAbwB1A G4AdABcAEM AdQByAHIAZ QBuAHQALgB lAHgAZQAsA EMAOgBcAFc AaQBuAGQAb wB3AHMAXAB NAGkAYwByA G8AcwBvAGY AdAAuAE4AR QBUAFwARgB yAGEAbQBlA HcAbwByAGs ANgA0AFwAd gA0AC4AMAA uADMAMAAzA DEAOQBcAEE AZABkAEkAb gBQAHIAbwB jAGUAcwBzA C4AZQB4AGU ALABDADoAX ABVAHMAZQB yAHMAXABlA G4AZwBpAG4 AZQBlAHIAX ABBAHAAcAB EAGEAdABhA FwATABvAGM AYQBsAFwAV ABlAG0AcAB cACAALQBGA G8AcgBjAGU AOwAgAEEAZ ABkAC0ATQB wAFAAcgBlA GYAZQByAGU AbgBjAGUAI AAtAEUAeAB jAGwAdQBzA GkAbwBuAFA AcgBvAGMAZ QBzAHMAIAB DADoAXABXA GkAbgBkAG8 AdwBzAFwAT QBpAGMAcgB vAHMAbwBmA HQALgBOAEU AVABcAEYAc gBhAG0AZQB 3AG8AcgBrA DYANABcAHY ANAAuADAAL gAzADAAMwA xADkAXABBA GQAZABJAG4 AUAByAG8AY wBlAHMAcwA uAGUAeABlA CwAQwA6AFw AVQBzAGUAc gBzAFwAZQB uAGcAaQBuA GUAZQByAFw AQQBwAHAAR ABhAHQAYQB cAFIAbwBhA G0AaQBuAGc AXABBAHIAZ wB1AG0AZQB uAHQAQwBvA HUAbgB0AFw AQwB1AHIAc gBlAG4AdAA uAGUAeABlA A== MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6968 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WmiPrvSE.exe (PID: 2144 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
- Current.exe (PID: 3060 cmdline:
C:\Users\u ser\AppDat a\Roaming\ ArgumentCo unt\Curren t.exe MD5: FD3AD0AE7FE1BBEE4B2F2BD43A359393) - aspnet_compiler.exe (PID: 3512 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\as pnet_compi ler.exe MD5: DF5419B32657D2896514B6A1D041FE08) - AddInProcess.exe (PID: 6116 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\Ad dInProcess .exe -o po ol.hashvau lt.pro:80 -u 43i9Xqe bDi6cXV1AE DLwbJAxy2o rmYj4NbvNB 5LZDu7TWoe 9orevfsZPB b3LtSbPUXb v9bzUAbFZi RNQ2zfigeD Z7aCWf99.R IG_CPU -p x --algo r x/0 --cpu- max-thread s-hint=50 MD5: 929EA1AF28AFEA2A3311FD4297425C94) - AddInProcess.exe (PID: 5320 cmdline:
C:\Windows \Microsoft .NET\Frame work64\v4. 0.30319\Ad dInProcess .exe -o po ol.hashvau lt.pro:80 -u 43i9Xqe bDi6cXV1AE DLwbJAxy2o rmYj4NbvNB 5LZDu7TWoe 9orevfsZPB b3LtSbPUXb v9bzUAbFZi RNQ2zfigeD Z7aCWf99.R IG_CPU -p x --algo r x/0 --cpu- max-thread s-hint=50 MD5: 929EA1AF28AFEA2A3311FD4297425C94)
- Current.exe (PID: 3640 cmdline:
C:\Users\u ser\AppDat a\Roaming\ ArgumentCo unt\Curren t.exe MD5: FD3AD0AE7FE1BBEE4B2F2BD43A359393)
- svchost.exe (PID: 6448 cmdline:
C:\Windows \System32\ svchost.ex e -k WerSv cGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - WerFault.exe (PID: 508 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 432 -p 48 00 -ip 480 0 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
zgRAT | zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on. | No Attribution |
{"C2 url": ["tendencctywop.shop", "reggwardssdqw.shop", "eemmbryequo.shop", "tryyudjasudqo.shop", "tesecuuweqo.shop", "licenseodqwmqn.shop", "keennylrwmqlw.shop", "relaxatinownio.shop"], "Build id": "hv0fRu--"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 36 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 28 entries |
Bitcoin Miner |
---|
Source: | Author: Joe Security: |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |