Behavioral task
behavioral1
Sample
955f29a6dfefb695396380e1f1aac82f4b55020f8ba8f5d378c84f10c179d3d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
955f29a6dfefb695396380e1f1aac82f4b55020f8ba8f5d378c84f10c179d3d3.exe
Resource
win10v2004-20220812-en
General
-
Target
955f29a6dfefb695396380e1f1aac82f4b55020f8ba8f5d378c84f10c179d3d3.zip
-
Size
2.1MB
-
MD5
584cc0a8e426717120767679e91ea23a
-
SHA1
09931c1ca6bb2e65561838044eab45a40f25a21a
-
SHA256
e0cd6174e1f0fe46090c1a147a13efeed1ee518904dd1bcbb197efd276c374cc
-
SHA512
b5efe31ee69bdc402da48003f8050fcd0838bd9ad5663ba6002a9df8332d61850810d6fd36dcc8f783a8f8cbb8c519b569602d62be0112159f675110cebe1ff5
-
SSDEEP
49152:Sl9TSyu0YKv9EFzMWj1hN+4fQt6jvJYMCyngaOHW5+S2:Im+9E1/kjyv2rWK25B2
Malware Config
Signatures
-
Luca Stealer payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/955f29a6dfefb695396380e1f1aac82f4b55020f8ba8f5d378c84f10c179d3d3 family_lucastealer -
Lucastealer family
Files
-
955f29a6dfefb695396380e1f1aac82f4b55020f8ba8f5d378c84f10c179d3d3.zip.zip
Password: threatbook
-
955f29a6dfefb695396380e1f1aac82f4b55020f8ba8f5d378c84f10c179d3d3.exe windows x64
Password: threatbook
b535b67949b30b08d67d78950e2b4c4e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
secur32
QueryContextAttributesW
FreeContextBuffer
DeleteSecurityContext
ApplyControlToken
InitializeSecurityContextW
DecryptMessage
AcceptSecurityContext
FreeCredentialsHandle
AcquireCredentialsHandleA
LsaFreeReturnBuffer
LsaGetLogonSessionData
LsaEnumerateLogonSessions
EncryptMessage
kernel32
SleepConditionVariableSRW
PostQueuedCompletionStatus
CancelIoEx
CreateIoCompletionPort
SetFileCompletionNotificationModes
WakeConditionVariable
GetSystemInfo
GetFileInformationByHandle
GetModuleHandleA
GetCurrentThread
TryAcquireSRWLockExclusive
GetStdHandle
GetConsoleMode
WaitForSingleObject
WriteConsoleW
SetLastError
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetCurrentProcess
ReleaseMutex
GetEnvironmentVariableW
RtlLookupFunctionEntry
FormatMessageW
GetTempPathW
CreateFileW
SetFilePointerEx
GetFullPathNameW
FindNextFileW
FindFirstFileW
FindClose
CreateThread
ExitProcess
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentDirectoryW
RtlCaptureContext
AcquireSRWLockShared
ReleaseSRWLockShared
SetFileInformationByHandle
DuplicateHandle
CopyFileExW
SetHandleInformation
OpenProcess
ReadProcessMemory
GetProcessTimes
GetSystemTimes
GetProcessIoCounters
LocalFree
VirtualQueryEx
GetDriveTypeW
GetVolumeInformationW
GetModuleHandleW
DeviceIoControl
GlobalMemoryStatusEx
GetQueuedCompletionStatusEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
SleepEx
GetSystemDirectoryA
GetTickCount
Sleep
MultiByteToWideChar
WideCharToMultiByte
MoveFileExA
GetEnvironmentVariableA
VerSetConditionMask
VerifyVersionInfoW
CreateFileA
GetFileSizeEx
ReadFile
FlushFileBuffers
MapViewOfFile
CreateFileMappingW
FormatMessageA
GetSystemTime
SystemTimeToFileTime
GetCurrentProcessId
GetFileSize
LockFileEx
UnlockFile
HeapDestroy
HeapCompact
LoadLibraryW
DeleteFileA
FlushViewOfFile
OutputDebugStringW
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapSize
HeapValidate
UnmapViewOfFile
GetFileAttributesW
CreateMutexW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
WriteFile
HeapCreate
AreFileApisANSI
InitializeCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
CreateDirectoryW
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
SetThreadStackGuarantee
AddVectoredExceptionHandler
DeleteFileW
GetFileInformationByHandleEx
FreeLibrary
GetProcAddress
LoadLibraryExW
GetComputerNameExW
GetLogicalDrives
GetTickCount64
GetUserPreferredUILanguages
GetLastError
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
CloseHandle
SwitchToThread
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetDiskFreeSpaceExW
advapi32
OpenProcessToken
LookupAccountSidW
RegOpenKeyExW
RegQueryValueExW
GetUserNameW
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
GetTokenInformation
ws2_32
connect
getsockname
send
closesocket
WSAGetLastError
recvfrom
WSAGetOverlappedResult
setsockopt
WSASend
WSAIoctl
WSASocketW
bind
getaddrinfo
ioctlsocket
getsockopt
shutdown
getpeername
recv
WSACloseEvent
WSACreateEvent
WSACleanup
WSARecv
WSAEnumNetworkEvents
WSAEventSelect
WSAResetEvent
WSAWaitForMultipleEvents
htons
ntohs
socket
WSASetLastError
__WSAFDIsSet
select
accept
htonl
listen
WSAStartup
freeaddrinfo
crypt32
CertGetCertificateChain
CertGetNameStringA
CertFindCertificateInStore
CryptStringToBinaryA
PFXImportCertStore
CertEnumCertificatesInStore
CertFindExtension
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertAddCertificateContextToStore
CertCloseStore
CertDuplicateStore
CertDuplicateCertificateContext
CertFreeCertificateChain
CertDuplicateCertificateChain
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertVerifyCertificateChainPolicy
CertOpenStore
CryptDecodeObjectEx
CryptUnprotectData
oleaut32
SysFreeString
SysAllocString
VariantClear
SysAllocStringLen
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
pdh
PdhOpenQueryA
PdhCollectQueryData
PdhGetFormattedCounterValue
PdhCloseQuery
PdhAddEnglishCounterW
PdhRemoveCounter
iphlpapi
FreeMibTable
GetIfTable2
GetIfEntry2
netapi32
NetUserEnum
NetUserGetLocalGroups
NetApiBufferFree
user32
GetMonitorInfoW
EnumDisplayMonitors
EnumDisplaySettingsExW
gdi32
SetStretchBltMode
StretchBlt
GetDIBits
CreateCompatibleDC
GetObjectW
DeleteObject
DeleteDC
GetDeviceCaps
CreateDCW
CreateCompatibleBitmap
SelectObject
ole32
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoTaskMemFree
shell32
CommandLineToArgvW
SHGetKnownFolderPath
bcrypt
BCryptCloseAlgorithmProvider
BCryptGenRandom
BCryptOpenAlgorithmProvider
ntdll
NtQuerySystemInformation
RtlGetVersion
NtQueryInformationProcess
powrprof
CallNtPowerInformation
psapi
GetModuleFileNameExW
EnumProcessModulesEx
GetPerformanceInfo
vcruntime140
memcpy
memset
memmove
strchr
strrchr
strstr
memchr
__C_specific_handler
__current_exception
__current_exception_context
__CxxFrameHandler3
memcmp
api-ms-win-crt-string-l1-1-0
strcmp
tolower
strncpy
wcslen
strcpy
strpbrk
strcspn
strspn
isupper
_strdup
strlen
strncmp
api-ms-win-crt-heap-l1-1-0
free
realloc
calloc
malloc
_set_new_mode
_msize
api-ms-win-crt-runtime-l1-1-0
_cexit
__p___argv
__p___argc
__sys_nerr
_exit
exit
_register_thread_local_exe_atexit_callback
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_initialize_onexit_table
__sys_errlist
_set_app_type
_seh_filter_exe
_endthreadex
_c_exit
_register_onexit_function
_errno
_wassert
abort
_crt_atexit
terminate
_initterm_e
_beginthreadex
api-ms-win-crt-convert-l1-1-0
wcstombs
strtol
atoi
strtoul
strtoll
api-ms-win-crt-stdio-l1-1-0
_lseeki64
_close
fputc
__stdio_common_vsprintf
fflush
fgets
_write
_set_fmode
__p__commode
__acrt_iob_func
fread
fseek
ftell
fwrite
fclose
fputs
__stdio_common_vsscanf
fopen
feof
_read
_open
api-ms-win-crt-time-l1-1-0
_time64
_gmtime64
_localtime64_s
strftime
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-filesystem-l1-1-0
_access
_fstat64
_stat64
_unlink
api-ms-win-crt-math-l1-1-0
__setusermatherr
log
_dclass
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ