Analysis
-
max time kernel
55s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe
Resource
win10v2004-20220901-en
General
-
Target
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe
-
Size
17.6MB
-
MD5
8c2a390aa7833720b374a720a6d06e4d
-
SHA1
188ec1a33bfd028333bcc3f6e96d2dbbdf01367f
-
SHA256
eedeb7539b2f680304e81c08f27372bc5459b8e406872f8ea939065e466f0774
-
SHA512
ac9bac95c37944ef7bb053126d5e5ba67c74562434b7bd4cb6f4c54e1d1cef8204990d670920f48af1cf26fb59ac422c0ccfe0075940cfe9c45e995897b86a07
-
SSDEEP
98304:BMSVESq5M3ClAD3sXHLQTyaQRO+YwWcRImg0cHQwb4CsB/wpDm7qCOPXwRalZLCt:2SSSP7sNavN7mg0mlb3DDdDP0
Malware Config
Signatures
-
Luca Stealer
Info stealer written in Rust first seen in July 2022.
-
Executes dropped EXE 1 IoCs
pid Process 1520 UIServices.exe -
Loads dropped DLL 7 IoCs
pid Process 1628 cmd.exe 1628 cmd.exe 1520 UIServices.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Program crash 1 IoCs
pid pid_target Process procid_target 860 1520 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1520 UIServices.exe 1520 UIServices.exe 1520 UIServices.exe 1520 UIServices.exe 1520 UIServices.exe 1520 UIServices.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1520 UIServices.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1628 1032 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe 28 PID 1032 wrote to memory of 1628 1032 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe 28 PID 1032 wrote to memory of 1628 1032 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe 28 PID 1032 wrote to memory of 1628 1032 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe 28 PID 1628 wrote to memory of 1520 1628 cmd.exe 30 PID 1628 wrote to memory of 1520 1628 cmd.exe 30 PID 1628 wrote to memory of 1520 1628 cmd.exe 30 PID 1628 wrote to memory of 1520 1628 cmd.exe 30 PID 1520 wrote to memory of 860 1520 UIServices.exe 32 PID 1520 wrote to memory of 860 1520 UIServices.exe 32 PID 1520 wrote to memory of 860 1520 UIServices.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\UIServices.exe Start UIServices.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\UIServices.exeC:\Users\Admin\AppData\Local\Temp\UIServices.exe Start UIServices.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1520 -s 10844⤵
- Loads dropped DLL
- Program crash
PID:860
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
99KB
MD57a2b8cfcd543f6e4ebca43162b67d610
SHA1c1c45a326249bf0ccd2be2fbd412f1a62fb67024
SHA2567d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f
SHA512e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
99KB
MD57a2b8cfcd543f6e4ebca43162b67d610
SHA1c1c45a326249bf0ccd2be2fbd412f1a62fb67024
SHA2567d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f
SHA512e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8