Analysis
-
max time kernel
53s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 16:35
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe
-
Size
17.6MB
-
MD5
8c2a390aa7833720b374a720a6d06e4d
-
SHA1
188ec1a33bfd028333bcc3f6e96d2dbbdf01367f
-
SHA256
eedeb7539b2f680304e81c08f27372bc5459b8e406872f8ea939065e466f0774
-
SHA512
ac9bac95c37944ef7bb053126d5e5ba67c74562434b7bd4cb6f4c54e1d1cef8204990d670920f48af1cf26fb59ac422c0ccfe0075940cfe9c45e995897b86a07
-
SSDEEP
98304:BMSVESq5M3ClAD3sXHLQTyaQRO+YwWcRImg0cHQwb4CsB/wpDm7qCOPXwRalZLCt:2SSSP7sNavN7mg0mlb3DDdDP0
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot5740238611:AAESHdmffXlJNV7SD6-YjfXQmsg5jsSWb3Y
Signatures
-
Luca Stealer
Info stealer written in Rust first seen in July 2022.
-
Executes dropped EXE 1 IoCs
Processes:
UIServices.exepid process 472 UIServices.exe -
Loads dropped DLL 7 IoCs
Processes:
cmd.exeUIServices.exeWerFault.exepid process 2036 cmd.exe 2036 cmd.exe 472 UIServices.exe 1556 WerFault.exe 1556 WerFault.exe 1556 WerFault.exe 1556 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1556 472 WerFault.exe UIServices.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
UIServices.exepid process 472 UIServices.exe 472 UIServices.exe 472 UIServices.exe 472 UIServices.exe 472 UIServices.exe 472 UIServices.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
UIServices.exedescription pid process Token: SeShutdownPrivilege 472 UIServices.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.execmd.exeUIServices.exedescription pid process target process PID 1304 wrote to memory of 2036 1304 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe cmd.exe PID 1304 wrote to memory of 2036 1304 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe cmd.exe PID 1304 wrote to memory of 2036 1304 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe cmd.exe PID 1304 wrote to memory of 2036 1304 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe cmd.exe PID 2036 wrote to memory of 472 2036 cmd.exe UIServices.exe PID 2036 wrote to memory of 472 2036 cmd.exe UIServices.exe PID 2036 wrote to memory of 472 2036 cmd.exe UIServices.exe PID 2036 wrote to memory of 472 2036 cmd.exe UIServices.exe PID 472 wrote to memory of 1556 472 UIServices.exe WerFault.exe PID 472 wrote to memory of 1556 472 UIServices.exe WerFault.exe PID 472 wrote to memory of 1556 472 UIServices.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\UIServices.exe Start UIServices.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\UIServices.exeC:\Users\Admin\AppData\Local\Temp\UIServices.exe Start UIServices.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 472 -s 11044⤵
- Loads dropped DLL
- Program crash
PID:1556
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
99KB
MD57a2b8cfcd543f6e4ebca43162b67d610
SHA1c1c45a326249bf0ccd2be2fbd412f1a62fb67024
SHA2567d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f
SHA512e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
99KB
MD57a2b8cfcd543f6e4ebca43162b67d610
SHA1c1c45a326249bf0ccd2be2fbd412f1a62fb67024
SHA2567d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f
SHA512e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8