Analysis
-
max time kernel
53s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 16:35
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe
-
Size
17.6MB
-
MD5
8c2a390aa7833720b374a720a6d06e4d
-
SHA1
188ec1a33bfd028333bcc3f6e96d2dbbdf01367f
-
SHA256
eedeb7539b2f680304e81c08f27372bc5459b8e406872f8ea939065e466f0774
-
SHA512
ac9bac95c37944ef7bb053126d5e5ba67c74562434b7bd4cb6f4c54e1d1cef8204990d670920f48af1cf26fb59ac422c0ccfe0075940cfe9c45e995897b86a07
-
SSDEEP
98304:BMSVESq5M3ClAD3sXHLQTyaQRO+YwWcRImg0cHQwb4CsB/wpDm7qCOPXwRalZLCt:2SSSP7sNavN7mg0mlb3DDdDP0
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot5740238611:AAESHdmffXlJNV7SD6-YjfXQmsg5jsSWb3Y
Signatures
-
Luca Stealer
Info stealer written in Rust first seen in July 2022.
-
Executes dropped EXE 1 IoCs
pid Process 472 UIServices.exe -
Loads dropped DLL 7 IoCs
pid Process 2036 cmd.exe 2036 cmd.exe 472 UIServices.exe 1556 WerFault.exe 1556 WerFault.exe 1556 WerFault.exe 1556 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Program crash 1 IoCs
pid pid_target Process procid_target 1556 472 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 472 UIServices.exe 472 UIServices.exe 472 UIServices.exe 472 UIServices.exe 472 UIServices.exe 472 UIServices.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 472 UIServices.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2036 1304 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe 27 PID 1304 wrote to memory of 2036 1304 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe 27 PID 1304 wrote to memory of 2036 1304 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe 27 PID 1304 wrote to memory of 2036 1304 SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe 27 PID 2036 wrote to memory of 472 2036 cmd.exe 29 PID 2036 wrote to memory of 472 2036 cmd.exe 29 PID 2036 wrote to memory of 472 2036 cmd.exe 29 PID 2036 wrote to memory of 472 2036 cmd.exe 29 PID 472 wrote to memory of 1556 472 UIServices.exe 32 PID 472 wrote to memory of 1556 472 UIServices.exe 32 PID 472 wrote to memory of 1556 472 UIServices.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1253469.14711.357.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\UIServices.exe Start UIServices.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\UIServices.exeC:\Users\Admin\AppData\Local\Temp\UIServices.exe Start UIServices.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 472 -s 11044⤵
- Loads dropped DLL
- Program crash
PID:1556
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
99KB
MD57a2b8cfcd543f6e4ebca43162b67d610
SHA1c1c45a326249bf0ccd2be2fbd412f1a62fb67024
SHA2567d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f
SHA512e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
5.3MB
MD59edef0f9db07974c3ce9cba957327e78
SHA1474f53d12af223f4c3da84f5832668fbb6611311
SHA25690056c97ab02271509b04c192ae375ed775b5c2e642e4b85bec8d27742036e72
SHA512e15a46dc659bf6ea591a69a7c40b0bd30626d5c533d21e48c3f4306f66a69ba822238461ad539b8d00bd9dd4c294ae43c1c54a1f2455eee2ade1670f93fcae09
-
Filesize
99KB
MD57a2b8cfcd543f6e4ebca43162b67d610
SHA1c1c45a326249bf0ccd2be2fbd412f1a62fb67024
SHA2567d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f
SHA512e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8