Analysis

  • max time kernel
    62s
  • max time network
    25s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-08-2023 22:43

General

  • Target

    ACNBZD.exe

  • Size

    5.9MB

  • MD5

    021079dc0918b9c7359e93e770678000

  • SHA1

    70c03da6f7b339340b1943f5d0b7b1fd87579adf

  • SHA256

    ee63e26e84d8092fda9e527f7db34777b6261d8dfc96ed42167383f88cf1c487

  • SHA512

    9bc14753e39f2c93737886439d64a458f08265d1d8176c233a8e3f864e1f4f2751b161aa22408618d0dd343fb88b7037c8c2eee898c6d9b3bf466aaea709c5b0

  • SSDEEP

    49152:CYnF4XAvvLEDnAby0/1lzR+aJAyPfugmqNiEQG8+ECYoue5S58pzEIOh4xsPub7T:z7OryzzCJf0zBxMkeWg+O2

Malware Config

Extracted

Family

lucastealer

C2

https://api.telegram.org/bot6068798932:AAG_cHiqinDwNZ3Hd-rdp8tPwbT0czdVwTw

Signatures

  • Luca Stealer

    Info stealer written in Rust first seen in July 2022.

  • Luca Stealer payload 6 IoCs
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Executes dropped EXE 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ACNBZD.exe
    "C:\Users\Admin\AppData\Local\Temp\ACNBZD.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • \??\c:\users\admin\appdata\local\temp\acnbzd.exe 
      c:\users\admin\appdata\local\temp\acnbzd.exe 
      2⤵
      • Executes dropped EXE
      PID:4588
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3236
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3784
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2624
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:932
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:816
            • C:\Windows\SysWOW64\at.exe
              at 22:45 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:4824
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4452
      • C:\Users\Admin\AppData\Local\Temp\ACNBZD.exe
        "C:\Users\Admin\AppData\Local\Temp\ACNBZD.exe"
        1⤵
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2932
        • \??\c:\users\admin\appdata\local\temp\acnbzd.exe 
          c:\users\admin\appdata\local\temp\acnbzd.exe 
          2⤵
          • Executes dropped EXE
          PID:5088
        • C:\Users\Admin\AppData\Local\icsys.icn.exe
          C:\Users\Admin\AppData\Local\icsys.icn.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4848
          • \??\c:\windows\system\explorer.exe
            c:\windows\system\explorer.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:400
      • C:\Users\Admin\AppData\Local\Temp\ACNBZD.exe
        "C:\Users\Admin\AppData\Local\Temp\ACNBZD.exe"
        1⤵
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4416
        • \??\c:\users\admin\appdata\local\temp\acnbzd.exe 
          c:\users\admin\appdata\local\temp\acnbzd.exe 
          2⤵
          • Executes dropped EXE
          PID:5064
        • C:\Users\Admin\AppData\Local\icsys.icn.exe
          C:\Users\Admin\AppData\Local\icsys.icn.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2420
          • \??\c:\windows\system\explorer.exe
            c:\windows\system\explorer.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3008

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\acnbzd.exe 

        Filesize

        5.7MB

        MD5

        2c2055233260e5bb20ce675afd39ed0d

        SHA1

        26c056ba8e99a3fb523612b422a85be3ecbbd5b3

        SHA256

        306827f0ef0a4cbecd5458776244bf7ee99f2e49569daf0034176b39f5d1c17d

        SHA512

        3e2a18cd0c7fe5e3529d37ac37b352f8c19d3fef947f117701bb712c19cb40ff3ed56c843c789334a6c93382deef1f5cf4a48fbadb6b1e46fe804b9430fa1546

      • C:\Users\Admin\AppData\Local\Temp\acnbzd.exe 

        Filesize

        5.7MB

        MD5

        2c2055233260e5bb20ce675afd39ed0d

        SHA1

        26c056ba8e99a3fb523612b422a85be3ecbbd5b3

        SHA256

        306827f0ef0a4cbecd5458776244bf7ee99f2e49569daf0034176b39f5d1c17d

        SHA512

        3e2a18cd0c7fe5e3529d37ac37b352f8c19d3fef947f117701bb712c19cb40ff3ed56c843c789334a6c93382deef1f5cf4a48fbadb6b1e46fe804b9430fa1546

      • C:\Users\Admin\AppData\Local\Temp\acnbzd.exe 

        Filesize

        5.7MB

        MD5

        2c2055233260e5bb20ce675afd39ed0d

        SHA1

        26c056ba8e99a3fb523612b422a85be3ecbbd5b3

        SHA256

        306827f0ef0a4cbecd5458776244bf7ee99f2e49569daf0034176b39f5d1c17d

        SHA512

        3e2a18cd0c7fe5e3529d37ac37b352f8c19d3fef947f117701bb712c19cb40ff3ed56c843c789334a6c93382deef1f5cf4a48fbadb6b1e46fe804b9430fa1546

      • C:\Users\Admin\AppData\Local\Temp\acnbzd.exe 

        Filesize

        5.7MB

        MD5

        2c2055233260e5bb20ce675afd39ed0d

        SHA1

        26c056ba8e99a3fb523612b422a85be3ecbbd5b3

        SHA256

        306827f0ef0a4cbecd5458776244bf7ee99f2e49569daf0034176b39f5d1c17d

        SHA512

        3e2a18cd0c7fe5e3529d37ac37b352f8c19d3fef947f117701bb712c19cb40ff3ed56c843c789334a6c93382deef1f5cf4a48fbadb6b1e46fe804b9430fa1546

      • C:\Users\Admin\AppData\Local\icsys.icn.exe

        Filesize

        206KB

        MD5

        c5f78d788265a8c2b80017a0dc351266

        SHA1

        32836c3ccaf84431beaba1b10107743c052cddc0

        SHA256

        0a48908b44578715b511d6c067b2b0c1351783c049c68183f6067afff1ff72d0

        SHA512

        0315d122adf425001109bae742a1aff418f301f46c3655bf3e3d0c12ecc03ac3d70b52a60a744f81b7b041d28bf235f3d93abc26c71bfdd388be6a145a1bbb16

      • C:\Users\Admin\AppData\Local\icsys.icn.exe

        Filesize

        206KB

        MD5

        c5f78d788265a8c2b80017a0dc351266

        SHA1

        32836c3ccaf84431beaba1b10107743c052cddc0

        SHA256

        0a48908b44578715b511d6c067b2b0c1351783c049c68183f6067afff1ff72d0

        SHA512

        0315d122adf425001109bae742a1aff418f301f46c3655bf3e3d0c12ecc03ac3d70b52a60a744f81b7b041d28bf235f3d93abc26c71bfdd388be6a145a1bbb16

      • C:\Users\Admin\AppData\Local\icsys.icn.exe

        Filesize

        206KB

        MD5

        c5f78d788265a8c2b80017a0dc351266

        SHA1

        32836c3ccaf84431beaba1b10107743c052cddc0

        SHA256

        0a48908b44578715b511d6c067b2b0c1351783c049c68183f6067afff1ff72d0

        SHA512

        0315d122adf425001109bae742a1aff418f301f46c3655bf3e3d0c12ecc03ac3d70b52a60a744f81b7b041d28bf235f3d93abc26c71bfdd388be6a145a1bbb16

      • C:\Users\Admin\AppData\Local\icsys.icn.exe

        Filesize

        206KB

        MD5

        c5f78d788265a8c2b80017a0dc351266

        SHA1

        32836c3ccaf84431beaba1b10107743c052cddc0

        SHA256

        0a48908b44578715b511d6c067b2b0c1351783c049c68183f6067afff1ff72d0

        SHA512

        0315d122adf425001109bae742a1aff418f301f46c3655bf3e3d0c12ecc03ac3d70b52a60a744f81b7b041d28bf235f3d93abc26c71bfdd388be6a145a1bbb16

      • C:\Users\Admin\AppData\Local\icsys.icn.exe

        Filesize

        206KB

        MD5

        c5f78d788265a8c2b80017a0dc351266

        SHA1

        32836c3ccaf84431beaba1b10107743c052cddc0

        SHA256

        0a48908b44578715b511d6c067b2b0c1351783c049c68183f6067afff1ff72d0

        SHA512

        0315d122adf425001109bae742a1aff418f301f46c3655bf3e3d0c12ecc03ac3d70b52a60a744f81b7b041d28bf235f3d93abc26c71bfdd388be6a145a1bbb16

      • C:\Users\Admin\AppData\Roaming\mrsys.exe

        Filesize

        206KB

        MD5

        5249da132d888c8051255ab3b0f904d8

        SHA1

        545074adf5fd683e8b2a4d95da10e83b1a5f1091

        SHA256

        b9e38c87b9317e89d40bac2ae0b4eda3bbdcd2ce153bb48e5b8dd34b625d0f4c

        SHA512

        232d14731b57b53218a933c686f61e4eced02f2e2dbb342607756e15e2b94e1c5e0e154aae4144c376914e1c8fb11cfeeb3b2fbdb4e787a1ff2fed8c0ffead49

      • C:\Windows\System\explorer.exe

        Filesize

        207KB

        MD5

        83761b9c6644c228197a796eb0d305d6

        SHA1

        209156a8487cc9a27a74b39f4e9e5a7b16af2878

        SHA256

        c8a4f1fcf9e24b412670e8355cc830854456322e3c0d672beaa923676df496d6

        SHA512

        8190c333bc912f5ec979404114c4717cf17b7a880d0b11718e14722a93cec78a4dab26e40b8f44e9e095e10a50eb26143d5b03f5949027c794031aa1fadc4f74

      • C:\Windows\System\explorer.exe

        Filesize

        207KB

        MD5

        83761b9c6644c228197a796eb0d305d6

        SHA1

        209156a8487cc9a27a74b39f4e9e5a7b16af2878

        SHA256

        c8a4f1fcf9e24b412670e8355cc830854456322e3c0d672beaa923676df496d6

        SHA512

        8190c333bc912f5ec979404114c4717cf17b7a880d0b11718e14722a93cec78a4dab26e40b8f44e9e095e10a50eb26143d5b03f5949027c794031aa1fadc4f74

      • C:\Windows\System\explorer.exe

        Filesize

        207KB

        MD5

        83761b9c6644c228197a796eb0d305d6

        SHA1

        209156a8487cc9a27a74b39f4e9e5a7b16af2878

        SHA256

        c8a4f1fcf9e24b412670e8355cc830854456322e3c0d672beaa923676df496d6

        SHA512

        8190c333bc912f5ec979404114c4717cf17b7a880d0b11718e14722a93cec78a4dab26e40b8f44e9e095e10a50eb26143d5b03f5949027c794031aa1fadc4f74

      • C:\Windows\System\explorer.exe

        Filesize

        207KB

        MD5

        83761b9c6644c228197a796eb0d305d6

        SHA1

        209156a8487cc9a27a74b39f4e9e5a7b16af2878

        SHA256

        c8a4f1fcf9e24b412670e8355cc830854456322e3c0d672beaa923676df496d6

        SHA512

        8190c333bc912f5ec979404114c4717cf17b7a880d0b11718e14722a93cec78a4dab26e40b8f44e9e095e10a50eb26143d5b03f5949027c794031aa1fadc4f74

      • C:\Windows\System\spoolsv.exe

        Filesize

        206KB

        MD5

        8a599040c71f9e0706de09c42f3c4b44

        SHA1

        930c1483e6db5ef6e141527eeb2642e0a6e576f9

        SHA256

        80c8bcba6b3048125c8cc1d57c4c4de1dbc34d0b897d75dce013754caea0d894

        SHA512

        5049485b7396967a6e73227883aa9ec553b0cd1833fc236610fb755a3f2c0aa5021a46cf4c6fe0b3fee6fb01c3b985cff365e3b6c437515c927b14cb3959d88f

      • C:\Windows\System\spoolsv.exe

        Filesize

        206KB

        MD5

        8a599040c71f9e0706de09c42f3c4b44

        SHA1

        930c1483e6db5ef6e141527eeb2642e0a6e576f9

        SHA256

        80c8bcba6b3048125c8cc1d57c4c4de1dbc34d0b897d75dce013754caea0d894

        SHA512

        5049485b7396967a6e73227883aa9ec553b0cd1833fc236610fb755a3f2c0aa5021a46cf4c6fe0b3fee6fb01c3b985cff365e3b6c437515c927b14cb3959d88f

      • C:\Windows\System\svchost.exe

        Filesize

        207KB

        MD5

        54928efe8cb978e87e237a311c7aeaf3

        SHA1

        28b27ee4ce85a090bd421f25287000d4c0c9b3ae

        SHA256

        deae3983ec68be6f49c272c1b7300af94da6b2f30f216943775426667a53e721

        SHA512

        d444c96c1f0986d1ee1f3f97f5f7275c9d2e0b927af6ed6da2fe852b7bcf78eeca0e396d4526516cc365ba7b2c1ba660fdd7b36151fde22bd6473bb19bf93a89

      • \??\c:\users\admin\appdata\local\icsys.icn.exe

        Filesize

        206KB

        MD5

        c5f78d788265a8c2b80017a0dc351266

        SHA1

        32836c3ccaf84431beaba1b10107743c052cddc0

        SHA256

        0a48908b44578715b511d6c067b2b0c1351783c049c68183f6067afff1ff72d0

        SHA512

        0315d122adf425001109bae742a1aff418f301f46c3655bf3e3d0c12ecc03ac3d70b52a60a744f81b7b041d28bf235f3d93abc26c71bfdd388be6a145a1bbb16

      • \??\c:\users\admin\appdata\local\temp\acnbzd.exe 

        Filesize

        5.7MB

        MD5

        2c2055233260e5bb20ce675afd39ed0d

        SHA1

        26c056ba8e99a3fb523612b422a85be3ecbbd5b3

        SHA256

        306827f0ef0a4cbecd5458776244bf7ee99f2e49569daf0034176b39f5d1c17d

        SHA512

        3e2a18cd0c7fe5e3529d37ac37b352f8c19d3fef947f117701bb712c19cb40ff3ed56c843c789334a6c93382deef1f5cf4a48fbadb6b1e46fe804b9430fa1546

      • \??\c:\users\admin\appdata\local\temp\acnbzd.exe 

        Filesize

        5.7MB

        MD5

        2c2055233260e5bb20ce675afd39ed0d

        SHA1

        26c056ba8e99a3fb523612b422a85be3ecbbd5b3

        SHA256

        306827f0ef0a4cbecd5458776244bf7ee99f2e49569daf0034176b39f5d1c17d

        SHA512

        3e2a18cd0c7fe5e3529d37ac37b352f8c19d3fef947f117701bb712c19cb40ff3ed56c843c789334a6c93382deef1f5cf4a48fbadb6b1e46fe804b9430fa1546

      • \??\c:\windows\system\explorer.exe

        Filesize

        207KB

        MD5

        83761b9c6644c228197a796eb0d305d6

        SHA1

        209156a8487cc9a27a74b39f4e9e5a7b16af2878

        SHA256

        c8a4f1fcf9e24b412670e8355cc830854456322e3c0d672beaa923676df496d6

        SHA512

        8190c333bc912f5ec979404114c4717cf17b7a880d0b11718e14722a93cec78a4dab26e40b8f44e9e095e10a50eb26143d5b03f5949027c794031aa1fadc4f74

      • \??\c:\windows\system\spoolsv.exe

        Filesize

        206KB

        MD5

        8a599040c71f9e0706de09c42f3c4b44

        SHA1

        930c1483e6db5ef6e141527eeb2642e0a6e576f9

        SHA256

        80c8bcba6b3048125c8cc1d57c4c4de1dbc34d0b897d75dce013754caea0d894

        SHA512

        5049485b7396967a6e73227883aa9ec553b0cd1833fc236610fb755a3f2c0aa5021a46cf4c6fe0b3fee6fb01c3b985cff365e3b6c437515c927b14cb3959d88f

      • \??\c:\windows\system\svchost.exe

        Filesize

        207KB

        MD5

        54928efe8cb978e87e237a311c7aeaf3

        SHA1

        28b27ee4ce85a090bd421f25287000d4c0c9b3ae

        SHA256

        deae3983ec68be6f49c272c1b7300af94da6b2f30f216943775426667a53e721

        SHA512

        d444c96c1f0986d1ee1f3f97f5f7275c9d2e0b927af6ed6da2fe852b7bcf78eeca0e396d4526516cc365ba7b2c1ba660fdd7b36151fde22bd6473bb19bf93a89

      • memory/400-69-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/816-43-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2420-90-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2624-48-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2872-0-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2872-47-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2932-71-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3008-89-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3236-46-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4416-91-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4848-70-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4848-61-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB