Analysis

  • max time kernel
    300s
  • max time network
    271s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2023 22:43

General

  • Target

    ACNBZD.exe

  • Size

    5.9MB

  • MD5

    021079dc0918b9c7359e93e770678000

  • SHA1

    70c03da6f7b339340b1943f5d0b7b1fd87579adf

  • SHA256

    ee63e26e84d8092fda9e527f7db34777b6261d8dfc96ed42167383f88cf1c487

  • SHA512

    9bc14753e39f2c93737886439d64a458f08265d1d8176c233a8e3f864e1f4f2751b161aa22408618d0dd343fb88b7037c8c2eee898c6d9b3bf466aaea709c5b0

  • SSDEEP

    49152:CYnF4XAvvLEDnAby0/1lzR+aJAyPfugmqNiEQG8+ECYoue5S58pzEIOh4xsPub7T:z7OryzzCJf0zBxMkeWg+O2

Malware Config

Extracted

Family

lucastealer

C2

https://api.telegram.org/bot6068798932:AAG_cHiqinDwNZ3Hd-rdp8tPwbT0czdVwTw

Signatures

  • Luca Stealer

    Info stealer written in Rust first seen in July 2022.

  • Luca Stealer payload 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ACNBZD.exe
    "C:\Users\Admin\AppData\Local\Temp\ACNBZD.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1176
    • \??\c:\users\admin\appdata\local\temp\acnbzd.exe 
      c:\users\admin\appdata\local\temp\acnbzd.exe 
      2⤵
      • Executes dropped EXE
      PID:2080
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4088
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3940
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2208
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4372
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1436
            • C:\Windows\SysWOW64\at.exe
              at 22:45 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:3928
              • C:\Windows\SysWOW64\at.exe
                at 22:46 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:5100
                • C:\Windows\SysWOW64\at.exe
                  at 22:47 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:4536
                  • C:\Windows\SysWOW64\at.exe
                    at 22:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                    6⤵
                      PID:4108
                    • C:\Windows\SysWOW64\at.exe
                      at 22:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                      6⤵
                        PID:3876

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\acnbzd.exe 

              Filesize

              5.7MB

              MD5

              2c2055233260e5bb20ce675afd39ed0d

              SHA1

              26c056ba8e99a3fb523612b422a85be3ecbbd5b3

              SHA256

              306827f0ef0a4cbecd5458776244bf7ee99f2e49569daf0034176b39f5d1c17d

              SHA512

              3e2a18cd0c7fe5e3529d37ac37b352f8c19d3fef947f117701bb712c19cb40ff3ed56c843c789334a6c93382deef1f5cf4a48fbadb6b1e46fe804b9430fa1546

            • C:\Users\Admin\AppData\Local\icsys.icn.exe

              Filesize

              206KB

              MD5

              c5f78d788265a8c2b80017a0dc351266

              SHA1

              32836c3ccaf84431beaba1b10107743c052cddc0

              SHA256

              0a48908b44578715b511d6c067b2b0c1351783c049c68183f6067afff1ff72d0

              SHA512

              0315d122adf425001109bae742a1aff418f301f46c3655bf3e3d0c12ecc03ac3d70b52a60a744f81b7b041d28bf235f3d93abc26c71bfdd388be6a145a1bbb16

            • C:\Users\Admin\AppData\Local\icsys.icn.exe

              Filesize

              206KB

              MD5

              c5f78d788265a8c2b80017a0dc351266

              SHA1

              32836c3ccaf84431beaba1b10107743c052cddc0

              SHA256

              0a48908b44578715b511d6c067b2b0c1351783c049c68183f6067afff1ff72d0

              SHA512

              0315d122adf425001109bae742a1aff418f301f46c3655bf3e3d0c12ecc03ac3d70b52a60a744f81b7b041d28bf235f3d93abc26c71bfdd388be6a145a1bbb16

            • C:\Users\Admin\AppData\Roaming\mrsys.exe

              Filesize

              206KB

              MD5

              ef482d58c091b5f9145b779f8fa47d05

              SHA1

              a3cb62075f16c99ed7bd9c79396d2f651de29983

              SHA256

              1bb97a2a1c50ce5565362c1fafe0a0f77de245d86d718d15f40591126147fc1b

              SHA512

              188eebbffe45a06aaa247a020481adf2786e06c32476cf80d2e5b0ccacdde926850d152b5abffdd7d58584522375ee0e0f8fe10959030211c4f61a17ec063925

            • C:\Windows\System\explorer.exe

              Filesize

              206KB

              MD5

              4b4aa369b34ca6e9663d391d2bf3ba26

              SHA1

              34c790bcf88ee55b61f5b66f153a6d15dae13890

              SHA256

              9d70af30fc0d775bffa7a90778b30eee70ac9cde1235ebd484887b6f49d54237

              SHA512

              a87d6aba4ad019aa0dba8436fd2cd91948e65759dca1464cc3fa26d163206494b3668d7e52370049fcf83791a1b2c1d48d3cf08d67f1c2952a9c70ac0d35d1de

            • C:\Windows\System\explorer.exe

              Filesize

              206KB

              MD5

              4b4aa369b34ca6e9663d391d2bf3ba26

              SHA1

              34c790bcf88ee55b61f5b66f153a6d15dae13890

              SHA256

              9d70af30fc0d775bffa7a90778b30eee70ac9cde1235ebd484887b6f49d54237

              SHA512

              a87d6aba4ad019aa0dba8436fd2cd91948e65759dca1464cc3fa26d163206494b3668d7e52370049fcf83791a1b2c1d48d3cf08d67f1c2952a9c70ac0d35d1de

            • C:\Windows\System\spoolsv.exe

              Filesize

              206KB

              MD5

              43b8bbcc0b6ae3184651a1ede88a8e6c

              SHA1

              72ed2113dc9007292a9a5782c30a45dd13c4d668

              SHA256

              067ca770918c6ef8620a393b31e87139ffee020a06ecbffdb37f72800da5aaa8

              SHA512

              cafdd6dab1e4488473a2fbc52303ed52952772ca982088629acc413709513a08b036d893e7d18b21e150423d52797538fbe75ec51dc4c3671aa96cbc9b8d57af

            • C:\Windows\System\spoolsv.exe

              Filesize

              206KB

              MD5

              43b8bbcc0b6ae3184651a1ede88a8e6c

              SHA1

              72ed2113dc9007292a9a5782c30a45dd13c4d668

              SHA256

              067ca770918c6ef8620a393b31e87139ffee020a06ecbffdb37f72800da5aaa8

              SHA512

              cafdd6dab1e4488473a2fbc52303ed52952772ca982088629acc413709513a08b036d893e7d18b21e150423d52797538fbe75ec51dc4c3671aa96cbc9b8d57af

            • C:\Windows\System\svchost.exe

              Filesize

              207KB

              MD5

              ff2668b17300963c2a1f1864f212c257

              SHA1

              ad584b9391464f8ef8b7edf3dfb25aedb70b1628

              SHA256

              cf935de35387c7f87f668013288ed94cb882a8e6aa79e742ea5fadad17a8c21f

              SHA512

              0c17c274fb06ab32e30e39b17bcda919eeb0da454aa442d08082d9af06fd0fce82b9491e079424c3ab5ba2f88de1ccf2a404054d3897dcc89aecc2ece1214b34

            • \??\c:\users\admin\appdata\local\temp\acnbzd.exe 

              Filesize

              5.7MB

              MD5

              2c2055233260e5bb20ce675afd39ed0d

              SHA1

              26c056ba8e99a3fb523612b422a85be3ecbbd5b3

              SHA256

              306827f0ef0a4cbecd5458776244bf7ee99f2e49569daf0034176b39f5d1c17d

              SHA512

              3e2a18cd0c7fe5e3529d37ac37b352f8c19d3fef947f117701bb712c19cb40ff3ed56c843c789334a6c93382deef1f5cf4a48fbadb6b1e46fe804b9430fa1546

            • \??\c:\windows\system\explorer.exe

              Filesize

              206KB

              MD5

              4b4aa369b34ca6e9663d391d2bf3ba26

              SHA1

              34c790bcf88ee55b61f5b66f153a6d15dae13890

              SHA256

              9d70af30fc0d775bffa7a90778b30eee70ac9cde1235ebd484887b6f49d54237

              SHA512

              a87d6aba4ad019aa0dba8436fd2cd91948e65759dca1464cc3fa26d163206494b3668d7e52370049fcf83791a1b2c1d48d3cf08d67f1c2952a9c70ac0d35d1de

            • \??\c:\windows\system\spoolsv.exe

              Filesize

              206KB

              MD5

              43b8bbcc0b6ae3184651a1ede88a8e6c

              SHA1

              72ed2113dc9007292a9a5782c30a45dd13c4d668

              SHA256

              067ca770918c6ef8620a393b31e87139ffee020a06ecbffdb37f72800da5aaa8

              SHA512

              cafdd6dab1e4488473a2fbc52303ed52952772ca982088629acc413709513a08b036d893e7d18b21e150423d52797538fbe75ec51dc4c3671aa96cbc9b8d57af

            • \??\c:\windows\system\svchost.exe

              Filesize

              207KB

              MD5

              ff2668b17300963c2a1f1864f212c257

              SHA1

              ad584b9391464f8ef8b7edf3dfb25aedb70b1628

              SHA256

              cf935de35387c7f87f668013288ed94cb882a8e6aa79e742ea5fadad17a8c21f

              SHA512

              0c17c274fb06ab32e30e39b17bcda919eeb0da454aa442d08082d9af06fd0fce82b9491e079424c3ab5ba2f88de1ccf2a404054d3897dcc89aecc2ece1214b34

            • memory/1176-49-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/1176-0-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/1436-44-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/2208-47-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/3940-51-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/3940-20-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/4088-48-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB

            • memory/4372-52-0x0000000000400000-0x0000000000440000-memory.dmp

              Filesize

              256KB