Resubmissions
14-10-2023 23:00
231014-2y4mkscd2y 1014-10-2023 22:58
231014-2xw64seb43 1014-10-2023 04:03
231014-emwfhaff5x 10Analysis
-
max time kernel
50s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 22:58
Static task
static1
Behavioral task
behavioral1
Sample
85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6_JC.exe
-
Size
2.8MB
-
MD5
723a599e70812b9aa02beb8ba5ecd258
-
SHA1
25b72aa419fca1ecb094e65215fbc34bcf3566c8
-
SHA256
85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6
-
SHA512
d73768a8f43d4707fdf6e329d0a58bd15b144916db6509b48ccde0ac075bdccdade1cca369c0123a1e1edd9f7b71be5d893462875685ddf8347014ce48b59c10
-
SSDEEP
49152:jCfDVSuEDBxOGNDHw3eO/t578Or4loBkGIEQoPYk41Rwr/WRnqmU0wYF:eb0fZC3eO/t3r4loB2oPewzWqT0wYF
Malware Config
Extracted
lucastealer
https://api.telegram.org/bot6144496200:AAG-IIb4TPBPT1INBnZWa7iLZBVaG67I2mE
Signatures
-
Luca Stealer
Info stealer written in Rust first seen in July 2022.
-
Luca Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/2160-0-0x0000000140000000-0x00000001406EB000-memory.dmp family_lucastealer behavioral2/memory/2160-2-0x0000000140000000-0x00000001406EB000-memory.dmp family_lucastealer behavioral2/memory/2160-6-0x0000000140000000-0x00000001406EB000-memory.dmp family_lucastealer -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2160 85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6_JC.exe 2160 85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6_JC.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2160 85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6_JC.exe 2160 85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6_JC.exe 4672 taskmgr.exe 4672 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4672 taskmgr.exe Token: SeSystemProfilePrivilege 4672 taskmgr.exe Token: SeCreateGlobalPrivilege 4672 taskmgr.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe 4672 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6_JC.exe"C:\Users\Admin\AppData\Local\Temp\85edef24a66c5400325643150da1de646996947cbff6f3fada987867a70655d6_JC.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4672