Analysis

  • max time kernel
    93s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 16:48

General

  • Target

    6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe

  • Size

    6.0MB

  • MD5

    febc63e02763cd676b1446b024639b81

  • SHA1

    23c29ea38ed641f9926193befb1ac1a8c3e7d4e6

  • SHA256

    6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7

  • SHA512

    93a5e23859db3a29e2a34f6709566a79a1cd2b0f0ad7d6bf4efe34dbdd784e520bc06776e1ea00a13ceba95ac1ee2ea38d0eec4abbed4e15d2a334dc36d8a881

  • SSDEEP

    49152:6Y3oQWF4WcPgM4+K2RjJjtE4HAZrGadSZMRPaThP46IPyIcju8HwQKpOlC6Z+Xe:6+5Nri4Uaad5Ml0ojeUEbkJA+Kxh

Malware Config

Signatures

  • Luca Stealer

    Info stealer written in Rust first seen in July 2022.

  • Lucastealer family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe
    "C:\Users\Admin\AppData\Local\Temp\6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /c "schtasks /Create /TR C:\Users\Admin\AppData\Roaming\svchost.exe /SC ONLOGON /TN RecordArchive /IT"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\system32\schtasks.exe
        schtasks /Create /TR C:\Users\Admin\AppData\Roaming\svchost.exe /SC ONLOGON /TN RecordArchive /IT
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\en-US-212.102.63.147-[Admin].zip

    Filesize

    578KB

    MD5

    07d532445333487e53ce0959b2cffe80

    SHA1

    d3e1be3fe57608056f1e3a13cdbd32a2d6216b1c

    SHA256

    5a8114a788df5289cf427eee10b6519c3e3de9fd0b0eac2e3f513c98d6046f22

    SHA512

    1c0381b4964d6c991585655fb8cde8f4a2ddfc8f788ad968f354ee1d1c9af6071089f269241b0b655fd122a720b7712be1efb37f33827c1bfda098a2b019cadb

  • C:\Users\Admin\AppData\Local\Temp\sensfiles.zip

    Filesize

    111KB

    MD5

    ff9d17b142e5c550131b6ea50e4a97f5

    SHA1

    cf3771e0dc467b9e2ddaa44d7b3754e6b869e036

    SHA256

    b643506c5ca8ad33ba163f70e0b0fc4703eb7ce56591aaf49f210b9295ef7e5b

    SHA512

    a38b849613fdfc83c5867a0fe6b813608485645bba62a0182cdd5c29adac32345fe18ccb260bf982db3d1b64dcab69df61686424ec08ba0e0d1b01e88eacb3d6